Wireless

Choosing a wireless module

You must choose a wireless module that has a chipset that is capable of being put in monitor mode. The site below has a fairly comprehensive list of adapters that support this.

https://miloserdov.org/?p=2196

Using an ALFA Wireless Adapter in Linux (Kali)

Install the correct driver with apt-get install realtek-rtl88xxau-dkms. After a reboot the WiFi adapter worked on my installation. The only thing to note - it may not work in the usual way with airmon-ng to capture handshakes. The following commands can be used to troubleshoot the interface:

sudo ifconfig wlan0 down
sudo airmon-ng check kill
sudo iwconfig wlan0 mode monitor
sudo ifconfig wlan0 up

After a lot of failed attempts I found a working solution for folks that have continued problems with getting the Alfa card to work. First unplug your Wi-Fi adapter, then follow these steps:

apt remove realtek-rtl88xxau-dkms && apt purge realtek-rtl88xxau-dkms
apt update && apt upgrade 
apt autoremove && apt autoclean 
# reboot
apt-get dist-upgrade
# reboot
git clone https://github.com/aircrack-ng/rtl8812au
cd rtl8812au 
make && make install
# power off the PC

Now turn ON the PC and plug your Wi-Fi adapter and it should work normally.

Setting TX (transmit) POWER

Cracking WPA

Cracking WEP

with Connected Clients

``

via a Client

ARP amplification

Cracking WEP /w shared key AUTH

Cracking a Clientless WEP (FRAG AND KOREK)

{FRAG}

{KOREK}

Karmetasploit

Pyrit

pyrit DB attacks

pyrit strip

pyrit dictionary attack

MISC

TODO: Split "Misc" items into proper sections; prep code for scripting (issue #16)

  • Put each example into its respective section

  • Clean up code examples and prep for scripting

  • Remove second "misc" section

Bridge-control man in the middle

airgraph-ng

airdecap-ng

With airdecap-ng you can decrypt WEP/WPA/WPA2 capture files. As well, it can also be used to strip the wireless headers from an unencrypted wireless capture.

It outputs a new file ending with “-dec.cap” which is the decrypted/stripped version of the input file.

Option
Param.
Description

-l

don't remove the 802.11 header

-b

bssid

access point MAC address filter

-k

pmk

WPA/WPA2 Pairwise Master Key in hex

-e

essid

target network ascii identifier

-p

pass

target network WPA/WPA2 passphrase

-w

key

target network WEP key in hexadecimal

Remove the wireless headers from an open network (no encryption) capture:

Decrypt a WEP-encrypted capture using a hexadecimal WEP key:

Decrypt a WPA/WPA2 encrypted capture using the passphrase:

WPA/WPA2 Requirements

The capture file must contain a valid four-way handshake. For this purpose having (packets 2 and 3) or (packets 3 and 4) will work correctly. In fact, you don't truly need all four handshake packets.

As well, only data packets following the handshake will be decrypted. This is because information is required from the handshake in order to decrypt the data packets.

Combining CSV files

To combine your airodump-ng .txt/.csv files together simply open up a terminal and cd into the directory where you're keeping them in and then type:

Man-in-the-middle with Bettercap

Misc

If you like this content and would like to see more, please consider buying me a coffee!

Last updated