Wireless
Hack Responsibly.
Always ensure you have explicit permission to access any computer system before using any of the techniques contained in these documents. You accept full responsibility for your actions by applying any knowledge gained here.
Choosing a wireless module
You must choose a wireless module that has a chipset that is capable of being put in monitor mode. The site below has a fairly comprehensive list of adapters that support this.
https://miloserdov.org/?p=2196
Using an ALFA Wireless Adapter in Linux (Kali)
Install the correct driver with apt-get install realtek-rtl88xxau-dkms. After a reboot the WiFi adapter worked on my installation. The only thing to note - it may not work in the usual way with airmon-ng to capture handshakes. The following commands can be used to troubleshoot the interface:
sudo ifconfig wlan0 down
sudo airmon-ng check kill
sudo iwconfig wlan0 mode monitor
sudo ifconfig wlan0 upAfter a lot of failed attempts I found a working solution for folks that have continued problems with getting the Alfa card to work. First unplug your Wi-Fi adapter, then follow these steps:
apt remove realtek-rtl88xxau-dkms && apt purge realtek-rtl88xxau-dkms
apt update && apt upgrade
apt autoremove && apt autoclean
# reboot
apt-get dist-upgrade
# reboot
git clone https://github.com/aircrack-ng/rtl8812au
cd rtl8812au
make && make install
# power off the PCNow turn ON the PC and plug your Wi-Fi adapter and it should work normally.
Setting TX (transmit) POWER
Cracking WPA
Cracking WEP
with Connected Clients
``
via a Client
ARP amplification
Cracking WEP /w shared key AUTH
Cracking a Clientless WEP (FRAG AND KOREK)
{FRAG}
{KOREK}
Karmetasploit
Pyrit
pyrit DB attacks
pyrit strip
pyrit dictionary attack
MISC
TODO: Split "Misc" items into proper sections; prep code for scripting (issue #16)
Put each example into its respective section
Clean up code examples and prep for scripting
Remove second "misc" section
Bridge-control man in the middle
airgraph-ng
CAPR: Client to AP Relationship. This shows all the clients attached to a particular AP.
CPG: Common Probe Graph. This will show all probed SSID by clients.
airdecap-ng
With airdecap-ng you can decrypt WEP/WPA/WPA2 capture files. As well, it can also be used to strip the wireless headers from an unencrypted wireless capture.
It outputs a new file ending with “-dec.cap” which is the decrypted/stripped version of the input file.
-l
don't remove the 802.11 header
-b
bssid
access point MAC address filter
-k
pmk
WPA/WPA2 Pairwise Master Key in hex
-e
essid
target network ascii identifier
-p
pass
target network WPA/WPA2 passphrase
-w
key
target network WEP key in hexadecimal
Remove the wireless headers from an open network (no encryption) capture:
Decrypt a WEP-encrypted capture using a hexadecimal WEP key:
Decrypt a WPA/WPA2 encrypted capture using the passphrase:
WPA/WPA2 Requirements
The capture file must contain a valid four-way handshake. For this purpose having (packets 2 and 3) or (packets 3 and 4) will work correctly. In fact, you don't truly need all four handshake packets.
As well, only data packets following the handshake will be decrypted. This is because information is required from the handshake in order to decrypt the data packets.
Combining CSV files
To combine your airodump-ng .txt/.csv files together simply open up a terminal and cd into the directory where you're keeping them in and then type:
Man-in-the-middle with Bettercap
Misc
If you like this content and would like to see more, please consider buying me a coffee!
Last updated