Podcast
Questions and Answers
What types of networks should be reviewed for useful information during remote targeting?
What types of networks should be reviewed for useful information during remote targeting?
- VPN, SSL, WPA-Enterprise
- WEP, WPA-PSK, WPA-Enterprise (correct)
- WPA-PSK, WPA3, Open networks
- WEP, WPA2, VPN
What file type is NOT typically logged by Kismet and airodump for further review?
What file type is NOT typically logged by Kismet and airodump for further review?
- PCAP
- Log files
- CSV (correct)
- XML
What indicates a strong potential ownership of a client device during a probe?
What indicates a strong potential ownership of a client device during a probe?
- The device last seen within the last hour
- BSSID of the device's network
- Total number of packets seen from the device
- Probing for an SSID matching part of the user's name (correct)
What information is contained in the PCAP files other than basic details?
What information is contained in the PCAP files other than basic details?
When identifying a target network, what should be looked up for the BSSID?
When identifying a target network, what should be looked up for the BSSID?
What is an ideal location for initiating stealth physical recon operations?
What is an ideal location for initiating stealth physical recon operations?
Which method is NOT mentioned as a means of conducting stealth recon?
Which method is NOT mentioned as a means of conducting stealth recon?
What should you do first before changing the MAC address in a Linux terminal?
What should you do first before changing the MAC address in a Linux terminal?
Which of the following is NOT a major vulnerability to be exploited in active wireless attacks?
Which of the following is NOT a major vulnerability to be exploited in active wireless attacks?
When wardriving, what is essential to maintain during operations?
When wardriving, what is essential to maintain during operations?
What is a possible consequence of changing the last digit of your MAC address to avoid detection?
What is a possible consequence of changing the last digit of your MAC address to avoid detection?
Which device is NOT mentioned as suitable for mailing to conduct recon?
Which device is NOT mentioned as suitable for mailing to conduct recon?
What command is used for spoofing a disassociation message in a wireless network?
What command is used for spoofing a disassociation message in a wireless network?
Which protocol can include the device hostname in its request?
Which protocol can include the device hostname in its request?
What is a primary reason for enumerating wireless client information?
What is a primary reason for enumerating wireless client information?
What does stealth physical recon emphasize during a wireless reconnaissance?
What does stealth physical recon emphasize during a wireless reconnaissance?
What might indicate the organization responsible for a client device?
What might indicate the organization responsible for a client device?
Which type of data can DNS automatically query for?
Which type of data can DNS automatically query for?
What concept is beneficial when conducting stealth physical recon?
What concept is beneficial when conducting stealth physical recon?
What information can be revealed by the NetBIOS broadcast?
What information can be revealed by the NetBIOS broadcast?
WEP networks are used for Wired Equivalent Privacy.
WEP networks are used for Wired Equivalent Privacy.
Kismet and airodump can only log to PCAP files.
Kismet and airodump can only log to PCAP files.
The OUI of a MAC address consists of the last six hexadecimal digits.
The OUI of a MAC address consists of the last six hexadecimal digits.
Captured packets can provide helpful information about observed packets.
Captured packets can provide helpful information about observed packets.
The aireplay-ng command is used for logging packet information.
The aireplay-ng command is used for logging packet information.
Public areas like coffee shops are suitable locations for stealth recon operations.
Public areas like coffee shops are suitable locations for stealth recon operations.
Wardriving can only be performed using a car.
Wardriving can only be performed using a car.
Cracking WEP is one of the identified major vulnerabilities for compromising a target network.
Cracking WEP is one of the identified major vulnerabilities for compromising a target network.
Changing the MAC address during active recon can hinder forensic investigations.
Changing the MAC address during active recon can hinder forensic investigations.
An extra battery is not a recommended component to include in a mailed device for recon.
An extra battery is not a recommended component to include in a mailed device for recon.
It is unnecessary to change your MAC address when conducting reconnaissance.
It is unnecessary to change your MAC address when conducting reconnaissance.
Active brute-forcing is a technique used to exploit wireless network vulnerabilities.
Active brute-forcing is a technique used to exploit wireless network vulnerabilities.
The command used to spoof a disassociation message includes the parameter –deauth=5.
The command used to spoof a disassociation message includes the parameter –deauth=5.
Client device information can only be enumerated when the wireless network is positively identified as belonging to a target organization.
Client device information can only be enumerated when the wireless network is positively identified as belonging to a target organization.
During wireless recon, it's possible to capture packets that help to indicate ownership of a client device.
During wireless recon, it's possible to capture packets that help to indicate ownership of a client device.
The DHCP protocol is unlikely to include any device hostname information.
The DHCP protocol is unlikely to include any device hostname information.
Stealth physical recon emphasizes maintaining a low profile during wireless reconnaissance operations.
Stealth physical recon emphasizes maintaining a low profile during wireless reconnaissance operations.
The concept of KISS in stealth physical recon stands for 'Keep It Simple and Secure.'
The concept of KISS in stealth physical recon stands for 'Keep It Simple and Secure.'
NetBIOS broadcasts can reveal the domain name of a client device.
NetBIOS broadcasts can reveal the domain name of a client device.
Social engineering concepts are not applicable during stealth physical reconnaissance.
Social engineering concepts are not applicable during stealth physical reconnaissance.
What basic information is contained in the PCAP files logged by Kismet and airodump?
What basic information is contained in the PCAP files logged by Kismet and airodump?
Which of the following is indicated by the presence of a network probe for YURICH_HOME in relation to employee Tom Yurich?
Which of the following is indicated by the presence of a network probe for YURICH_HOME in relation to employee Tom Yurich?
What does the OUI of a MAC address signify?
What does the OUI of a MAC address signify?
What additional activity might be necessary when identifying cloaked networks?
What additional activity might be necessary when identifying cloaked networks?
Which types of data can both Kismet and airodump log apart from PCAP files?
Which types of data can both Kismet and airodump log apart from PCAP files?
What is a key consideration when conducting stealth recon in public areas?
What is a key consideration when conducting stealth recon in public areas?
Which method can be used to ensure anonymity during a wireless attack?
Which method can be used to ensure anonymity during a wireless attack?
What is a common vulnerability found in wireless networks that can be exploited?
What is a common vulnerability found in wireless networks that can be exploited?
What device might be mailed to a target organization to aid in remote reconnaissance?
What device might be mailed to a target organization to aid in remote reconnaissance?
What is a potential consequence of changing your MAC address to a digit different from the target MAC address?
What is a potential consequence of changing your MAC address to a digit different from the target MAC address?
In preparing for an active wireless attack, what is essential before changing the MAC address?
In preparing for an active wireless attack, what is essential before changing the MAC address?
What is an appropriate strategy for conducting wardriving effectively?
What is an appropriate strategy for conducting wardriving effectively?
What effect does spoofing a disassociation message have on the client device?
What effect does spoofing a disassociation message have on the client device?
Which of the following statements about client device enumeration is true?
Which of the following statements about client device enumeration is true?
Which protocol can potentially reveal the hostname of a device during enumeration?
Which protocol can potentially reveal the hostname of a device during enumeration?
What is a key consideration to maintain during stealth physical recon?
What is a key consideration to maintain during stealth physical recon?
Which of the following is a correct statement regarding the use of NetBIOS broadcasts?
Which of the following is a correct statement regarding the use of NetBIOS broadcasts?
What aspect of the KISS strategy is critical for stealth physical recon?
What aspect of the KISS strategy is critical for stealth physical recon?
Why is it beneficial to capture packets during wireless network recon?
Why is it beneficial to capture packets during wireless network recon?
What is a potential outcome of incorrectly executing a command to spoof a disassociation message?
What is a potential outcome of incorrectly executing a command to spoof a disassociation message?
Both Kismet and airodump can log data in XML format by default.
Both Kismet and airodump can log data in XML format by default.
The OUI of a MAC address consists of the last six hexadecimal digits uniquely assigned to every manufacturer.
The OUI of a MAC address consists of the last six hexadecimal digits uniquely assigned to every manufacturer.
Captured packets can only reveal basic information about a wireless network.
Captured packets can only reveal basic information about a wireless network.
Probing clients can indicate which clients might belong to the target organization.
Probing clients can indicate which clients might belong to the target organization.
It is beneficial to perform a detailed analysis of client devices in addition to reviewing PCAP files.
It is beneficial to perform a detailed analysis of client devices in addition to reviewing PCAP files.
The aireplay-ng command can be used to mimic a legitimate disassociation message.
The aireplay-ng command can be used to mimic a legitimate disassociation message.
When enumerating wireless client information, protocols like DNS and HTTP can provide identity details.
When enumerating wireless client information, protocols like DNS and HTTP can provide identity details.
Stealth physical recon requires the operator to maintain a high presence in the environment.
Stealth physical recon requires the operator to maintain a high presence in the environment.
The DHCP protocol is known to commonly include device hostname information in its requests.
The DHCP protocol is known to commonly include device hostname information in its requests.
Social engineering concepts are irrelevant to the practice of stealth physical recon.
Social engineering concepts are irrelevant to the practice of stealth physical recon.
The NetBIOS protocol can reveal the hostname of a client device via broadcast.
The NetBIOS protocol can reveal the hostname of a client device via broadcast.
Captured packets during wireless recon are only useful after identifying the target organization.
Captured packets during wireless recon are only useful after identifying the target organization.
The practice of KISS in stealth recon focuses on keeping operations straightforward and undetectable.
The practice of KISS in stealth recon focuses on keeping operations straightforward and undetectable.
Aerial drones are commonly used by government agencies for surveillance.
Aerial drones are commonly used by government agencies for surveillance.
Changing the MAC address of a device is unnecessary when conducting wireless reconnaissance.
Changing the MAC address of a device is unnecessary when conducting wireless reconnaissance.
Wardriving can be performed using any type of transportation.
Wardriving can be performed using any type of transportation.
Cracking WEP is one of the vulnerabilities that can be exploited in an active wireless attack.
Cracking WEP is one of the vulnerabilities that can be exploited in an active wireless attack.
Mailing a device to a target organization is not a recommended method for reconnaissance.
Mailing a device to a target organization is not a recommended method for reconnaissance.
The command 'ifconfig wlan0 down hw either 22;44:66:11:22:23' is used to change the MAC address in Linux.
The command 'ifconfig wlan0 down hw either 22;44:66:11:22:23' is used to change the MAC address in Linux.
Maintaining anonymity and stealth is essential during stealth recon operations.
Maintaining anonymity and stealth is essential during stealth recon operations.
The aireplay-ng command is utilized to force the association process by spoofing a disassociation message.
The aireplay-ng command is utilized to force the association process by spoofing a disassociation message.
Kismet and airodump are capable of logging only to binary file formats.
Kismet and airodump are capable of logging only to binary file formats.
The first six hexadecimal digits of a MAC address represent the OUI assigned to the device manufacturer.
The first six hexadecimal digits of a MAC address represent the OUI assigned to the device manufacturer.
Probed networks do not provide any useful information about the owners of client devices.
Probed networks do not provide any useful information about the owners of client devices.
Captured packets include timestamps related to specific clients or networks being observed.
Captured packets include timestamps related to specific clients or networks being observed.
Using an aerial drone for surveillance is commonly adopted by various government agencies.
Using an aerial drone for surveillance is commonly adopted by various government agencies.
Wardriving is exclusively performed while using a car.
Wardriving is exclusively performed while using a car.
MAC address spoofing can confuse forensic investigations into wireless activities.
MAC address spoofing can confuse forensic investigations into wireless activities.
Active brute-forcing targets the encryption method used in Wi-Fi Protected Setup.
Active brute-forcing targets the encryption method used in Wi-Fi Protected Setup.
The only method to maintain anonymity while attacking a wireless network is by changing the MAC address.
The only method to maintain anonymity while attacking a wireless network is by changing the MAC address.
Cracking WEP is mentioned as one of the significant vulnerabilities in wireless networks.
Cracking WEP is mentioned as one of the significant vulnerabilities in wireless networks.
Public and common areas are ideal locations for setting up stealth recon operations because of the high traffic and anonymity they provide.
Public and common areas are ideal locations for setting up stealth recon operations because of the high traffic and anonymity they provide.
The aireplay-ng command used for spoofing disassociation messages uses the parameter –deauth=10.
The aireplay-ng command used for spoofing disassociation messages uses the parameter –deauth=10.
Captured packets during wireless recon can sometimes reveal the device operating system type.
Captured packets during wireless recon can sometimes reveal the device operating system type.
Stealth physical recon requires strict adherence to a complex set of strategies.
Stealth physical recon requires strict adherence to a complex set of strategies.
NetBIOS broadcasts are unlikely to provide useful information about a client device's hostname.
NetBIOS broadcasts are unlikely to provide useful information about a client device's hostname.
Utilizing DHCP requests can help identify the hardware manufacturer of a client device.
Utilizing DHCP requests can help identify the hardware manufacturer of a client device.
All wireless networks positively identified as belonging to a target organization are guaranteed to be vulnerable.
All wireless networks positively identified as belonging to a target organization are guaranteed to be vulnerable.
Acting congruently with your story is not relevant in social engineering for stealth recon.
Acting congruently with your story is not relevant in social engineering for stealth recon.
Kismet and airodump are capable of logging multiple types of information beyond just packet data.
Kismet and airodump are capable of logging multiple types of information beyond just packet data.
What specific information about clients can be inferred from probe requests during remote targeting?
What specific information about clients can be inferred from probe requests during remote targeting?
In the context of wireless reconnaissance, what does the term OUI refer to?
In the context of wireless reconnaissance, what does the term OUI refer to?
What is an important purpose of logging to XML files via Kismet and airodump?
What is an important purpose of logging to XML files via Kismet and airodump?
Why might some client devices not probe for other networks while connected?
Why might some client devices not probe for other networks while connected?
What can the aireplay-ng command specifically achieve in wireless reconnaissance?
What can the aireplay-ng command specifically achieve in wireless reconnaissance?
What is a primary component of maintaining anonymity while performing active wireless reconnaissance?
What is a primary component of maintaining anonymity while performing active wireless reconnaissance?
Which of the following is a method for performing reconnaissance without physically being present?
Which of the following is a method for performing reconnaissance without physically being present?
What should be considered when selecting a public location for stealth recon operations?
What should be considered when selecting a public location for stealth recon operations?
Which technique is specifically designed for conducting attacks on wireless networks?
Which technique is specifically designed for conducting attacks on wireless networks?
What is the consequence of leaving your laptop running in a secluded location during recon?
What is the consequence of leaving your laptop running in a secluded location during recon?
In the context of wireless attacks, what does changing the last digit of a MAC address accomplish?
In the context of wireless attacks, what does changing the last digit of a MAC address accomplish?
Which of these vulnerabilities is notably targeted during wireless network attacks?
Which of these vulnerabilities is notably targeted during wireless network attacks?
What are the potential implications of spoofing a disassociation message from a client's perspective?
What are the potential implications of spoofing a disassociation message from a client's perspective?
Why is it vital to enumerate wireless client information before proceeding with an attack?
Why is it vital to enumerate wireless client information before proceeding with an attack?
Which protocol can provide crucial information about the domain name of a client device being probed?
Which protocol can provide crucial information about the domain name of a client device being probed?
What is a core strategy emphasized in stealth physical recon operations?
What is a core strategy emphasized in stealth physical recon operations?
Which of the following statements regarding DHCP packets is true during wireless reconnaissance?
Which of the following statements regarding DHCP packets is true during wireless reconnaissance?
What is one reason to capture packets during wireless network reconnaissance?
What is one reason to capture packets during wireless network reconnaissance?
What principle does the APT strategy 'KISS' stand for during stealth physical reconnaissance?
What principle does the APT strategy 'KISS' stand for during stealth physical reconnaissance?
In the context of wireless client attacks, what does enumerating client information primarily assist with?
In the context of wireless client attacks, what does enumerating client information primarily assist with?
Flashcards
Wireless Network Recon Tools
Wireless Network Recon Tools
Tools like Kismet and airodump are used to collect data about wireless networks, including WEP, WPA-PSK, WPA-Enterprise, and captured packets.
PCAP Files
PCAP Files
Kismet and airodump create PCAP files that contain network packet data in Wireshark readable format.
Client Device Analysis
Client Device Analysis
Analyzing client device data like BSSID, associated clients, probed networks helps identify target organization's assets.
OUI of MAC Address
OUI of MAC Address
Signup and view all the flashcards
Target Network Identification
Target Network Identification
Signup and view all the flashcards
Wireless Spoofing
Wireless Spoofing
Signup and view all the flashcards
Client Enumeration
Client Enumeration
Signup and view all the flashcards
DHCP Protocol
DHCP Protocol
Signup and view all the flashcards
NetBIOS Protocol
NetBIOS Protocol
Signup and view all the flashcards
HTTP Protocol
HTTP Protocol
Signup and view all the flashcards
DNS Protocol
DNS Protocol
Signup and view all the flashcards
Stealth Physical Recon
Stealth Physical Recon
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Aerial Drones
Aerial Drones
Signup and view all the flashcards
Wardriving
Wardriving
Signup and view all the flashcards
Wireless Vulnerabilities
Wireless Vulnerabilities
Signup and view all the flashcards
MAC address Spoofing
MAC address Spoofing
Signup and view all the flashcards
WEP Cracking
WEP Cracking
Signup and view all the flashcards
Brute-forcing Wireless Networks
Brute-forcing Wireless Networks
Signup and view all the flashcards
What are PCAP files used for?
What are PCAP files used for?
Signup and view all the flashcards
What is the significance of the BSSID?
What is the significance of the BSSID?
Signup and view all the flashcards
What information does a probed network disclose?
What information does a probed network disclose?
Signup and view all the flashcards
What is the OUI and how is it beneficial?
What is the OUI and how is it beneficial?
Signup and view all the flashcards
How can we force a client to disassociate?
How can we force a client to disassociate?
Signup and view all the flashcards
De-authentication Spoofing
De-authentication Spoofing
Signup and view all the flashcards
Wireless Recon Objectives
Wireless Recon Objectives
Signup and view all the flashcards
Client Information Enumeration
Client Information Enumeration
Signup and view all the flashcards
Protocols for Client Info
Protocols for Client Info
Signup and view all the flashcards
KISS Principle
KISS Principle
Signup and view all the flashcards
Congruent Story
Congruent Story
Signup and view all the flashcards
Physical Infiltration
Physical Infiltration
Signup and view all the flashcards
Active Wireless Attack
Active Wireless Attack
Signup and view all the flashcards
Cracking WEP
Cracking WEP
Signup and view all the flashcards
WPA Preshared Key Brute-Forcing
WPA Preshared Key Brute-Forcing
Signup and view all the flashcards
WiFi Protected Setup (WPS) Brute-Forcing
WiFi Protected Setup (WPS) Brute-Forcing
Signup and view all the flashcards
What is a BSSID?
What is a BSSID?
Signup and view all the flashcards
What information can be derived from probing networks?
What information can be derived from probing networks?
Signup and view all the flashcards
What is an OUI?
What is an OUI?
Signup and view all the flashcards
Why change your MAC address during an Active Wireless Attack?
Why change your MAC address during an Active Wireless Attack?
Signup and view all the flashcards
Brute-forcing WPA Preshared Keys
Brute-forcing WPA Preshared Keys
Signup and view all the flashcards
Wireless Network Recon
Wireless Network Recon
Signup and view all the flashcards
KISS Principle in Recon
KISS Principle in Recon
Signup and view all the flashcards
DHCP in Recon
DHCP in Recon
Signup and view all the flashcards
What is a PCAP file?
What is a PCAP file?
Signup and view all the flashcards
What does probing a network reveal?
What does probing a network reveal?
Signup and view all the flashcards
How can you force a client to disassociate from a network?
How can you force a client to disassociate from a network?
Signup and view all the flashcards
Why is MAC address spoofing useful?
Why is MAC address spoofing useful?
Signup and view all the flashcards
Spoofing Deauth Message
Spoofing Deauth Message
Signup and view all the flashcards
Enumerating Client Info
Enumerating Client Info
Signup and view all the flashcards
DHCP for Client Info
DHCP for Client Info
Signup and view all the flashcards
NetBIOS for Client Info
NetBIOS for Client Info
Signup and view all the flashcards
Congruent Story in Recon
Congruent Story in Recon
Signup and view all the flashcards
Stealth Recon Locations
Stealth Recon Locations
Signup and view all the flashcards
Aerial Drones for Recon
Aerial Drones for Recon
Signup and view all the flashcards
WPA Key Brute-forcing
WPA Key Brute-forcing
Signup and view all the flashcards
What information does probing a network reveal?
What information does probing a network reveal?
Signup and view all the flashcards
What is an OUI and why is it important?
What is an OUI and why is it important?
Signup and view all the flashcards
Deauth Spoofing
Deauth Spoofing
Signup and view all the flashcards
Changing MAC Address
Changing MAC Address
Signup and view all the flashcards
What are PCAP files?
What are PCAP files?
Signup and view all the flashcards
Probing a network: What's revealed?
Probing a network: What's revealed?
Signup and view all the flashcards
Spoofing a deauth message: What's its impact?
Spoofing a deauth message: What's its impact?
Signup and view all the flashcards
NetBIOS in Recon
NetBIOS in Recon
Signup and view all the flashcards
Active Brute-forcing of WiFi Protected Setup
Active Brute-forcing of WiFi Protected Setup
Signup and view all the flashcards
Study Notes
Chapter 7: Phase III: Remote Targeting, Part Two
- This chapter details remote targeting in Phase III.
- Active Wireless Recon II involves reviewing data for useful information after initial setup.
Active wireless Recon II
- Review collected data for interesting and useful information.
- Focus on:
- WEP (Wired Equivalent Privacy) networks
- WPA-PSK (WPA Pre-Shared Key Mode) networks
- WPA-Enterprise (WPA Enterprise Mode) networks
- Captured packets
- Associated clients
Active Wireless Recon II (cont.)
- Kismet and airodump can log PCAP files for analysis using Wireshark.
- Review client device information beyond PCAP files.
- Basic information from PCAP files includes:
- BSSID (Basic Service Set Identifier)
- Client devices
- Associated clients
- Probing clients
- Channels
Active Wireless Recon II (cont.)
- Other collected data includes:
- Times specific clients or networks were first and last seen
- Total number of packets from each device
- Information about observed packets
- Wireless networks probed by client devices
Active Wireless Recon II (cont.)
- Probed networks may indicate client device ownership.
- Examples include:
- Identifying an employee to correlate a probe for a known network.
- Discovering networks with SSID related to the target organization.
- Identifying networks with recognizable patterns.
Active Wireless Recon II (cont.)
-
Organization Unique Identifier (OUI) of a MAC address is the first six hexadecimal digits.
-
OUIs are assigned to network equipment manufacturers.
-
Identify cloaked networks to enumerate SSIDs.
-
Force association by spoofing a disassociation message using the
aireplay-ng
command.
Enumerate Client Info
- After initial wireless reconnaissance, shift focus to enumerating wireless client information, assessing vulnerabilities.
- Determine networks not positively associated with any particular company.
- Confirm if all identified networks belong to the target organization and are not vulnerable to direct exploitation.
Enumerate Client Info (cont.)
- Key protocols:
- DHCP (Dynamic Host Configuration Protocol).
- NetBIOS.
- HTTP (Hypertext Transfer Protocol).
- DNS (Domain Name System).
Stealth Physical Recon
-
This phase shifts reconnaissance to physical locations.
-
Maintaining stealth and anonymity is paramount.
-
Good locations include:
- Public areas like coffee shops, libraries, or hotels.
- Buildings with areas for laptops.
-
Avoid obvious tactics for physical infiltration.
-
Consider social engineering concepts and acting congruently with your story.
-
Utilizing tools like drones or sending devices to the target organization are also options.
Active Wireless Attacks
- Identify potential vulnerabilities in target networks for exploitation.
- Examples include:
- Cracking WEP
- Off-line brute-forcing WPA preshared keys
- Active brute-forcing of WiFi protected setup
- Wireless vendor vulnerabilities
Active Wireless Attacks (cont.)
- Changing MAC addresses from Linux terminal is needed for active attacks.
- Commands to accomplish this include:
ifconfig wlan0 down
ifconfig wlan0 down hw either 22;44:66:11:22:23
ifconfig wlan0 up
Active Wireless Attacks (cont.)
- Do not use the same card for active recon or attack if it uniquely belongs to the network.
Web Cracking
-
WEP cracking relies on collecting a certain amount of packets (2,000-200,000) to deduce the key.
-
Fastest cracking using an active method takes about 15 minutes using ~20,000 packets.
-
Use
airodump
for packet capture. -
Use
aireplay-ng
command for faster capture.
Web Cracking (cont.)
-
Put interface into monitor mode using
airmon-ng
command. -
Use
airodump-ng
to configure and specify desired parameters -
Use
airodump-ng
to capture packets for target network. -
Capture and analyze packet data using
airodump-ng
. -
Use
airock-ng
to crack the WEP key.
WPA Preshared Key Cracking
- Offline brute-force is the only effective method for WPA-PSK (Wired Equivalent Privacy).
- Capturing the four-way authentication handshake is necessary.
- Many modern devices use strong, randomly generated WPA preshared keys.
- Using
airmon-ng
andaircrack-ng
in a similar way to WEP cracking. - Capture the necessary data and then use
aircrack-ng
with wordlist. - Disconnecting a client for analysis of spoofed disassociation messages
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.