Podcast
Questions and Answers
What types of networks should be reviewed when analyzing data during Phase III of Remote Targeting?
What types of networks should be reviewed when analyzing data during Phase III of Remote Targeting?
Which file formats can Kismet and airodump log data into for further analysis?
Which file formats can Kismet and airodump log data into for further analysis?
What information can be derived from the probing clients feature during wireless reconnaissance?
What information can be derived from the probing clients feature during wireless reconnaissance?
What does the OUI of a MAC address signify in wireless reconnaissance?
What does the OUI of a MAC address signify in wireless reconnaissance?
Signup and view all the answers
What action can be taken to potentially identify cloaked networks during analysis?
What action can be taken to potentially identify cloaked networks during analysis?
Signup and view all the answers
What is a key consideration when selecting a location for stealth physical reconnaissance?
What is a key consideration when selecting a location for stealth physical reconnaissance?
Signup and view all the answers
Which of the following methods can be used for wireless recon targeting vulnerabilities?
Which of the following methods can be used for wireless recon targeting vulnerabilities?
Signup and view all the answers
What technique can be employed to maintain anonymity in an active wireless attack?
What technique can be employed to maintain anonymity in an active wireless attack?
Signup and view all the answers
During wardriving, what should a person be aware of regarding their surroundings?
During wardriving, what should a person be aware of regarding their surroundings?
Signup and view all the answers
What is the purpose of using devices like phones or tablets in a stealth physical recon?
What is the purpose of using devices like phones or tablets in a stealth physical recon?
Signup and view all the answers
What is the correct method to change a MAC address using a Linux terminal?
What is the correct method to change a MAC address using a Linux terminal?
Signup and view all the answers
Which strategy can be implemented to interfere with forensic investigations in wireless activities?
Which strategy can be implemented to interfere with forensic investigations in wireless activities?
Signup and view all the answers
What is the purpose of the aireplay-ng command exemplified in the message spoofing?
What is the purpose of the aireplay-ng command exemplified in the message spoofing?
Signup and view all the answers
Why is it essential to enumerate client info after wireless recon?
Why is it essential to enumerate client info after wireless recon?
Signup and view all the answers
Which protocol is NOT mentioned as potentially revealing client device information?
Which protocol is NOT mentioned as potentially revealing client device information?
Signup and view all the answers
What foundational strategy should one adhere to during stealth physical reconnaissance?
What foundational strategy should one adhere to during stealth physical reconnaissance?
Signup and view all the answers
In which situation would it be necessary to perform client enumeration?
In which situation would it be necessary to perform client enumeration?
Signup and view all the answers
What critical information might a DHCP request reveal?
What critical information might a DHCP request reveal?
Signup and view all the answers
Which element is emphasized as part of effective stealth during physical recon?
Which element is emphasized as part of effective stealth during physical recon?
Signup and view all the answers
What is the primary advantage of capturing packets during wireless recon?
What is the primary advantage of capturing packets during wireless recon?
Signup and view all the answers
The OUI of a MAC address consists of the first six decimal digits.
The OUI of a MAC address consists of the first six decimal digits.
Signup and view all the answers
Both Kismet and airodump are capable of logging data to PCAP files for analysis.
Both Kismet and airodump are capable of logging data to PCAP files for analysis.
Signup and view all the answers
Any client device will always probe for other configured networks while connected to a single network.
Any client device will always probe for other configured networks while connected to a single network.
Signup and view all the answers
Spoofing a disassociation message can aid in identifying cloaked networks during wireless reconnaissance.
Spoofing a disassociation message can aid in identifying cloaked networks during wireless reconnaissance.
Signup and view all the answers
A captured packet log will often contain the total number of packets sent from each device.
A captured packet log will often contain the total number of packets sent from each device.
Signup and view all the answers
The aireplay-ng command can be used to send a disassociation message that appears legitimate to the client device.
The aireplay-ng command can be used to send a disassociation message that appears legitimate to the client device.
Signup and view all the answers
The NetBIOS protocol can only reveal the internet protocol address of the client device.
The NetBIOS protocol can only reveal the internet protocol address of the client device.
Signup and view all the answers
Performing wireless reconnaissance does not require any physical presence.
Performing wireless reconnaissance does not require any physical presence.
Signup and view all the answers
Capturing packets during wireless network recon can assist in identifying the ownership of client devices.
Capturing packets during wireless network recon can assist in identifying the ownership of client devices.
Signup and view all the answers
The DHCP protocol does not provide any device-specific information.
The DHCP protocol does not provide any device-specific information.
Signup and view all the answers
To maintain anonymity during wireless attacks, it is crucial to adhere to the APT strategy of KISS.
To maintain anonymity during wireless attacks, it is crucial to adhere to the APT strategy of KISS.
Signup and view all the answers
Social engineering techniques have no relevance in the context of wireless reconnaissance.
Social engineering techniques have no relevance in the context of wireless reconnaissance.
Signup and view all the answers
Client device information can also be derived from HTTP requests which may show server names in cleartext.
Client device information can also be derived from HTTP requests which may show server names in cleartext.
Signup and view all the answers
Aerial drones are commonly utilized by private individuals for stealth physical reconnaissance.
Aerial drones are commonly utilized by private individuals for stealth physical reconnaissance.
Signup and view all the answers
Cracking WEP is one of the major vulnerabilities targeted during active wireless attacks.
Cracking WEP is one of the major vulnerabilities targeted during active wireless attacks.
Signup and view all the answers
Changing your MAC address is a complex process that cannot be done from a Linux terminal.
Changing your MAC address is a complex process that cannot be done from a Linux terminal.
Signup and view all the answers
Wardriving can only be conducted from a parked vehicle.
Wardriving can only be conducted from a parked vehicle.
Signup and view all the answers
It is recommended to set your MAC address to match exactly one of the valid client MAC addresses during active recon.
It is recommended to set your MAC address to match exactly one of the valid client MAC addresses during active recon.
Signup and view all the answers
Multiple wireless vendor vulnerabilities are not significant in identifying weaknesses within wireless networks.
Multiple wireless vendor vulnerabilities are not significant in identifying weaknesses within wireless networks.
Signup and view all the answers
To maintain anonymity during wireless activities, using a MAC address differing by only one digit is an effective strategy.
To maintain anonymity during wireless activities, using a MAC address differing by only one digit is an effective strategy.
Signup and view all the answers
Flashcards
Wireless Network Data Analysis
Wireless Network Data Analysis
Reviewing WEP, WPA-PSK, WPA-Enterprise networks, captured packets, associated clients, and client device information.
PCAP Files
PCAP Files
Files that contain captured network packets, providing basic information like BSSID, client and associated clients.
Target Organization Connection
Target Organization Connection
Using client device probe requests to identify potential connections with the target organization by checking probed SSID and client's MAC OUI.
OUI of MAC Address
OUI of MAC Address
Signup and view all the flashcards
Spoofing Disassociation
Spoofing Disassociation
Signup and view all the flashcards
Physical Reconnaissance Locations
Physical Reconnaissance Locations
Signup and view all the flashcards
Wardriving
Wardriving
Signup and view all the flashcards
Stealth Physical Reconnaissance
Stealth Physical Reconnaissance
Signup and view all the flashcards
MAC Address Spoofing
MAC Address Spoofing
Signup and view all the flashcards
Wireless Attack Vulnerability
Wireless Attack Vulnerability
Signup and view all the flashcards
Offline Brute-Forcing
Offline Brute-Forcing
Signup and view all the flashcards
Wireless Vendor Vulnerabilities
Wireless Vendor Vulnerabilities
Signup and view all the flashcards
Wireless Spoofing
Wireless Spoofing
Signup and view all the flashcards
Client Enumeration
Client Enumeration
Signup and view all the flashcards
DHCP
DHCP
Signup and view all the flashcards
NetBIOS
NetBIOS
Signup and view all the flashcards
HTTP Requests
HTTP Requests
Signup and view all the flashcards
DNS Queries
DNS Queries
Signup and view all the flashcards
Stealth Wireless Recon
Stealth Wireless Recon
Signup and view all the flashcards
Maintaining Stealth
Maintaining Stealth
Signup and view all the flashcards
Why review PCAP files?
Why review PCAP files?
Signup and view all the flashcards
Client Device Probing
Client Device Probing
Signup and view all the flashcards
What is the OUI?
What is the OUI?
Signup and view all the flashcards
Why enumerate SSIDs?
Why enumerate SSIDs?
Signup and view all the flashcards
DHCP in Wireless Recon
DHCP in Wireless Recon
Signup and view all the flashcards
NetBIOS in Wireless Recon
NetBIOS in Wireless Recon
Signup and view all the flashcards
HTTP Requests in Wireless Recon
HTTP Requests in Wireless Recon
Signup and view all the flashcards
DNS Queries in Wireless Recon
DNS Queries in Wireless Recon
Signup and view all the flashcards
Stealth Physical Recon
Stealth Physical Recon
Signup and view all the flashcards
KISS Principle in Physical Recon
KISS Principle in Physical Recon
Signup and view all the flashcards
Active Attack
Active Attack
Signup and view all the flashcards
Brute-forcing WPA Preshared Keys
Brute-forcing WPA Preshared Keys
Signup and view all the flashcards
Active Brute-forcing WiFi Protected Setup (WPS)
Active Brute-forcing WiFi Protected Setup (WPS)
Signup and view all the flashcards
Multiple Wireless Vendor Vulnerabilities
Multiple Wireless Vendor Vulnerabilities
Signup and view all the flashcards
Study Notes
Phase III: Remote Targeting - Part Two
- This phase involves reviewing data from reconnaissance for useful information.
- Wireless networks are categorized by their security protocol:
- WEP (Wired Equivalent Privacy)
- WPA-PSK (WPA Pre-Shared Key Mode)
- WPA-Enterprise (WPA Enterprise Mode)
- Captured packets and associated clients are also examined.
- Tools like Kismet and airodump log PCAP files for analysis using Wireshark.
- PCAP files provide basic information, including:
- BSSID (Basic Service Set Identifier)
- Client devices
- Associated clients
- Probing clients
- Channels
- Tools log additional data, including:
- Timestamps of client and network activity
- Packet counts from each device
- Packets observed
- Wireless networks probed by a client device
- This information helps identify potential target organization clients.
- Probed networks may indicate client ownership.
- If a probe for a known employee's network is seen, it may suggest the owner.
- Not all clients probe all networks.
- SSID (Service Set Identifier) information can be helpful in identifying the target organization.
- OUI (Organizationally Unique Identifier) of the MAC address's BSSID is recorded.
- OUI is the first six hexadecimal digits assigned to network equipment manufacturers for identification.
- Cloaked networks require enumeration efforts.
- Spoofing disassociation messages forces association process enumeration using
aireplay-ng
.
Active Recon II
- Changing MAC addresses is necessary for active attacks.
- The command format for MAC address change in a Linux terminal is:
ifconfig wlan0 down
, followed byifconfig wlan0 down hw ether <MAC address>
, and ending withifconfig wlan0 up
. - Example usage for MAC address to
22:44:66:11:22:23
:root@kali:~# ifconfig wlan0 down
root@kali:~# ifconfig wlan0 down hw ether 22:44:66:11:22:23
root@kali:~# ifconfig wlan0 up
- Use of a different card is recommended if possible.
Active Wireless Attacks
- Major vulnerabilities in wireless networks include:
- WEP cracking
- Offline brute-forcing of WPA pre-shared keys
- Active brute-forcing of WiFi Protected Setup
- Multiple wireless vendor vulnerabilities
- MAC address changes are important for active attacks.
- Spoofing a valid client MAC address helps evade detection; use a one-digit offset
Web Cracking
- WEP cracking relies on packet capture.
- Packet counts vary, typically between 2,000-200,000 packets.
- Passive methods to crack WEP might take 15+ minutes to crack, requiring about 20,000 packets.
- Airodump is a good tool for initial packet capture.
- The
airmon-ng
command is needed to put the network interface into monitor mode. - Example command format:
root@kali : ~# airmon-ng start wlan
.
WPA Preshared Key Cracking
- WPA-PSK vulnerabilities are often exploited by brute-forcing offline.
- Capturing four-way authentication handshakes between client and access point is critical.
- Default WPA pre-shared keys on residential access points are less secure.
airodump-ng
is used to monitor network traffic.- The command to capture traffic is typically shown as
airodump-ng -w <filename> -c <channel> -bssid <BSSID> mon0
for default. - If needed, spoofing disassociation messages can be used to force re-association.
- Create a wordlist using relevant information (company name, phone numbers, etc).
hashcat
can be utilized for cracking.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the critical aspects of Phase III in Remote Targeting, focusing on the review of reconnaissance data. This phase emphasizes understanding wireless network security protocols, analyzing captured packets, and the use of tools like Kismet and Wireshark for effective network analysis.