How to Hack Wi-Fi (PDF)
Document Details
Uploaded by ConstructiveCarnelian4014
Cagayan State University
Tags
Summary
This document provides an overview of Wi-Fi hacking techniques, including different types of wireless networks, authentication methods, and tools for cracking passwords. It also outlines security measures to protect networks from attacks.
Full Transcript
# How To Hack Wi-Fi Network ## Group 2 - BSIT - 3G ## Contents - What is a wireless network? - How to access wireless network? - Wireless Network Authentication - WPA - WPE - WPA and WPE Cracking Tools - General attack types - Cracking Wireless Network - WPE - WPA - Wireless Netw...
# How To Hack Wi-Fi Network ## Group 2 - BSIT - 3G ## Contents - What is a wireless network? - How to access wireless network? - Wireless Network Authentication - WPA - WPE - WPA and WPE Cracking Tools - General attack types - Cracking Wireless Network - WPE - WPA - Wireless Network Security ## What Is a Wireless Network? A wireless network is a communication system that enables devices to connect and communicate without physical cables. This technology is based on the transmission of data through radio waves, allowing for mobility and flexibility. ## Key Components of Wireless Networks - Access Points (APs) - Routers - Clients ## Types of Wireless Networks - Wi-Fi Networks - Bluetooth Networks - Cellular Networks ## How to Access a Wireless Network? Accessing a wireless network involves several straightforward steps: 1. Check Device Compatibility 2. Open Wi-Fi Settings 3. Scan for Networks 4. Select the Network 5. Enter Credentials 6. Connect ## Troubleshooting Connection Issues - Ensure that Wi-Fi is enabled on your device. - Move closer to the router if you experience a weak signal. - Restart your device or router if you cannot connect. ## Authentication Wireless networks utilize various authentication methods to secure connections: ### WPA (Wi-Fi Protected Access) - **Security Features** - WPA uses TKIP (Temporal Key Integrity Protocol) for encryption, which dynamically changes keys as data is transmitted. - WPA2 enhances security further by using AES (Advanced Encryption Standard), which is more robust against attacks. ## Wireless Network Authentication Wireless networks utilize various authentication methods to secure connections: ### WPA (Wi-Fi Protected Access) - **WPA3 Improvements:** - Introduces Simultaneous Authentication of Equals (SAE), which provides better protection against brute-force attacks. - Offers improved encryption for open networks through Opportunistic Wireless Encryption (OWE). ## Wireless Network Authentication Wireless networks utilize various authentication methods to secure connections: ### WEP (Wired Equivalent Privacy) - **Weaknesses:** - WEP uses static keys, making it susceptible to attacks such as packet sniffing and replay attacks. - Tools like Aircrack-ng can exploit these weaknesses by capturing enough packets over time. - **Current Status:** - Due to its vulnerabilities, WEP is considered obsolete. Most modern devices no longer support it. ## Cracking Tools ### Aircrack-ng **Purpose**: A suite of tools for auditing wireless networks. **Features**: - Can be used for WEP and WPA/WPA2-PSK cracking. - Performs packet capture, packet injection, and more. - Available for Linux and Windows. **Cracking Methods**: - For WEP: Aircrack-ng can crack WEP encryption by collecting enough IV (Initialization Vector) packets. - For WPA/WPA2: It uses a dictionary or brute-force attack after capturing the 4-way handshake. ### Kismet **Purpose**: Cracks WPA/WPA2 by exploiting the WPS (Wi-Fi Protected Setup) vulnerability. **Features**: - Attacks the WPS pin to retrieve WPA/WPA2 passphrases. - Only works on routers with WPS enabled. **Attack Method**: - It tries different WPS PINs until it finds the correct one to extract the WPA/WPA2 key. ## General Attack Types ### Eavesdropping Attackers intercept data transmitted over the network using packet sniffers like Wireshark. ### Rogue Access Points Unauthorized access points set up by attackers can trick users into connecting. ### Man-in-the-Middle Attacks (MitM) Attackers position themselves between two communicating parties to intercept or alter communications without detection. ## Cracking Wireless Networks ### WEP **Cracking Methodology:** Attackers collect packets over time using tools like Aircrack-ng. ### WPA **Cracking Methodology:** If an attacker captures a handshake during authentication, they can use pre-computed lists of passwords (dictionaries). ### Brute Force Attacks Attackers may try every possible combination until they find the correct password if they have sufficient time. ## Wireless Network Security 1. Use WPA3 Encryption 2. Change Default Credentials 3. Disable WPS (Wi-Fi Protected Setup) 4. Enable MAC Address Filtering 5. Regularly Update Firmware 6. Use a Strong Password 7. Monitor Connected Devices 8. Consider a Guest Network 9. Implement Network Segmentation 10. Use VPNs for Remote Access