CIS 76 - Lesson 13: Rich's Lesson Module Checklist
CIS 76 - Lesson 13: Rich's Lesson Module Checklist
Flash cards
Properties
Page numbers
1st minute quiz
Web Calendar summary
Web book pages
Commands
Project published
1
CIS 76 - Lesson 13
Evading Network
TCP/IP
Devices
Cryptography Network and
Computer Attacks
Embedded Operating
Enumeration
Systems
Desktop and Server Scripting and
Vulnerabilities Programming
1. Browse to:
http://simms-teach.com
2. Click the CIS 76 link.
3. Click the Calendar link.
4. Locate today’s lesson.
5. Find the Presentation slides for
the lesson and download for
easier viewing.
6. Click the Enter virtual classroom
link to join CCC Confer.
7. Log into Opus-II with Putty or ssh
command.
4
CIS 76 - Lesson 13
3) Click OK button.
[ ] Is recording on?
Should change
Red dot means recording from phone
handset icon to
little Microphone
[ ] Use teleconferencing, not mic icon and the
Teleconferencing …
Should be grayed out message displayed
7
CIS 76 - Lesson 13
vSphere Client
putty
[ ] Video (webcam)
[ ] Make Video Follow Moderator Focus
9
CIS 76 - Lesson 13
Quite interesting
that they consider
you to be an
Elmo rotated down to view side table
"expert" in order to
use this button!
Rotate
image
button Elmo rotated up to view white board
Rotate
image
button
Control Panel (small icons) General Tab > Settings… 500MB cache size Delete these
11
CIS 76 - Lesson 13
Start
12
CIS 76 - Lesson 13
Sound Check
Students that dial-in should mute their line
using *6 to prevent unintended noises
distracting the web conference.
Volume
*4 - increase conference volume.
*7 - decrease conference volume.
*5 - increase your voice volume.
*8 - decrease your voice volume.
13
CIS 76 - Lesson 13
Email me ([email protected]) a relatively current photo of your face for 3 points extra credit
CIS 76 - Lesson 13
16
CIS 76 - Lesson 13
Admonition
17
Shared from cis76-newModules.pptx
CIS 76 - Lesson 13
Questions
19
CIS 76 - Lesson 13
Questions
How this course works?
Previous labs?
他問一個問題,五分鐘是個傻子,他不問一個問題仍然是一個
Chinese 傻瓜永遠。
Proverb He who asks a question is a fool for five minutes; he who does not ask a question
remains a fool forever.
20
CIS 76 - Lesson 13
Ryan Placeholder
21
CIS 76 - Lesson 13
In the
news
22
CIS 76 - Lesson 13
Older news
http://mashable.com/2016/11/21/fake-google-domain
27
CIS 76 - Lesson 13
Recent news
PoisonTap USB stick that installs backdoors on locked PCs and Macs
https://www.wired.com/2016/11/wickedly-clever-usb-stick-installs-backdoor-locked-
pcs/?mbid=social_twitter
http://arstechnica.com/security/2016/11/meet-poisontap-the-5-tool-that-ransacks-
password-protected-computers/
http://www.macrumors.com/2016/11/21/usb-device-hijacks-data-from-locked-macs/
• $5 Raspberry PI computer.
• Can be plugged into a locked or unlocked PC.
• Impersonates an Ethernet connection.
• Waits for a browser request then sends malicious code to the victim's browser cache.
• Created by Samy Kamkar who has released the schematics and code. 28
CIS 76 - Lesson 13
Older news
https://samy.pl/poisontap/ https://github.com/samyk/poisontap
29
CIS 76 - Lesson 13
Recent news
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER NOV. 12, 2017
https://www.nytimes.com/2017/11/12/us/nsa-
shadow-brokers.html
"Compounding the pain for the N.S.A. is the attackers’ regular online public taunts, written in
ersatz broken English. Their posts are a peculiar mash-up of immaturity and sophistication,
laced with profane jokes but also savvy cultural and political references. They suggest that
their author — if not an American — knows the United States well."
30
CIS 76 - Lesson 13
Older news
• Analyzing the radio signal can reveal private information using a malicious
Wi-Fi hotspot.
• They claim 81.7% snooping success once the system has enough training
samples.
• Relies on beam-forming technology that does not work with only one
antenna.
• They worked out how user hand movements affect the signal.
• They do not need to compromise the target.
• Published in the ACM as "When CFI meets public WiFi".
31
CIS 76 - Lesson 13
Recent news
"Another set of malicious apps has made it into the official Android app store.
Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these
apps form a new family of multi-stage Android malware, legitimate-looking and
with delayed onset of malicious activity."
32
CIS 76 - Lesson 13
Recent news
"Most people use Google to search for answers but don't know the results aren't always
safe. Attackers have begun to exploit this reliance on Google by using Search Engine
Optimization (SEO) to populate search results with malicious links and distribute the Zeus
Panda Banking Trojan through a compromised Word document."\
"This malware first queries the system's keyboard mapping to determine its language,
and terminates if it detects Russian, Belarusian, Kazak, or Ukrainian. Earlier analysis of
Zeus Panda also revealed it wouldn't run on systems in Russia, Ukraine, Belarus, or
Kazakhstan."
33
CIS 76 - Lesson 13
Recent news
ProPublica Newsletter
BY Julia Angwin August 2017
http://go.propublica.org/webmail/125411/1547
92457/ecdf767a701bd0622a1a989e0c25fb1491a
030779e2eecdb862fef7b6fb29017
"You write a provocative tweet and "After publishing a story about the tech
an army of Twitter bots heaps abuse providers that enable hate websites last
on you. You write a Facebook post weekend, my inbox was flooded with
commenting on a news item and it is notifications that I had been signed up for
reported as hateful and deleted by email newsletters and user accounts on
Facebook." random websites:"
34
CIS 76 - Lesson 13
Recent news
Hackers Shut Down ProPublica’s Email For a Day. Here’s How to
Stop Attacks Like That.
BY Julia Angwin November 13, 2017
https://www.propublica.org/article/hackers-
shut-down-propublicas-email-for-a-day-heres-
how-to-stop-attacks-like-that
"In August, my email was attacked. Hate groups overwhelmed my inbox and
the inboxes of two of my colleagues, and shut down ProPublica’s email much
of the day. (I wrote about this incident in a previous newsletter.)
4. If you have a WordPress site, you can turn off user registrations — if unneeded.
You can also install a CAPTCHA on your sign-up form. 35
CIS 76 - Lesson 13
Best
Practices
36
CIS 76 - Lesson 13
https://insights.sei.cmu.edu/sei_blog/2016/11/distributed-denial-of-
service-attacks-four-best-practices-for-prevention-and-response.html
37
CIS 76 - Lesson 13
https://krebsonsecurity.com/2017/11/simple-banking-security-tip-
verbal-passwords/
Final Project
39
CIS 76 - Lesson 13
CIS 76 Project
Calendar Page
https://simms-
teach.com/cis76calendar.php
https://simms-
teach.com/docs/cis76/cis76final-project.pdf
40
CIS 76 - Lesson 13
CIS 76 Project
Due 12/5
41
https://simms-teach.com/cis76calendar.php
CIS 76 - Lesson 13
CIS 76 Project
Remember late work is not accepted. If you run out of time submit what you have
completed for partial credit.
CIS 76 Project
Use this directory to share your project with other classmates
Calendar Page
https://simms-
teach.com/cis76calendar.php
https://cabrillo.instructure.com/courses/7125/pages/cis-76-project-folder
43
CIS 76 - Lesson 13
CIS 76 Project
https://simms-
teach.com/cis76calendar.php
https://cabrillo.instructure.com/courses/7125/pages/cis-76-project-testing-
signup-sheet
44
CIS 76 - Lesson 13
CIS 76 Project
45
https://simms-teach.com/docs/cis76/cis76final-project-test-report.pdf
CIS 76 - Lesson 13
CIS 76 Project
46
CIS 76 - Lesson 13
CIS 76 Project
CIS 76 Project
Housekeeping
49
CIS 76 - Lesson 13
Housekeeping
Tue
51
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=357GquKbofk
Rich: Looks like fun. I just watched the video and Dan indicated it was only open to County employees.
Would our students have his authorization to participate? They all took the "Hacking without permission is a
crime" oath at the start of class :)
Tess: Oh yes! I checked with Dan before I sent you the email. He is looking forward to all attempts. :)
52
CIS 76 - Lesson 13
Extra credit
labs and
final posts
Tue due by
11:59PM
• All students will take the test at the same time. The test must be
completed by 6:50PM.
• Working and long distance students can take the test online via
CCC Confer and Canvas.
• Working students will need to plan ahead to arrange time off from
work for the test.
53
• Test #3 is mandatory (even if you have all the points you want)
CIS 76 - Lesson 13
54
CIS 76 - Lesson 13
Where to find your grades
Send me your survey to get your LOR code name.
Wireless
Overview
60
CIS 76 - Lesson 13
• Cell phones
• Cordless phones
• Smart phones
• Pagers
• Smart watches
• GPS
• Remote controls
• Garage door openers
• Car door openers
• Two-way radios
• Wireless laptops
• Tablets
• WiFi cams
• Fitbits
• And many more ...
61
CIS 76 - Lesson 13
Access Points
Devices with wireless
network adapters
• Usually connected to a wired network configured to the SSID
of the access point.
Station
Station
Wired LAN Access Point
62
CIS 76 - Lesson 13
http://www.l-com.com/content/802.11-Wireless-Standards.pdf 63
CIS 76 - Lesson 13
1. 802.11a
2. 802.11b
3. 802.11g
4. 802.11i
https://www.eccouncil.org/programs/certified-ethical-hacker-
ceh/ceh-assessment/
65
Professor Messer
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=DspgyuedICM
WIGLE.NET
Access Points on Google Maps
https://wigle.net/ 67
CIS 76 - Lesson 13
WIGLE.NET
Zooming in to see specific SSID's
https://wigle.net/ 68
CIS 76 - Lesson 13
WIGLE.NET
Full screen view of Wi-Fi Encryption Over Time
https://wigle.net/ 69
CIS 76 - Lesson 13
1. WarWalking
2. WarFlying
3. WarChalking
4. WarDriving
https://www.eccouncil.org/programs/certified-ethical-hacker-
ceh/ceh-assessment/
71
CIS 76 - Lesson 13
Special
Adapters and
Utilities for Pen
Testing
72
CIS 76 - Lesson 13
+ +
+
https://www.macports.org/ http://www.aircrack-ng.org/
73
CIS 76 - Lesson 13
http://www.wirelesshack.org/best-kali-
linux-compatible-usb-adapter-dongles-
2016.html 74
CIS 76 - Lesson 13
https://www.hak5.org/shows
https://www.wifipineapple.com/ 75
CIS 76 - Lesson 13
Android WiFi
Analyzer
76
CIS 76 - Lesson 13
79
CIS 76 - Lesson 13
Wireless
Notes
82
CIS 76 - Lesson 13
83
CIS 76 - Lesson 13
Wireshark shows traffic on the connected WiFi network destined for the Kali PC
85
CIS 76 - Lesson 13
89
CIS 76 - Lesson 13
Hacking
WEP
90
CIS 76 - Lesson 13
91
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=XoS_GIOLzCo
BSSID STA
= Basic Service Set Identifier = Station
= AP Mac Address = MacBook Pro
= 00:06:25:4b:21:b4
Attacker
Linksys
WAP54G STA
= Station
= Win 10 PC
SSID
= Service Set Identifier Victim
= Name of the network
= linkysys
93
CIS 76 - Lesson 13
94
CIS 76 - Lesson 13
Using Mixed Mode (B and G), Channel 5, and Wireless Security (WEP) 95
CIS 76 - Lesson 13
Generate a key from a pass phrase and use Key 1 on each station 96
CIS 76 - Lesson 13
Windows 10 PC View
SSID: linkysys
Protocol: 802.11g
Security type: Open
Network band: 2.4 GHz
Network channel: 5
IPv4 address: 192.168.88.112
Manufacturer: Intel Corporation
Description: Intel(R) Centrino(R) Wireless-N 1030
Driver version: 15.11.0.7
Physical address (MAC): 4C-EB-42-85-71-B8
Windows 10 PC View
On a MacBook Pro, the built in airport command with an -s option will scan
all available WiFi networks.
99
CIS 76 - Lesson 13
Let's start sniffing the channel 5 used by the access point for the SSID linkysys. Use
control-C to stop the capture.
ls -lth /private/tmp/airportSniff*.cap
Richards-MacBook-Pro:~ rsimms$ ls -lth /private/tmp/airportSniff*.cap
-rw-r--r-- 1 rsimms wheel 39M Nov 21 08:41 /private/tmp/airportSniffdZH641.cap
-rw-r--r-- 1 rsimms wheel 69M Nov 21 08:26 /private/tmp/airportSniff8FkDVL.cap
-rw-r--r-- 1 rsimms wheel 108M Nov 20 20:36 /private/tmp/airportSniffk44M58.cap
-rw-r--r-- 1 rsimms wheel 23M Nov 20 19:39 /private/tmp/airportSniffKzpvq8.cap
-rw-r--r-- 1 rsimms wheel 4.4M Nov 20 19:16 /private/tmp/airportSniffFVOuaV.cap
-rw-r--r-- 1 rsimms wheel 497K Nov 20 16:22 /private/tmp/airportSniffh69ghh.cap
-rw-r--r-- 1 rsimms wheel 990K Nov 20 16:14 /private/tmp/airportSniffdLJDh2.cap
-rw-r--r-- 1 rsimms wheel 2.4M Nov 20 16:05 /private/tmp/airportSniffIhmspR.cap
-rw-r--r-- 1 rsimms wheel 1.5M Nov 20 14:28 /private/tmp/airportSniffA8hduu.cap
Richards-MacBook-Pro:~ rsimms$
The packets are captured and dumped into a new file in the /private/tmp
directory with any previous captures. 100
CIS 76 - Lesson 13
KB depth byte(vote)
0 32/120 12( 256) B1( 256) B2( 256) B3( 256) 03( 256) B5( 256) 63( 256) 64( 256) B8( 256) 39( 256)
1 26/ 1 C1( 512) 40( 256) 02( 256) 03( 256) 05( 256) 07( 256) 09( 256) 0B( 256) 0E( 256) 0F( 256)
2 5/ 6 AC( 768) 5C( 512) C8( 512) 40( 512) 31( 512) 2F( 512) BE( 512) FD( 512) BD( 512) E1( 512)
3 28/ 3 A6( 512) 23( 256) 6A( 256) 6B( 256) BE( 256) BF( 256) 3C( 256) 6E( 256) 6F( 256) 24( 256)
4 5/ 31 C0( 768) 24( 512) E8( 512) 2A( 512) 1B( 512) BA( 512) A3( 512) A0( 512) F0( 512) 81( 512)
Richards-MacBook-Pro:~ rsimms$
You could just crack the WEP password on the MAC. Instead we will transfer
the packet capture file to the EH-Pod and crack on the EH-Kali VM
101
CIS 76 - Lesson 13
Capture file
transferred
to Kali
102
CIS 76 - Lesson 13
WEP Cracking
scp [email protected]:../depot/lesson13/* .
root@eh-kali-05:~# scp [email protected]:../depot/lesson13/* .
[email protected]'s password:
airportSniffdZH641.cap 100% 39MB 38.5MB/s 00:01
airportSniffENFGOR.cap 100% 6548KB 6.4MB/s 00:00
airportSniffyG7m8J.cap 100% 3023KB 3.0MB/s 00:00
root@eh-kali-05:~#
103
CIS 76 - Lesson 13
Capture
dZH641
airportSniffdZH641.cap
This capture was done while watching a portion of an Office episode on Netflix
105
CIS 76 - Lesson 13
WEP Cracking
ls -l airportSniffdZH641.cap
root@eh-kali-05:~# ls -l airportSniffdZH641.cap
-rw-r--r-- 1 root root 40401050 Nov 21 12:31 airportSniffdZH641.cap
root@eh-kali-05:~#
file airportSniffdZH641.cap
root@eh-kali-05:~# file airportSniffdZH641.cap
airportSniffdZH641.cap: tcpdump capture file (little-endian) - version 2.4 (802.11
with radiotap header, capture length 2147483647)
root@eh-kali-05:~#
WEP Cracking
[EH-Kali-xx] Wireshark
107
We can see one of the beacon frames from the Linksys WAP54G (SSID=linkysys)
CIS 76 - Lesson 13
WEP Cracking
[EH-Kali-xx] Wireshark
4 5
108
Creating a filter to show only beacon frames
CIS 76 - Lesson 13
Activity
1) scp [email protected]:../depot/lesson13/* .
109
CIS 76 - Lesson 13
aircrack-ng airportSniffdZH641.cap
Activity
2. aircrack-ng airportSniffdZH641.cap
What is the WEP password? Write your answer in the chat window
111
CIS 76 - Lesson 13
112
We have the password now so next we will attempt to extract files from the traffic
CIS 76 - Lesson 13
Capture
ENFGOR
Exfiltrating Files
113
CIS 76 - Lesson 13
airportSniffENFGOR.cap
http://www.bbc.com/news/world-europe-38054216
https://simms-teach.com/docs/cis76/cis76lab01.pdf
114
CIS 76 - Lesson 13
ls -l airportSniffENFGOR.cap
root@eh-kali-05:~# ls -l airportSniffENFGOR.cap
-rw-r--r-- 1 root root 6704919 Nov 21 12:31 airportSniffENFGOR.cap
file airportSniffENFGOR.cap
root@eh-kali-05:~# file airportSniffENFGOR.cap
airportSniffENFGOR.cap: tcpdump capture file (little-endian) - version 2.4 (802.11 with
radiotap header, capture length 2147483647)
root@eh-kali-05:~#
115
CIS 76 - Lesson 13
116
We can see the 802.11 frames but all data is encrypted
CIS 76 - Lesson 13
ls -l airportSniffENFGOR*
root@eh-kali-05:~# ls -l airportSniffENFGOR*
Encrypted
-rw-r--r-- 1 root root 6704919 Nov 21 12:31 airportSniffENFGOR.cap
-rw-r--r-- 1 root root 4648498 Nov 21 11:10 airportSniffENFGOR-dec.cap Decrypted
root@eh-kali-05:~#
118
We see traditional traffic now in the decrypted capture
CIS 76 - Lesson 13
120
A list of HTTP objects. Click the Save All button.
CIS 76 - Lesson 13
122
Name the new directory and click Create button
CIS 76 - Lesson 13
123
Click the Open button to saves the HTTP objects in the new leson13a directory
CIS 76 - Lesson 13
124
Click OK to acknowledge some files could not be saved
CIS 76 - Lesson 13
125
Click Close to finish
CIS 76 - Lesson 13
Activity
1) scp [email protected]:../depot/lesson13/* .
128
Open the new directory where the objects were saved
CIS 76 - Lesson 13
/root/lesson13a/_92592606_354d2441-d7ac-4a91-8df6-1447a909bd00(1).jpg
130
Find and open a .jpg file used one the BBC website
CIS 76 - Lesson 13
file:///root/lesson13a/blogs-trending-38002276
131
Find and open a .html file on BBC website
CIS 76 - Lesson 13
/root/lesson13a/bump-3.js
132
Find and open a JavaScript file on the BBC website
CIS 76 - Lesson 13
Activity
Put the names of any interesting files you find in the chat window
134
CIS 76 - Lesson 13
Activity
https://simms-teach.com/docs/cis76/cis76lab01.pdf
135
CIS 76 - Lesson 13
Capture
yG7m8J
More Practice
136
CIS 76 - Lesson 13
airportSniffyG7m8J.cap
http://www.skyhighway.com/~marysimms/exercise8.html
http://www.skyhighway.com/~elizsimms/cis83/docs
/portfolio-lab-VLAN.pdf
137
CIS 76 - Lesson 13
ls -l airportSniffyG7m8J.cap
root@eh-kali-05:~# ls -l airportSniffyG7m8J.cap
-rw-r--r-- 1 root root 3095355 Nov 21 12:31 airportSniffyG7m8J.cap
root@eh-kali-05:~#
file airportSniffyG7m8J.cap
root@eh-kali-05:~# file airportSniffyG7m8J.cap
airportSniffyG7m8J.cap: tcpdump capture file (little-endian) - version 2.4 (802.11 with
radiotap header, capture length 2147483647)
root@eh-kali-05:~#
ls -l airportSniffy*
root@eh-kali-05:~# ls -l airportSniffy*
-rw-r--r-- 1 root root 3095355 Nov 21 12:31 airportSniffyG7m8J.cap Encrypted
-rw-r--r-- 1 root root 1354295 Nov 21 13:12 airportSniffyG7m8J-dec.cap
Decrypted
root@eh-kali-05:~#
140
CIS 76 - Lesson 13
141
Decrypted packet capture showing normal traffic
CIS 76 - Lesson 13
142
Extracting objects from the capture
CIS 76 - Lesson 13
143
Make a new directory
CIS 76 - Lesson 13
144
Make a new directory
CIS 76 - Lesson 13
145
Make a new directory
CIS 76 - Lesson 13
146
Make a new directory
CIS 76 - Lesson 13
147
Make a new directory
CIS 76 - Lesson 13
148
Save all to the new directory
CIS 76 - Lesson 13
Activity
1) scp [email protected]:../depot/lesson13/* .
4) Exfiltrate all HTTP objects from the capture file and place them in a
directory named lesson13b in your home directory.
149
CIS 76 - Lesson 13
151
CIS 76 - Lesson 13
Activity
152
CIS 76 - Lesson 13
Activity
153
CIS 76 - Lesson 13
Wireless
WPA/WPA2
Hacking
154
CIS 76 - Lesson 13
WPA
• Developed in 2003 to replace WEP.
• Still uses WEP's insecure RC4 stream cipher
• Uses Temporal Key Integrity Protocol (TKIP) to
provide extra security.
• More secure than WEP.
WPA2
• Developed in 2004 to replace WEP and WPA.
• Uses AES instead of RC4.
• Replaces TKIP with Counter Mode Cipher
Block Chaining Message Authentication Code
Protocol (CCMP).
• More secure than WPA.
As of March 2006, all devices using the Wi-Fi trademark must be WPA2 certified
155
http://www.diffen.com/difference/WPA_vs_WPA2
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=hLQ5rYNUwNg
6:46 - 7:15: Notes a PSK (pre-shared key) is vulnerable to dictionary attacks 156
CIS 76 - Lesson 13
A "nonce" is
introduced in
this video
(1:50 - 2:05)
https://www.youtube.com/watch?v=9M8kVYFhMDw
This video discussed the WPA 4-way authentication handshake. Note we will use
157
aircrack-ng later to crack a PSK (pre-shared key) making use of this handshake.
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=ngxzSlsP1JU
158
CIS 76 - Lesson 13
BSSID STA
= Basic Service Set Identifier = Station
= AP Mac Address = MacBook Pro
= 00:06:25:4b:21:b4
Attacker
Linksys
WAP54G STA
= Station
= Win 10 PC
SSID
= Service Set Identifier Victim
= Name of the network
= linkysys
159
CIS 76 - Lesson 13
Linksys WAP54G
160
CIS 76 - Lesson 13
Linksys WAP54G
Linksys WAP54G
On a Mac, using the built in airport command with an -s option will scan all
available WiFi networks. The linkysys network on channel 5 is using WPA. 163
CIS 76 - Lesson 13
Activity
2) Do you see any wireless networks that are open with no encryption?
164
CIS 76 - Lesson 13
Let's start sniffing the channel used by the access point for the SSID linkysys. Use
control-C to stop the capture.
Capture
1QXjSX
166
CIS 76 - Lesson 13
airportSniff1QXjSX.cap
http://hayrocket.com/cabrillo/dm160b/
http://hayrocket.com/cabrillo/dm160b/final/
167
CIS 76 - Lesson 13
scp -p [email protected]:../depot/lesson13/* .
root@eh-kali-05:~# scp -p [email protected]:../depot/lesson13/* .
[email protected]'s password:
airportSniff1QXjSX.cap 100% 7510KB 7.3MB/s 00:00
airportSniffdZH641.cap 100% 39MB 38.5MB/s 00:01
airportSniffENFGOR.cap 100% 6548KB 6.4MB/s 00:00
airportSniffyG7m8J.cap 100% 3023KB 3.0MB/s 00:00
root@eh-kali-05:~#
scp [email protected]:../depot/randomwords .
root@eh-kali-05:~# scp [email protected]:../depot/randomwords .
[email protected]'s password:
randomwords 100% 4838KB
4.7MB/s 00:00
root@eh-kali-05:~#
168
CIS 76 - Lesson 13
ls -lah air*
root@eh-kali-05:~# ls -lah air*
-rw-r--r-- 1 root root 7.4M Nov 21 18:45 airportSniff1QXjSX.cap
-rw-r--r-- 1 root root 39M Nov 21 10:21 airportSniffdZH641.cap
-rw-r--r-- 1 root root 6.4M Nov 21 10:14 airportSniffENFGOR.cap
-rw-r--r-- 1 root root 4.5M Nov 21 11:10 airportSniffENFGOR-dec.cap
-rw-r--r-- 1 root root 3.0M Nov 21 11:40 airportSniffyG7m8J.cap
-rw-r--r-- 1 root root 1.3M Nov 21 13:12 airportSniffyG7m8J-dec.cap
root@eh-kali-05:~#
169
CIS 76 - Lesson 13
Wireshark View of Captured Channel 5 802.11 Packets
wireshark airportSniff1QXjSX.cap
BSSID
SSID
170
A linkysys network beacon frame from our access point
CIS 76 - Lesson 13
aircrack-ng airportSniff1QXjSX.cap
root@eh-kali-05:~# aircrack-ng airportSniff1QXjSX.cap
Opening airportSniff1QXjSX.cap
Read 29202 packets.
1 44:A2:78:BA:59:02 Unknown
2 D8:50:E6:59:0B:F8 MODWARE No data - WEP or WPA
3 D8:50:E6:59:0B:FA Guest WPA (0 handshake)
4 2C:56:DC:85:3E:E8 BenjiNet WPA (0 handshake)
5 00:22:A4:DD:8C:C9 2WIRE341 No data - WEP or WPA
6 D8:50:E6:59:0B:F9 Shauna No data - WEP or WPA
7 82:35:A4:DD:8C:C9 WEP (1 IVs) Capturing a
8 8B:F3:16:85:58:A9 WEP (1 IVs)
handshake is
9 15:D4:65:A0:E0:7E WEP (1 IVs)
10 00:06:25:4B:21:B4 linkysys WPA (1 handshake) necessary to
11 BC:CA:B5:F1:33:60 PandaRouter No data - WEP or WPA cracking the
12 66:6A:AA:B7:5D:21 Unknown pre-shared key
13 4C:5E:0C:CA:25:C0 uLab-WiFiNet WPA (0 handshake) (password)
14 F6:37:6A:50:91:D8 WPA (0 handshake)
15 AE:18:C3:90:50:D2 WPA (0 handshake)
16 67:33:E4:FC:9B:1C Unknown
17 BE:CA:B5:F1:33:60 �{�?���U�����+?�?0??? No data - WEP or WPA
18 22:86:8C:6C:82:4A xfinitywifi None (0.0.0.0)
19 27:78:F7:DE:2F:CC WPA (0 handshake)
20 10:86:8C:6C:82:4A Weiser No data - WEP or WPA
Snipped and use Ctrl-C when it hangs :(
171
The BSSID for linkysys is 00:06:25:4B:21:B4 and we have one authentication handshake
CIS 76 - Lesson 13
Opening airportSniff1QXjSX.cap
Reading packets, please wait...
"WPA/WPA2
supports many
types of
authentication
beyond pre-shared
keys. aircrack-ng
can ONLY crack
pre-shared keys."
https://www.aircrack-
ng.org/doku.php?id=crack
ing_wpa
172
CIS 76 - Lesson 13
Activity
What is the WPA shared key? Write your answer in the chat window
173
CIS 76 - Lesson 13
root@eh-kali-05:~# time aircrack-ng airportSniff1QXjSX.cap -w randomwords -b
00:06:25:4B:21:B4
Opening airportSniff1QXjSX.cap
Reading packets, please wait...
Master Key : 95 5B CA 0F 59 BE 99 2E 64 F7 88 71 6A 66 71 57
CA B8 8D CC 54 1A 4E 09 6C 1A AC E3 F3 4B 22 C6
Transient Key : B4 E3 8A 3B DF E9 60 A9 49 04 B8 FF D7 1F 4F 75
85 2D C3 E2 8B 51 EE E7 C1 CA 36 17 21 D8 22 9F
24 6D C4 90 DF 13 F0 30 F3 BE C1 CF BF 15 C8 82
26 EA 2D F2 23 5D 01 11 42 C5 3B 4F EF 03 46 40
EAPOL HMAC : 94 AC F7 08 0D 7F 1F 02 BA 65 7C 9A 7A EE F3 B1
real 8m36.989s
user 8m30.784s
sys 0m2.488s
root@eh-kali-05:~#
174
Using time to see how long it takes
CIS 76 - Lesson 13
175
A linkysys network beacon frame from our access point
CIS 76 - Lesson 13
177
Viewing the decrypted packets using Wirehshark
CIS 76 - Lesson 13
178
CIS 76 - Lesson 13
Activity
1) scp [email protected]:../depot/lesson13/* .
180
CIS 76 - Lesson 13
181
CIS 76 - Lesson 13
182
CIS 76 - Lesson 13
183
CIS 76 - Lesson 13
Activity
184
CIS 76 - Lesson 13
Deauth
Rogue AP
Attacks
Placeholder
185
CIS 76 - Lesson 13
https://simms-teach.com/howtos/students/WiFi-Penetration-Schell.pdf
186
CIS 76 - Lesson 13
Krack
187
CIS 76 - Lesson 13
https://arstechnica.com/information-
technology/2017/10/severe-flaw-in-
wpa2-protocol-leaves-wi-fi-traffic-open-
to-eavesdropping/
KRACK attack is
especially bad news for
Android and Linux users.
"Researchers have disclosed a serious weakness in the WPA2 protocol that allows
attackers within range of vulnerable device or access point to intercept passwords,
e-mails, and other data presumed to be encrypted, and in some cases, to inject
ransomware or other malicious content into a website a client is visiting."
188
CIS 76 - Lesson 13
https://www.youtube.com/watch?v=mYtvjijATa4
189
CIS 76 - Lesson 13
Assignment
190
CIS 76 - Lesson 13
Final Project
https://simms-
teach.com/docs/cis76/cis76final-project.pdf
191
CIS 76 - Lesson 13
Wrap up
192
CIS 76 - Lesson 13
Next Class
Assignment: Check the Calendar Page on the web site to
see what is due next week.
• No more quizzes!
193
CIS 76 - Lesson 13
Backup
194