Automated Wireless Network Penetration Testing Using Wifite and Reaver
Automated Wireless Network Penetration Testing Using Wifite and Reaver
Automated Wireless Network Penetration Testing Using Wifite and Reaver
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States.
Automated Wireless Network Penetration Testing
Using Wifite and Reaver
Aparicio Carranza, PhD1, Josue Magallanes1, Casimer DeCusatis, PhD2 and Javier Espinal1
1
The New York City College of Technology – CUNY, USA, [email protected], [email protected]
2
Marist College, USA, [email protected]
Abstract– Wireless access points are susceptible to many types While this attack has been demonstrated previously using
of cybersecurity attacks. In particular, by attacking the Wi-FI custom software tools, available from only a few specific
Protected Setup (WPS) passcode using a brute force dictionary locations, recently the tools required to perform such attacks
attack, it is possible to circumvent the use of password-based were automated and combined with the open source Kali
network encryption and gain access to the wireless network content.
In this tutorial paper, we investigate penetration testing of wireless
Linux distribution. We investigate the use of Kali Linux for
networks using open source tools which have been automated in penetration testing of wireless networks using two different
Kali Linux, including Wifite and Reaver. Traffic on wireless automated password cracking tools (Wifite and Reaver); if we
networks which have been compromised in this manner are further are successful in gaining access to the network, then we will
analyzed using the Wireshark network protocol analyzer. proceed to examine network traffic using the open source
network packet analyzer Wireshark (which is also built into
Keywords—Kali Linux, Penetration Test, Wi-Fi Protected Kali Linux). Wifite is a password cracking tool which attacks
Setup (WPS). WEP and WPA encrypted networks, and can also crack WPS
passcodes [6]. Reaver is designed to perform a brute force
I. INTRODUCTION attack against WPS passcodes, and will also work on
Wireless routers serving as network access points have WPA/WPA2 encrypted networks [7]. Both tools allow us to
become a ubiquitous way to connect mobile devices to the customize our attacks using different password dictionaries.
Internet [1]. Unfortunately, these devices also suffer from a The remainder of this paper is organized as follows: Section 2
number of cybersecurity vulnerabilities, which necessitates describes our Penetration Testing Environment. Section 3
penetration testing of common wireless networks [2]. In presents a tool within Kali Linux called wifite. In section 4,
particular, most wireless routers support a one-click another tool called reaver is presented which by design is to
configuration option for creating a secure wireless connection perform brute force attacks on an 8 digits WPS passcode.
known as Wi-Fi Protected Setup (WPS). Created by the Wi-Fi Section 5 presents the use of wireshark to capture wireless
Alliance in 2006, this feature was intended to allow home network traffic from the identified network for further
users with little or no security background to set up a protected analysis. Section 6 presents the concluding remarks.
Wi-Fi connection, and make it easier to add new devices to an
existing network. This feature doesn’t require access to the II. PENETRATION TESTING ENVIRONMENT
router configuration management interface, or the wireless
network password and security key [3]; instead, it relies on an Wireless penetration testing requires both a dedicated
8 digit passcode which is unique for each device joining the server running Kali Linux (with a compatible wireless adapter
network [4]. In 2011, it was first reported that this passcode [8]) and a WPS-enabled router. We downloaded Kali Linux,
was susceptible to brute force attacks; because the passcode is which is open source [9], and burned it onto a flash drive to
relatively short and consists only of numbers, it can be cracked facilitate installation on the testing server. Specifically, we
quite quickly (anywhere from a few minutes to a few hours used the Wifite, Reaver, and Wireshark tools for this testing.
[5]). Since many devices using WPS allow devices to be Any standard Wi-Fi router can be used for the testing; we
added to the network either by pressing a physical button on configured the router through a local connection rather than
the router or entering a default access code printed on the using the wireless control plane. Router configuration
router, it’s important to provide some level of physical requires obtaining the appropriate default gateway of the
security around the router. In this paper, we will focus on router in order to obtain the configuration page address,
versions of the attack which can be executed remotely, logging into the router configuration page and changing both
without physical access to the device (either in real time over a the SSID and password, and finally enabling WPS. First, we
network or offline). This attack requires that WPS is enabled obtain the gateway router’s default IP address by issuing the
on the router, and that the attacker knows the Set Service ID ipconfig command at the local host command line shell. We
(SSID) of the network (which can often be easily obtained can then access the router settings from any standard web
through other means). browser, using the manufacturer’s factory default userid and
password (commonly both are set to “admin”). Under the
Digital Object Identifier (DOI): http://dx.doi.org/10.18687/LACCEI2017.1.1.64 wireless settings menu, we can change the SSID to be
ISBN: 978-0-9993443-0-9
ISSN: 2414-6390
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States. 1
compatible with the network under test. The WPS features can
be enabled under the advanced wireless settings menu.
III. WIFITE
Figure 3 – Output of a typical Wifite scan
Within Kali Linux, the Wifite tool may be accessed either
through the applications menu (under wireless attacks/wifite) The Wifite tool can conduct exhaustive keyword searches,
or by invoking wifite from a command line prompt. When the otherwise known as brute force or dictionary attacks. The tool
tool is opened, it automatically begins scanning for available includes lists of the most commonly used passwords, or the
wireless networks in the vicinity, as shown in the screen user can provide their own dictionary list. We invoke a
capture of Figure 2. dictionary attack against one of the networks (preferably one
with WPS enabled and a high signal strength) using the
command wifite –dict /usr/wordlists/fern-wifi/commontxt.
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States. 2
Note that the –dict option allows us to specify the location of a
password list to be used in the attack.
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States. 3
Typing the command “wash -i“ allows the user to specify an rogue access point, both the access point (enrollee) and client
interface to use for packet capture. Adding the optional device (registrar) need to prove they know the passcode.
argument – c specifies that the capture should ignore any Consequently, hashed versions of the passcode elements are
frame checksum errors (FCS). The output of this command transmitted between the enrollee and registrar. When the two
will list all the wireless networks within range of the Kali nonces used in this process are known, the original passcode
Linux machine, as shown in Figure 7. We can select the can be recovered by Reaver in a matter of minutes.
ESSID of a wireless network that we wish to test, and make
note of the BSSID for that network (the chipset identified by
V. WIRESHARK
the wireless access point’s 48 bit MAC address).
Using Wireshark, we can capture wireless network traffic
from the networks identified in the prior sections for further
analysis. With the appropriate network selected, we can
capture traffic from the device under test as it attempts to
access the Internet, using the port filter tcp.port ==80to
identify HTTP protocol traffic as shown in Figure 9. In this
test, we can identify packets associated with the wireless
device’s web browsing history (including names of the
websites visited); such packets will include the keyword GET
as part of the packet information listed.
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States. 4
menu option allows configuration of the current wireless
card). The default Bridged connection should be changed to
Custom, and this problem can be avoided.
VI. CONCLUSION
REFERENCES
[1] E. Geier, "Secure Your Home Or Office Wi-Fi." PCWorldvol30.4 pp. 33-
34 (2012)
[2] P. Joaquin, L. Colunga, and R. Gomez. “Routerpwn - One Click Exploits,
Generators, Tools, News, Vulnerabilities, Poc, Alerts.” Routerpwn - One
Click Exploits, Generators, Tools, News, Vulnerabilities, Poc,
Alerts, http://routerpwn.com/about/ (last accessed December 8, 2016)
[3] D.W. Dieterle, Basic Security Testing with Kali Linux, CreateSpace
Independent Publishing (March 2016)
[4] A. Johns, Mastering Wireless Penetration Testing for Highly Secured
Environments, Birmingham, UK, Packt Publishing Limited (2015).
[5] “Alert (TA12-006A).” Wi-Fi Protected Setup (WPS) Vulnerable to Brute-
Force Attack, https://www.us-cert.gov/ncas/alerts/ta12-006a (last
accessed December 8, 2016)
[6] “Wifite Package Description.” Http://tools.kali.org/ (last accessed
December 8, 2016)
[7] M. Alamanni, Kali Linux Wireless Penetration Testing Essentials,
Birmingham, UK, Packt Publishing Ltd. (2015).
[8] “Best Kali Linux Compatible USB Adapter / Dongles 2016.”
WirelesSHack, http://www.wirelesshack.org/best-kali-linux-
compatible-usb-adapter-dongles-2016.html (last accessed December
8, 2016)
[9] “Kali Linux Downloads.” Kali Linux, www.kali.org/downloads/ (last
accessed December 8, 2016)
[10] M. Gregg, The Network Security Test Lab: a Step-by-Step Guide,
Indianapolis, IN, John Wiley &Sons, Inc. (2015)
15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnerships for
Development and Engineering Education”, 19-21 July 2017, Boca Raton Fl, United States. 5