Wifi Hacking Rogue Access Points Preview
Wifi Hacking Rogue Access Points Preview
Wifi Hacking Rogue Access Points Preview
Editor-in-Chief Proofreaders
Joanna Kretowicz
[email protected]
Lee McKenzie
Managing Editor
Hammad Arshed
Magdalena Jarzębska
Avi Benchimol
[email protected]
Amit Chugh
Editors:
Craig Thornton
Marta Sienicka
[email protected]
Paul Mellen
Marta Strzelec
[email protected] Alex Giles
Publisher
Hakin9 Media Sp. z o.o.
02-676 Warszawa
ul. Bielawska 6/19
Phone: 1 917 338 3631
www.hakin9.org
All trademarks, trade names, or logos mentioned or used are the property
of their respective owners. The techniques described in our articles may
only be used in private, local networks. The editors hold no responsibility
for misuse of the presented techniques or consequent data loss.
Dear readers,
Fall is finally here and it’s getting spooky, and that’s why in October we decided to dedicate our newest
issue to a truly terrific topic, that is wireless hacking! Inside of this edition, you will find great tutorials,
case studies, and guides, suitable both for advanced and intermediate hackers. Grab your hot tea or
We prepared a handful of amazing articles that will help you with many aspects of wireless hacking - from
most effective tools, like WiFiPumpkin3 in a tutorial written by Atlas Stark, to pentesting your wireless
networks. Roberto Camerinesi will help you understand what are Stealth Chained Wi-Fi Attacks and how
to perform them, and those of you who are just starting your adventure with hacking will get a chance to
get to know a tool called Airgeddon in the Quick Guide to Wi-Fi Hacking for Newbies.
But there’s more! There are many interesting case studies and tutorials that will help you improve your
If Wi-Fi hacking is not your cup of tea, we have something for you too! If you are a fan of Nmap, take a
look at Evading Firewalls & Enumerating SNMP Using Advanced Nmap Techniques by dr. Akashdeep
Bhardwaj. For those who are still hungry for some raspberries we have an amazing tutorial Facial Recogni-
tion Using Raspberry Pi and Pi Camera. Python enthusiasts may be interested in an introduction to
encoding/decoding things with Codext, a great open-source tool, written by Alexandre D’Hondt. You
will also get a chance to get into your detective boots and investigate financial fraud crimes using Graph
techniques!
While we focus mostly on wireless hacking, this issue is full of diverse knowledge and we believe it will
be a great read for everyone, as our contributors did truly an amazing job to share their experience. We
hope this edition will brighten the cold autumn days for you :)
We would like to send gratitude to our amazing contributors and reviewers for helping us create this
06 by Atlas Stark
Airgeddon - a Quick
Guide to Wi-Fi Hacking
for Newbies
3
4
5
WIFIPUMPKIN3
ATLAS STARK
Atlas Stark is a security researcher at Stark Industries Inc. with
and Tennessee.
tions or concerns.
7
WiFiPumpkin3
Fall is in the air and with those crisp gusts of wind, the month of October brings us countless “Hacktober” events and cool
tools to discover. One tool I have grown really fond of is WifiPumpkin3 by POcL4bs. WifiPumpkin3 is a framework written
in Python 3 for rogue access point attacks as well as other wireless attack functionalities, according to the project site. So,
fire up a command line, grab your favorite cola or your Pumpkin Spice Latte and get ready to explore how this tool can en-
hance your arsenal for your next engagement.
I am using WifiPumpkin3 on Kali Linux 2021.3, but there are directions within the project documentation to utilize the
framework on Ubuntu systems as well. Some things to note from the start, according to the project documentation, Win-
dows and Mac OS X (although docker version is available, but not tested) are not supported by WifiPumpkin3. Below is a
list of must-haves and installed requirements according to the project documentation to successfully install and deploy Wi-
fiPumpkin3 and all of its features. Make sure you are running the current versions of the following requirements.
WiFi-Adapter
For this article, I am using a WiFi-adapter that was designed by ZSecurity. The adapter features dual band radios (2.4 & 5
Ghz) and supports monitor mode for code injection and access point mode. It uses the RealTek RTL8812AU chipset just
like the Alfa brand adapters, so if you have an Alfa adapter, you are good to go. The most important aspect to ensure is the
chipset of the adapter. You can install the RealTek driver with the following command: “sudo apt-get install
realtek-rtl88xxau-dkms”. As you can see from the screen shot, I already have the newest version installed.
8
HOW TO HACK
WI-FI
NETWORKS AND
SECURE THEM
KIRANKUMAR RAMARAO SUBUDDI
cal Hacker and Security Analyst who has worked with public, pri-
10
NIKHIL SANTOSH MAHADESHWAR
based innovator with more than a decade of experience in the web industry.
Analyst’. He has also trained more than 40,000 people on cyber awareness &
rates, etc. He has been awarded as the youngest entrepreneur and was pre-
ited.
11
How To Hack Wi-Fi Networks and Secure Them
Due to the pandemic, work from home is becoming a common practice for most people. Many organizations were not pre-
pared for this type of situation, where their employees have to work remotely. It includes a high risk for the organization
from hackers and competitors that could lead to data breach, reputational loss, infrastructure compromise, etc. Also, em-
ployees were not trained for remote jobs with limited resources and limited security, which made organizations more vul-
nerable. If an employee uses free wifi or public wifi, there is a high chance the data that gets transmitted, captured or moni-
tored may leak or lead to an attack on the organization’s infrastructure. Not just employees but any user, even hackers
within approximately 300 feet of the access point, can then access the network.
Wi-Fi is convenient, accessible, and operates in millions of homes, corporate offices, university campuses and public hot-
spots worldwide. Wi-Fi networks use radio waves, similar to cell phones and televisions, to connect to a wireless access
point called a router, which directly connects to the Internet via a cable or DSL modem.
The problem is most Wi-Fi hotspot users are not aware of the risks of using public Wi-Fis. Most public Wi-Fis are unen-
crypted, which means that anyone with easily available software can listen in and access everything being sent over the net-
work.
Many users assume that if they pay for a Wi-Fi network at a hotel or airport then the connection is as secure as the network
connection at home or at the office. But wireless eavesdropping can happen on virtually any public Wi-Fi network. Plus, it is
impossible for the untrained person to determine the safety of a public Wi-Fi network and to identify those that are danger-
ous and make users vulnerable to hacking.
For performing an attack on any users, we need users to be connected to the same Wi-Fi network. If the Wi-Fi is secured
with a password, then we can use different tools like Aircrack-ng, Wi-Fite, Airgeddon, etc. If the Wi-Fi has WPS enabled
then you can go for tools like reaver and bcmon. You can directly connect if the Wi-Fi is open. If none of them works then
attackers host a rogue access point using Airgeddon or other tools. For more enhanced impact and wider range attackers
also use hardware such as alpha card, nodemcu, Wi-Fi pineapple, etc.
12
STEALTH
CHAINED WI-FI
ATTACKS
ROBERTO CAMERINESI
Roberto Camerinesi is a computer security researcher and developer.
been working for over 11 years in the ICT and security industry.Today he is
CTO of Cyber Evolution, working specifically on cyber security in IoT and In-
dustrial environment.
institutions such as the master Experis Academy, the Italian national event
INTRO
Greetings readers,
Wireless has revolutionized the way we can be connected, opening the way to countless application fields.
We find it, in fact, from home networks to public networks but not only; it is used in companies supporting the BYOD
(Bring Your Own Device) model and working methods and today it is coming in Industry 4.0 and sensor networks.
The exponential growth of these two sectors has given a boost to wireless networks, connecting all kinds of devices, from
smart TVs to automatic opening garages.
Born in Hawaii in 1971 with the Alohanet project and then became an IEEE standard around 1997 with 802.11a. The wave
frequency used for communication was initially equal to 2.4Ghz, well above 4G - today’s cellular connections, for example,
which work at about 2.6Mhz, but then, obviously over time, the standard 802.11 has evolved, with important breakthroughs
such as the implantation of MIMO technology, which allows you to expand "physically" the band using multiple antennas
and multiple receivers and the support of 5Ghz (as before it was reserved for some use and in some specific country).
All the implementations and improvements that concern the transmission of wireless networks are collected in nomencla-
ture instead of using IEEE acronyms. Today we are in fact in the Wi-Fi 6 standard and we are going towards Wi-Fi 7, always
with more bandwidth, optimized consumption and performance in terms of latency and security.
In short, its use and continuous evolution does not stop, considering that today there are estimated to be over 500 million
hotspots in the world.
The capillarity is disarming as reported by WiGLE ( https://wigle.net/) in the single portion of New York:
15
AIRGEDDON - A
QUICK GUIDE TO
WI-FI HACKING
FOR NEWBIES
ALI ZAOUI
27 years from Algeria (North Africa)
Prof.
17
Airgeddon - a Quick Guide to WiFi Hacking for Newbies
Introduction
Many people think that their wireless network is safe from hacking because it is protected by WPA1 or WPA2 encryption
and by using a strong password with different characters and symbols. And yes, it is certainly hard to crack a strong pass-
word because you need a high-performance machine and time, and comparing (WPA1-WPA2) and WPS or WEP, it is clear
that WPA2 encryption is the best.
However, is there a way to break the wifi protection without cracking the password?
There is! A fantastic way called the Evil Twin attack, used in social engineering. There are many tools that can perform the
evil twin attack. From my experience, the best Wi-Fi hacking program for beginners is Airgeddon.
Airgeddon makes things easy for you, from putting the wireless card on monitor mode and selecting target, through captur-
ing the handshake, to cracking the Wi-Fi (WPA1 and WPA2), or performing an evil twin attack (to do this, you’ll need an ex-
ternal wireless card). It is also constantly evolving by adding new features.
Installation
Airgeddon requires other programs that you can find on almost every distribution designed for cyber security (i.e. Parrot,
Kali, Arch, etc.).
Method 1:
> by git
First, let’s open the terminal as a root using the command ‘sudo su’, and enter your password ****
18
PERFORMING A
PENTEST ON A
WIRELESS
NETWORK -
PRACTICAL CASE
JOAS ANTONIO DOS SANTOS
+8 years of academic and professional experience, Instructor
20
Performing a Pentest on A Wireless Network - Practical Case
Introduction
The Pandemic has brought us several changes in the way we are going to work from now on, especially in the cybersecurity
area, even though working remotely has been a reality for a long time. But sometimes it's quite difficult to work away from
the company or one of our clients, of course, that's what we would think.
But why am I saying this? I recently did a Wireless Network PenTest for a client, looking to test the security of their Wi-Fi
networks that were used in their office, and for those who made the OSWP know that a connected wireless card and SSH
access is enough for we started our audit and that's how we got here.
However, a pentest in Wireless Network is not the starting point anyway, and having a methodology is important, I use this
methodology which is separated into five topics.
Recognition
Information Collection
Package Analysis
Exploration
Post Exploration
Recognition
In the Recognition part, we can check the wi-fi networks that we can see; for that we can use some tools to help us.
Kismet
A very good tool is Kismet, a good wireless network analyzer, very powerful for performing pentesting and auditing.
Let's open Kismet, just access the terminal and type "kismet":
21
IMPROVED CYBER
SECURITY ON HIGHER
EDUCATION
INSTITUTES: A CASE
STUDY ON WIRELESS
NETWORKS SECURITY
LOCHANA KORALAGE
Lochana Koralage is an experienced Systems Engineer, currently
Security.
23
Improved Cyber Security on Higher Education Institutes: a Case
Study on Wireless Networks Security
Wireless Networks are part and parcel of our daily life as it is seemingly everywhere. Wi-Fi is a commodity of every person,
every home and organization with proper access and resources. However, only a few people are aware of the risks they are
facing in using wireless networks and exchanging information through these types of networks.
Therefore, through this case Study it is expected to first discuss basic concepts related to wireless networks, information ex-
change through these networks and configuration of security. Then it is expected to discuss the basic ideas of security
threats and existing mitigations in general in wireless networks.
Finally, the key objective of the case study is to focus on campus networks and implementing security in using campus net-
works for information interchange and different research conducted on enhancing the related security through different
protocols and principles.
In general, we can identify different threats posed upon wireless networks and information exchange through them. Wire-
less networks provide a false sense of security and comfort to the users who connect through Wi-Fi to exchange informa-
tion. The reason for this risk is mainly due to the ease of setting up a wireless network by a person with a little technological
knowledge with the access to technology in the modern world. Yet, security is not ensured in this manner. It is believed that
around 40 to 50 percent of the users have lesser, unreliable network security in Wi-Fi usage.
The cost advantage of using Wi-Fi is the key reason for choosing Wi-Fi by many small and medium scale businesses and
small home networks as well. Yet, this advantage gets cancelled out by the high risk they are facing in exchanging private
documents with a monetary value of information. Figure 1 shows some of the risks faced by unsecured cyber security net-
works. Most of them are directly affecting unsecured Wi-Fi networks as well.
24
EVADING FIREWALLS
& ENUMERATING
SNMP USING
ADVANCED NMAP
TECHNIQUES
DR. AKASHDEEP BHARDWAJ
Dr. Akashdeep Bhardwaj is working as Professor (Cybersecurity
26
Evading Firewalls & Enumerating SNMP Using Advanced
NMAP Techniques
Abstract
You’ve been asked to gather information about a network and its systems (hosts) – about which you have no idea. It is an
unknown network. You are asked to find live IP addresses, network interfaces, hosts running apps, services, OS and their
versions, or simply the open or closed ports. But you are completely blank! This is where NMAP, or Network Mapper,
comes in. We can perform reconnaissance using NMAP to probe the network and systems inside it, craft our TCP packets,
and send them to the targets. You can evade firewalls and Intrusion Detection Systems when gathering valuable informa-
tion from target networks and systems. The information gathered can further be used for penetration testing – search vul-
nerabilities!
Introduction
Nmap (Network Mapper) is a network scanning and host detection programme that comes in handy throughout various
stages of ethical hacking and penetration testing. Nmap is a sophisticated programme that may be used for vulnerability de-
tection or as a security scanner. It is not restricted to just gathering information and enumeration. Nmap is a multifunc-
tional application that works on a variety of platforms, including Kali, Windows, BSD, Linux, and Mac. This paper presents
the advanced level role of NMAP for performing advanced information gathering and recon of hosts and networks. This as-
sumes the readers have prior knowledge and skills of basic NMAP usage. We’ll instead focus on using NMAP to bypass Fire-
walls and the use of NMAP scripts.
Evading Firewalls
Decoy Scan: Scan target as if it is being scanned from another system (gateway) as:
NMAP can also use Random Spoofed IP Address to scan targets: # sudo nmap –D RND:5 IP Address
27
FACIAL RECOGNITION
USING RASPBERRY PI
AND PI CAMERA (IOT
PROTOCOL FOCUS:
MQTT)
SHOUMIT KARNIK
I am a Cybersecurity Professional working to solve Cybersecu-
29
SOURYADIP SENGUPTA
Internet games were my favorite hobby as a child but the internet was locked with a password
by my parents, since they didn't want me to be spending such long hours in front of the com-
puter. I at that time learnt about password cracking techniques, trying to guess passwords or
use other people's internet connection to play my favorite online game as well as download one
to be played offline. With the introduction of social media in 2008 I learnt more about website
and how passwords could be stolen by few tricks shown online. All of this made me feel hacking
which was a thing of science fiction can be done in reality, only here the hacker is minus a
hooded jacket. My true cybersecurity journey began with Ernst and Young (EY) with Identity and
Access Management (IAM) where I was exposed to plethora of security concepts, learning on
the job was exciting but I always wanted to be a master of the skills I learn. Moreover learn the
art of in depth structured research and working along with bright minds to solve bigger issues
within the industry. University of Maryland had a perfect course as it focused on applied cyberse-
curity and I really enjoyed the learning experience while pursuing my own projects. One such
was the IoT project of face recognition with MQTT. The purpose was to use new technology and
embed the right security so that authentication can be granted. I did this project with my peer/
friend Shoumit without whose contributions the output would be only half its value. I really en-
joyed this project and it helped me better understand network stacks, security in different layers
and assisted me to land a job at Intel working with
30 product security team.
Facial Recognition using Raspberry Pi and Pi Camera
The project idea was to implement facial recognition using the Raspberry Pi single-board computer along with the Pi Cam-
era attachment. The IoT protocol used to transmit the images between the simulated cloud environment (local machine)
and the Raspberry Pi will be MQTT (Message Queuing Telemetry Transport) and the local environment would be used to
identify the person. Facial recognition through OpenCV would be used to identify the captured image from the Pi Camera.
Architecture Diagram
Use Case(s)
Home Automation: Unlocking doors, identifying residents and guests visiting homes.
Oil and Gas industries: Placed in critical locations where human access is limited to monitor risk zones.
31
ENCODING/
DECODING THINGS
WITH CODEXT
A PYTHON PACKAGE FEATURING CLI
TOOLS FOR ENCODING AND
DECODING MANY THINGS
ALEXANDRE D’HONDT
33
Encoding/Decoding Things with CodExt
Abstract
Python provides a native package for handling encodings called codecs. It has a neat API defining codecs for encoding/
decoding with various well-known encodings, especially for dealing with special characters. However, it contains a limited
set of codecs and does not handle multi-layered encoded inputs.
That is where codext comes into play, the CODecs EXTension. It provides various features for easily enriching the registry
of codecs from the native library, increases this with many new encodings, and provides multi-layer guessing relying on an
artificial intelligence algorithm.
This article explains its basics and presents some of its capabilities.
1.Introduction
Encoding or decoding data is a common operation, especially when dealing with special characters like Cyrillic or Chinese.
These kinds of encodings are handled by a native library in Python called codecs. In security, we can also encrypt some-
thing and then base64-encode it to transform the ciphertext to a limited set of printable characters. This is something also
handled by codecs. However, its registry of codecs is relatively limited and mostly contains classical encodings for special
characters.
Therefore, providing a programming interface for manipulating the registry of codecs is a first challenge. Afterwards, it
could be interesting to provide a guess feature for addressing multi-layer encodings. This can be handled by an artificial in-
telligence algorithm like a tree search, optimized with a scoring heuristic for ranking best-matching encodings. All these
challenges are addressed in codext [1], the CODecs EXTension.
The remainder of this article presents the enhanced API and the extended registry of codecs. Then it explains the guess fea-
ture and the tuning of its parameters for refining a search, converging towards the right decoded output. Finally, it shows
the related Command-Line Interface tools shipped with the package with some usage examples.
2.Codecs registry
The registry of codecs is the structure that contains the definitions of codecs. First, this subsection presents how to inspect
existing codecs and then how codecs can be added or removed from this registry.
When looking at the source code of codecs, we can see that it imports various objects from _codecs (a shared object), in-
cluding a lookup function for returning a CodecInfo instance holding the attributes of a codec and its encode/decode
functions. This lookup works by walking the registry, an ordered list of so-called search functions. These functions, when
called with a string, return matching CodecInfo instances. This way, while walking this registry, the first search function
34
INVESTIGATE
FINANCIAL FRAUD
CRIMES USING
GRAPH
TECHNIQUES
DR. AKASHDEEP BHARDWAJ
Dr. Akashdeep Bhardwaj is working as Professor (Cybersecurity
36
Investigate Financial Fraud Crimes Using Graph Techniques
Abstract
Money laundering, terrorism funding, corruption, tax evasion, insurance fraud, are a few examples of financial fraud
crimes. To avoid jail time or penalties, offenders must cover their traces in all of these circumstances. That includes using
fake identities, middlemen, intricate financial schemes, and other techniques to create layers of obfuscation between their
identity and their wrongdoings. Law enforcement authorities, financial institutions, and other fraud detection specialists,
on the other hand, are seeking proof of wrongdoing. New graph technologies provide a one-of-a-kind opportunity to iden-
tify financial criminals:
Comprehensive view of each entity entangled in the crime web with relationships
By ingesting unrelated, unstructured information of suspicious users and their relations, detectives perform advanced inves-
tigations combined with real-time alerts and detection capabilities to fight financial crimes. Failure to do so might result in
fines of billions of dollars. How can banks and financial organizations establish linkages between their clients and their per-
sonal information (geolocations, IP addresses, bank accounts, transactions, etc.) and known criminals and terrorists?
37