EH Mod4
EH Mod4
This is the most widely used wireless password cracking tool. Aircrack-ng is a wireless security framework
with a suite of tools used to capture wireless traffic. It is used to crack and recover WEP/WPA/WPA2
keys. The suite of tools can be used to perform the following: monitoring (capturing of network traffic),
attack (carry out de-authentication attacks and replay attacks), testing (testing of hardware wireless
capabilities) and cracking (WEP, WPA and WPA2 pre-shared keys).
Can be used to crack and recover the WEP pre-shared key using the PTW approach or
FMS/KoreK method. (statistical attacks in combination with brute-forcing) making it faster than
other WEP password cracking tools.
Can be used with any network interface card (NIC) which supports raw monitoring mode.
Can be used for WPA/WPA2 pre-shared keys cracking using dictionary-based attacks.
Kismet
Kismet is an open-source wireless network device detector, sniffer, wardriving tool, GPS mapping tool
and wireless intrusion detection system framework. It is a passive sniffer which allows it to discover
hidden wireless networks while hiding itself. It works with Wi-Fi interfaces, Bluetooth interfaces and
other specialized capture hardware. Some of its features include:
Can be used for its radio frequency monitoring mode (rfmon) which allows the user to monitor
traffic and identify wireless networks without associating with an access point.
Displays all the packets it captures without limiting it to those specific to one access point
broadcasting under one SSID.
Identifies WAPs in use, SSIDS and the type of encryption used on a network.
Can be used to identify common trends in network usage, network strength and WAP
configuration.
This is a python-based tool with a graphical user interface used to perform wireless security audits and
attacks. It is used to crack and recover WEP/WPA/WPS keys. It can also be used to carry out other
network-based attacks on wireless and wired networks. Some of its features includes:
Can be run on Windows, macOS and Linux platforms.
Can be used for WEP cracking using attacks such as ARP Request Replay, Caffe-Latte attacks,
Chop-Chop attacks and more.
Can be used for WPA/WPA2 cracking using dictionary-based attacks or WPS-based attacks.
Can be used to perform brute force attacks on HTTP, HTTPS, TELNET and FTP servers.
Can be used for session hijacking in various modes such as passive modes, ethernet modes and
more.
4. Wifite
Wifite is used for attacking WEP/WPA/WPS encrypted wireless networks simultaneously. It can also be
used for auditing wireless networks via a "set it and forget it" method. It utilizes the tools associated
with Aircrack-ng, Reaver and PixieWPS. Some of its features include:
Can be used to detect access points (targets) by their signal strengths and cracks the closest
access points first.
Can be easily customizable to automate the attack process (with settings around
WEP/WPA/Both, above certain signal strengths, channels and more).
Can be used to capture the required information needed for a pixie-dust attack by the PixieWPS
tool.
Makes the attacker anonymous by changing the attacker's MAC address before the attack and
when the attack is completed.
5. PixieWPS
PixieWPS is a c-language-based tool used to brute-force the WPS pin offline (usually displayed at the
back of a router). It uses the "pixie-dust attack" by exploiting a WPS vulnerability allowing the WPS pin to
be recovered within seconds or minutes depending on the target (if vulnerable). Some of its features
include:
Checksum optimizations.
Reduces the entropy of the seed from 32 bits to 25 bits for some access points.
Before it can be used, it requires the following: enrollee public key, registrant public key, enrollee
hash-1, enrollee hash-2, authentication session key and enrollee nonce. It is often run as part of
Wifite.
6. WireShark
WireShark is a network sniffer and protocol analyzer used in intercepting and capturing network traffic
and logging it for further analysis. These logs can be analyzed to detect data and information such as
passwords sent in data packets across the network. Some of its features include:
Can be run on Windows, Linux and iOS platforms.
Provides a large number of built-in protocol dissectors allowing it to be able to identify different
types of network traffic and breaks them into easily readable format.
Provides built-in traffic coloring filtering and connection following to assist with log analysis.
Can be run on promiscuous mode allowing Wireshark to capture all the packets it can over the
network.
Bluetooth devices
7. Spooftooph
Spooftooph is a tool used to automate spoofing or cloning of Bluetooth device information such as
device name, class, address and more. Some of its features include:
8. BlueMaho
BlueMaho is an open-source, python-based Bluetooth framework with a suite of tools used for testing
the security of Bluetooth devices. Some of its features includes:
Can be used to scan devices for information such as Service Discovery Protocol ("SDP") records,
vendor information, device information and more.
Can be used to track devices providing information about their location, the number of times the
device has been seen and its name change history.
Can be used to configure actions to be carried when a new device has been identified.
Allows the use of more than one Bluetooth adapter for testing (one can be used for scanning
and the other used for running exploits).
Can be used to test the device for known and unknown vulnerabilities.
Can be used to change the name, class, mode and device address of local HCI devices.
### Tools for Web Attackers and Security Testers & Hacking Wireless Networks
This note provides a detailed overview of tools and techniques commonly used by web attackers and
security testers. It also includes methods for hacking wireless networks, emphasizing their functionality
and significance in penetration testing.
---
Web attackers and security testers use various tools to identify vulnerabilities in web applications. These
tools are categorized based on their purpose, such as scanning, exploiting, monitoring, and reporting.
These tools gather information about the target web application or network to identify vulnerabilities.
- **Usage:** Detect live hosts, operating systems, and versions of running services.
- **Example:** Running `nmap -sS -p 80 example.com` scans port 80 (HTTP) for potential vulnerabilities.
- **Purpose:** Web server scanner that checks for outdated software and misconfigurations.
- **Features:**
- **Use Case:** Scanning a server to ensure it is free from vulnerabilities like outdated Apache versions.
#### **c. OWASP ZAP (Zed Attack Proxy):**
- **Features:**
- Proxy-based interception.
- **Example:** Detecting SQL Injection or Cross-Site Scripting (XSS) flaws in a web form.
---
- **Features:**
- **Features:**
---
### **1.3. Monitoring Tools**
- **Example:** Analyzing an HTTP packet to identify sensitive data, such as passwords, sent in plaintext.
- **Features:**
---
- **Features:**
Hacking wireless networks involves exploiting weaknesses in wireless communication protocols. Security
testers use these techniques to assess vulnerabilities in Wi-Fi networks.
---
- **Process:**
- **Description:** A variation of the rogue access point attack, designed to mimic an actual Wi-Fi
network closely.
---
- **Features:**
- **Features:**
---
- **Methodology:**
- WEP uses weak encryption that can be cracked using tools like Aircrack-ng.
- Collect IVs from a network and use them to derive the encryption key.
---
- **Tools:** Aireplay-ng.
---
- **Disabling WPS:**
- **Network Segmentation:**
- **Regular Audits:**
---
### Conclusion
Understanding tools for web attackers and wireless hacking helps both attackers and security testers. For
attackers, these tools reveal vulnerabilities; for testers, they provide insights to strengthen systems.
Employing strong encryption, regular monitoring, and awareness of these tools is crucial for robust
cybersecurity.