Module 16
Module 16
As a professional ethical hacker or pen tester, your next step in hacking wireless networks is to
capture and analyze the traffic of the target wireless network.
This wireless traffic analysis will help you to determine the weaknesses and vulnerable devices in
the target network. In the process, you will determine the network's broadcasted SSID, the
presence of multiple access points, the possibility of recovering SSIDs, the authentication
method used, WLAN encryption algorithms, etc.
The labs in this exercise demonstrate how to use various tools and techniques to capture and
analyze the traffic of the target wireless network.
Lab Objectives
Wireless traffic analysis helps in determining the appropriate strategy for a successful attack. Wi-
Fi protocols are unique at Layer 2, and traffic over the air is not serialized, which makes it easy to
sniff and analyze wireless packets. You can use various Wi-Fi packet-sniffing tools to capture
and analyze the traffic of a target wireless network.
In order to capture wireless traffic, a wireless adapter is required and using an adapter in the
iLabs environment is not possible, therefore, in this lab, we are using a sample capture file
(WPA2crack-01.cap) to analyze wireless packets.
2. Click windows Search icon on the Desktop, search for Wireshark in the search
bar and launch it.
If Software Update window appears, click Skip this version to close it.
4. In the menu bar, click File and click Open option from the drop-down list.
You can access the saved packet capture file anytime, and by issuing packet
filtering commands in the Filter field, you can narrow down the packet search in
an attempt to find packets containing sensible information.
In real time, attackers enforce packet capture and packet filtering techniques to
capture packets containing passwords (only for websites implemented on HTTP
channel), perform attacks such as session hijacking, and so on.
7. This concludes the demonstration of how to analyze Wi-Fi packets using
Wireshark.
8. Close all open windows and document all the acquired information.
9. You can also use other wireless traffic analyzers such as AirMagnet WiFi
Analyzer PRO (https://www.netally.com), SteelCentral Packet
Analyzer (https://www.riverbed.com), Omnipeek Network Protocol
Analyzer (https://www.liveaction.com), and CommView for Wi-
Fi (https://www.tamos.com) to analyze Wi-Fi traffic.
Question 16.1.1.1
Use the Wi-Fi packet-sniffing tool Wireshark to analyze captured Wi-Fi packets (WPA2crack-
01.cap). Enter the protocol that indicates the wireless packets. Note: sample captured Wi-Fi
packets are available at E:\CEH-Tools\CEHv13 Module 16 Hacking Wireless Networks\Sample
Captures.
Lab 2: Perform Wireless Attacks
Lab Scenario
As an expert ethical hacker or pen tester, you must have the required knowledge to perform
wireless attacks in order to test the target network's security infrastructure.
After performing the discovery, mapping, and analysis of the target wireless network, you
have gathered enough information to launch an attack. You should now carry out various
types of attacks on the target network, including Wi-Fi encryption cracking (WPA2),
fragmentation, MAC spoofing, DoS, and ARP poisoning attacks.
As an ethical hacker and pen tester of an organization, you must test its wireless security,
exploit WPA2 flaws, and crack the network's access point keys.
The labs in this exercise demonstrate how to perform wireless attacks using various hacking
tools and techniques.
Lab Objectives
There are several different types of Wi-Fi attacks that attackers use to eavesdrop on wireless
network connections in order to obtain sensitive information such as passwords, banking
credentials, and medical records, as well as to spread malware.
These include:
• MAC spoofing attack: The attacker changes their MAC address to that of an
authenticated user in order to bypass the access point's MAC-filtering
configuration
• Disassociation attack: The attacker makes the victim unavailable to other wireless
devices by destroying the connectivity between the access point and client
• Wireless ARP poisoning attack: An attack technique that exploits the lack of a
verification mechanism in the ARP protocol by corrupting the ARP cache
maintained by the OS in order to associate the attacker's MAC address with the
target host
• Rogue access points: Wireless access points that an attacker installs on a network
without authorization and that are not under the management of the network
administrator
• Evil twin: A fraudulent wireless access point that pretends to be a legitimate access
point by imitating another network name
In this task, we will use the Aircrack-ng suite to crack a WPA2 network.
Before starting this task, you need to configure your access point router (ECC Labs) to work
in WPA2-PSK (Pre-Shared Key) encryption mode. To do so, navigate to the router's default
IP address and change the authentication mode to WPA2-PSK, with the password
as 12345678.
In order to capture wireless traffic, a wireless adapter is required and using an adapter in the
iLabs environment is not possible, therefore, in this lab, we are using a sample capture file
(WPA2crack-01.cap) to crack WPA key.
1. Click Parrot Security to switch to the Parrot Security machine and login
with attacker/toor.
To copy the folders, firstly select both the folders and then press Ctrl+C.
4. Now, navigate to the Desktop and press Ctrl+V to paste the copied folders
(Sample Captures and Wordlist). Close the Desktop window.
5. Open a Terminal window and execute sudo su to run the programs as a root
user (When prompted, enter the password toor).
If the password is complex, aircrack-ng will take a long time to crack it.
8. This concludes the demonstration of how to crack a WPA2 network using
Aircrack-ng.
9. Close all open windows and document all the acquired information.
10. You can also use other tools such as hashcat (https://hashcat.net), Portable
Penetrator (https://www.secpoint.com), WepCrackGui (https://sourceforge.
net) to crack WEP/WPA/WPA2 encryption.
Question 16.2.1.1
Use the Aircrack-ng suite to crack a WPA2 network. Enter the key found in this exercise.
Note: sample captured Wi-Fi packets and wordlist are available at
/home/attacker/Desktop/CEHv13 Module 16 Hacking Wireless Networks