Wireless Network Security Software
Wireless Network Security Software
info
RESEARCH ARTICLE
Air crack set of tools. The test was conducted on Wireless network card capable of monitor
Back Track operating system which is considered mode and packet injection with Atheros
as dedicated penetration testing operating system. chipset (TP-LINK TL-WN722N 150Mbps
In the test result, we found out that WEP is the High-Gain)
weakest, to which WPA was a temporary solution
and WPA2 is a very solid and long term solution. IMPLEMENTATION
Step 6: Crack the password using Aircrack-ng [2] Such a network has weak security and can be
and a password list. Use “aircrack-ng –w secured by using a strong passphrase. Passphrase
/path/to/password_file.lst –b XX: XX: XX: XX: must not be a common language word. It must be a
XX: XX /path/to/capture file/nname-01.cap” random combination of alphabets, numbers and
special symbols which makes it hard to guess.
Available wordlists won’t contain such random
password.
The table below shows the password strength in
terms of entropy and its grade with respect to
security.
password through fake webpage. DNS spoofing attacks. Such attack can be avoided
Step 9: Start services by educating user about social engineering,
Use “/etc/init.d/mysql start” to start MYSQL [5] phishing and security issues of open Wi-Fi.
server.
Use “/etc/init.d/apache2 start” to start Apache [6] MAC Spoofing
web server. Access points might have filtered MAC addresses.
Use “service isc-dhcp-server start” to start DHCP MAC spoofing attack uses MAC address of
[7]
server. authentic users to gain access to networks with
Step 10: Start fake DNS server using “dnschef – such increased security.
fakeip=10.0.0.1 –i 10.0.0.1 -q” where “dnschef”
[8]
is used to setup fake DNS server. Step 1: Extract details of target network such as
Step 11: De-authenticate all users using “aireplay- ESSID, BSSID, channel number and target client
ng –c X –a XX:XX:XX:XX:XX:XX wlan0mon” MAC address using methodology similar to
where “X” is the channel number and Handshake Capture.
“XX:XX:XX:XX:XX:XX” is the ESSID of target Step 2: Use following commands to spoof MAC
network. address:
Step 12: If a targeted client connects to the fake “ifconfig wlan0 down”
access point it would get a socially engineered “macchanger –m XX:XX:XX:XX:XX:XX wlan0”
webpage asking for WPA password to upgrade “ifconfig wlan0 up”
router firmware. where “macchanger” [9] program is used to spoof
MAC address and “XX:XX:XX:XX:XX:XX” is
target client MAC address.
Step 3: Create wpa_supplicant [10] file for
connecting to the target network manually. Use
“wpa_passphrase ESSID Password
/path/to/wpa_file.conf” where “ESSID” is the
network name, “wpa_passphrase” [11] is used to
generate wpa_supplicant configuration file and
“Password” is the known network password.
Step 4: Try to connect to the target network
manually. Use “wpa_supplicant –D wext –i wlan0
–c /path/to/wpa_file.conf” where “wext” is the
wireless driver.
Step 5: Run DHCP client program to get IP for
Fig. 4: Fake socially engineered webpage.
the connected interface. Use “dhclient wlan0”
where “dhclient” [12] is used to configure client IP
If the client enters the password, it is stored in
address.
database on attacker’s machine and client is
redirected to a fake firmware upgrading page.
14
© 2015, AJCSE. All Rights Reserved.
Mahape Ameya et al.\ Wireless Network Security Software
similar to Handshake Capture using “airmon-ng”.
Collect MAC address of clients connected to
target network from packet capture file.
Use “readarray -t value < <(grep -i -e
XX:XX:XX:XX:XX:XX /path/to/capture_file-
01.cap | cut -b -17)” where
“XX:XX:XX:XX:XX:XX” is the target ESSID.
Step 2: Continuously unicast and broadcast de-
authentication frames for all clients.
Use “aireplay-ng –c X –a
XX:XX:XX:XX:XX:XX wlan0mon” to broadcast
de-authentication frames where “X” is the channel
number and “XX:XX:XX:XX:XX:XX” is the
Fig. 6: Target client connection details. ESSID of target network.
Use “aireplay-ng –c X –a
If successful, wireless interface “wlan0” will get XX:XX:XX:XX:XX:XX –c
an IP address same as the target client. Using YY:YY:YY:YY:YY:YY wlan0mon” to unicast
AJCSE, May-June, 2017, Vol. 2, Issue 3
RESULT
Fig. 8: Connection status during IP conflict. WPA/WPA2 provides nominal security when used
as WPA-Personal. Network security depends
However, neither client nor attacker can get entirely on the password strength and user’s
proper connection. But if target client is not knowledge about the wireless system.
transmitting or receiving any data then attacker’s
machine gets continuous access to the network. Handshake Capture
This attack can be slowed down by continuously Captured handshake can be used to crack network
checking connection with the AP. password only if the password is weak. If
password is a random combination of ASCII
Wireless Denial of Service (DOS) characters then it is highly unlikely that it would
Wireless DOS attack uses de-authentication be present in any precompiled wordlists. This can
frames to continuously disconnect all clients prevent dictionary attacks. Also using passwords
connected to target network. of length greater than 10 characters makes brute
force attacks impossible as number of possible
Step 1: Capture packets using monitor mode
15
© 2015, AJCSE. All Rights Reserved.
Mahape Ameya et al.\ Wireless Network Security Software
passwords increase exponentially with password focuses on social engineering a fake webpage to
length. get Wi-Fi credentials. This attack can be avoided
by educating users about phishing, social
Evil Twin engineering and security risks of open Wi-Fi.
Evil Twin attack tricks target client into entering MAC Spoofing disconnects legitimate user and
network WPA password using socially engineered spoofs its MAC to get its IP from access point.
webpage. This attack works due to user’s lack of This attack can be slowed down by continuously
knowledge about the wireless system. It can be checking network connection and connecting to
avoided by educating users about phishing and the network but cannot be avoided. Wi-Fi DOS
social engineering and also about security issues attack de-authenticates all connected clients with
of open Wi-Fi. unicast and broadcast frames. This attack can be
stopped by locating attacker physically and
MAC Spoofing stopping the attack.
In MAC Spoofing client’s MAC address is
AJCSE, May-June, 2017, Vol. 2, Issue 3
16
© 2015, AJCSE. All Rights Reserved.