How To Hack A Wi-Fi by Krishna Srinivas (FileCR)
How To Hack A Wi-Fi by Krishna Srinivas (FileCR)
First edition
This book was professionally typeset on Reedsy. Find out more at reedsy.com
wireless network is a network that uses radio waves to link computers and
other devices together. The implementation is done at the Layer 1 (physical
layer)
You will need a wireless network enabled device such as a laptop, tablet,
smartphones, etc. You will also need to be within the transmission radius of a
wireless network access point. Most devices (if the wireless network option is
turned on) will provide you with a list of available networks. If the network is
not password protected, then you just have to click on connect. If it is
password protected, then you will need the password to gain access.
WEP
WEP is the acronym for Wired Equivalent Privacy. It was developed for
IEEE 802.11 WLAN standards. Its goal was to provide the privacy equivalent
to that provided by wired networks. WEP works by encrypting the data been
transmitted over the network to keep it safe from eavesdropping.
WEP Authentication
Open System Authentication (OSA) – this methods grants
accesstostationauthenticationrequestedbasedontheconfigured access policy.
Shared Key Authentication (SKA) – This method sends to an encrypted
challenge to the station requesting access. The station encrypts the challenge
with its key then responds. If the encrypted challenge matches the AP value,
then access is granted.
WEP Weakness
WEP has significant design flaws and vulnerabilities.
Because of these security flaws, WEP has been deprecated in favor of WPA
WPA
• Passive cracking– this type of cracking has no effect on the network traffic
until the WEP security has been cracked. It is difficult to detect.
• Active cracking– this type of attack has an increased load effect on the
network traffic. It is easy to detect compared to passive cracking. It is more
effective compared to passive cracking.
WPA Cracking
• CowPatty– this tool is used to crack pre-shared keys (PSK) using brute
force attack. http://wirelessdefence. org/Contents/coWPAttyMain.htm
• Cain & Abel– this tool can be used to decode capture files from other
sniffing programs such as Wireshark. The capture files may contain WEP or
WPA-PSK encoded frames. http://www.softpedia.com/get/Security/
Decrypting-Decoding/Cain-and-Abel.shtml
We will provide you with basic information that can help you get started.
Backtrack is a Linux-based security operating system. It is developed on top
of Ubuntu. Backtrack comes with a number of security tools. Backtrack can
be used to gather information, assess vulnerabilities and perform exploits
among other things.
• Metasploit
• Wireshark
• Aircrack-ng
• NMap
• Ophcrack
In this practical scenario, we are going to use Cain and Abel to decode the
stored wireless network passwords in Windows. We will also provide useful
information that can be used to crack the WEP and WPA keys of wireless
networks.
• The decoder will show you the encryption type, SSID and the password that
was used.
Summary