0% found this document useful (0 votes)
32 views7 pages

2 Renas712998

Uploaded by

Roberto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

2 Renas712998

Uploaded by

Roberto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/349059692

Penetration Testing: Wireless Network Attacks Method on Kali Linux OS

Article in Academic Journal of Nawroz University · February 2021


DOI: 10.25007/ajnu.v10n1a998

CITATIONS READS

21 9,203

1 author:

Renas Rajab Asaad


Independent Researcher
49 PUBLICATIONS 322 CITATIONS

SEE PROFILE

All content following this page was uploaded by Renas Rajab Asaad on 06 April 2021.

The user has requested enhancement of the downloaded file.


Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021
This is an open access article distributed under the Creative Commons Attribution License
Copyright ©2017. e-ISSN: 2520-789X
https://doi.org/10.25007/ajnu.v10n1a998

Penetration Testing: Wireless Network Attacks Methods on


Kali Linux OS
Renas R. Asaad,
Department of Computer Science & I.T, Nawroz University, Duhok, Kurdistan Region – Iraq

ABSTRACT
This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This
study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The
brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a
time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash
algorithm and SHA-512 (Linux). In this article, we will learn about the various wireless attacks. These days, wireless networks
are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an
Ethernet cable to gain Internet access is not feasible. For this convenience, wireless connections are not as secure as Ethernet
connections. In this article, we will explore various methods for manipulating wireless attacks and their techniques including
several methods on Linux.

Keywords: Wireless Network, Hashcat, Vulnerability Assessment, Kali Linux.

1. Introduction
Wireless networks become useful nowadays. They
2. Literature Review
utilized all over the world in several fields of security,
Kali Linux is the world’s most powerful and popular
at domestic, at work and indeed open places in arrange
penetration testing platform, used by security
to associate to the Web and do a trade or private things
professionals in a wide range of specializations,
[1,2]. Other than all the points of interest in making
including penetration testing, forensics, reverse
commerce and life simpler, there are certain
engineering, and vulnerability assessment. It is the
downsides in terms of dangers. The frailty of remote
culmination of years of refinement and the result of a
systems has been causing a part of inconvenience in
continuous evolution of the platform, from WHoppiX
terms of breaking into banks, companies, and
to WHAX, to BackTrack, and now to a complete
government organizations. The recurrence of these
penetration testing framework leveraging many
assaults is as it heightened, as to organize chairmen are
features of Debian GNU/Linux and the vibrant open
not completely harmonized when it comes to securing
source community worldwide. Kali Linux has not been
remote systems in a strong and reliable way[3]. A
built to be a simple collection of tools, but rather a
remote network can be split utilizing Kali Linux
flexible framework that professional penetration
working framework and it'll be spoken to within the
testers, security enthusiasts, students, and amateurs
segment that takes after. Remote systems have gotten
can customize to fit their specific needs.
to display all over. They are used all over the world
3. Implementation
totally different regions of life, at domestic, at work
A multifunctional device for wireless internet access
and indeed open places in arrange to associate to the
„Huawei HG530“ by „Huawei Technologies“ will be
Web and do commerce or private things[1,4].

7
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021

used for this cybersecurity research. As an end device 3.1 Cracking Wireless Network in Kali Linux
a smart phone with operating system Android v4.2.2 In this section will discussed the two methods of
is used. The attacking system is mobile computer with cracking, and the two methods rely on different
OS KALI LINUX, figure 1 shows explanation techniques to crack or break the safety barrier on
steps[2,5]. victim’s router, the methods are:
a. Online Method Depends on:
- Identify username.
- Check cat command for wordlist.
- Using Secure Shell Protocol.
- Brute-Force Attacking.
b. Offline Method Depends on:
- Message-Digest hashing (MD5).
- Hashcat algorithm.
- Hash Type “Sha-512 (Linux)”.
- Straight attacking.
- Hash Type NTLM.

3.2 Packet Transfer:


Fig. 1: Local Network
Each manufactory generate a unique Media Access
The KALI operating system uses a wide variety of
Control (MAC Address) to Identify PCs and its called
network penetration test instruments, including
a physical address[11,10]. For transferring any packet
“Aircrack”, which are updated regularly. The free
the MAC address and destination MAC are used. And
distribution helps all age audience with different
it can be changed by “MAC Changer”:
technical skills to experience networks and systems
> 𝑖𝑓𝑐𝑜𝑛𝑓𝑖𝑔 [𝑡𝑦𝑝𝑒] 𝑑𝑜𝑤𝑛
security testing. The common well-known attack for > 𝑚𝑎𝑐𝑐ℎ𝑎𝑛𝑔𝑒𝑟 − 𝑚 [𝑀𝐴𝐶] [𝑡𝑦𝑝𝑒]
the wireless networks is “Man-in-the-Middle” > 𝑖𝑓𝑐𝑜𝑛𝑓𝑖𝑔 [𝑡𝑦𝑝𝑒] 𝑢𝑝

(MITM)[6]. Intrusions in social networks 4. Common Methods of Attacks


infrastructures are prohibited, and for this reason, a 4.1 Aircrack
separate wireless network is built for the research Aircrack-ng, is a good point of contact together, and
purpose. The limited resources, like processing time together, it represents the aggregation of networks,
and RAM memory in the test machine lead to possible and the tool makes it possible to achieve this by means
variations in the results obtained with different of grouping methods, guesswork platform, and great
equipment [7]. In this research, two test destinations encryption of passwords, and grouping them together.
will be used: Very good, very good on this page.
- network access by WPA-2 passphrase cracking.
4.2 Wireshark
- network access by WPS PIN exposure.
Wireshark tool, a tool designed in 1998 and created by
the creator Gerald Combs, as for the language used
was C and C ++, its main name was Ethereal, but it was
changed in 2006 due to problems in choosing the
brand, it is considered one of the tools of internal
penetration, and we mean internal penetration
Hacking local networks, the main goal of the tool is to
listen and eavesdrop on the data that is passed on the
Fig.2: Hash Structure
8
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021

network, if I use Wireshark while I am connected to a $ 𝑎𝑖𝑟𝑚𝑜𝑛 − 𝑛𝑔 𝑐ℎ𝑒𝑐𝑘 𝑘𝑖𝑙𝑙


Wifi network, I can spy on all the sites and files and
Get all Routers
everything that is circulating within that network, it is $ 𝑎𝑖𝑟𝑜𝑑𝑢𝑚𝑝 − 𝑛𝑔 𝑚𝑜𝑛0
After choosing a router name and checking
true that everything will pass It is encrypted before
WPA/WPA-2 security, Then select and monitor it.
your eyes, but you can later decrypt it. The tool is also $ 𝑎𝑖𝑟𝑜𝑑𝑢𝑚𝑝
− 𝑛𝑔 − 𝑐 𝑐ℎ𝑎𝑛𝑛𝑒𝑙 − −𝑏𝑠𝑠𝑖𝑑 𝑀𝐴𝐶 − 𝑤 /𝑟𝑜𝑜𝑡
available in several systems. /𝐷𝑒𝑠𝑘𝑡𝑜𝑝/ 𝑚𝑜𝑛0
4.3 OCLHashcat Renaming the cap file
$ 𝑚𝑣 ./−01. 𝑐𝑎𝑝 𝑛𝑎𝑚𝑒. 𝑐𝑎𝑝
OclHashcat uses what is called a brute force attack, Converting it to hccapx
and this tool is not included in the Alkali Linux system, $ 𝑐𝑎𝑝2ℎ𝑐𝑐𝑎𝑝𝑥. 𝑏𝑖𝑛 𝑛𝑎𝑚𝑒. 𝑐𝑎𝑝 𝑛𝑎𝑚𝑒. ℎ𝑐𝑐𝑎𝑝𝑥
Installing naïve hash cat from web-site
but you can download it and add it to the rest of the $ 𝑠𝑢𝑑𝑜 𝑔𝑖𝑡 𝑐𝑙𝑜𝑛𝑒 ℎ𝑡𝑡𝑝𝑠://𝑔𝑖𝑡ℎ𝑢𝑏. 𝑐𝑜𝑚
tools, and it is considered one of the fastest tools to /𝑏𝑟𝑎𝑛𝑛𝑜𝑛𝑑𝑜𝑟𝑠𝑒𝑦/𝑛𝑎𝑖𝑣𝑒
− ℎ𝑎𝑠ℎ𝑐𝑎𝑡
penetrate Wi-Fi networks. $ 𝑐𝑑 𝑛𝑎𝑖𝑣𝑒 − ℎ𝑎𝑠ℎ − 𝑐𝑎𝑡
$ 𝑐𝑢𝑟𝑙 − 𝐿 − 𝑜 𝑑𝑖𝑐𝑡𝑠/𝑟𝑜𝑐𝑘𝑦𝑜𝑢. 𝑡𝑥𝑡
4.4 Kali Net Hunter
$ 𝐻𝐴𝑆𝐻_𝐹𝐼𝐿𝐸 = 𝑛𝑎𝑚𝑒. ℎ𝑐𝑐𝑎𝑝𝑥 𝑃𝑂𝑇_𝐹𝐼𝐿𝐸
It is based on the Kali Linux system, ROM. In short, the = 𝑛𝑎𝑚𝑒. 𝑝𝑜𝑡 𝐻𝐴𝑆𝐻_𝑇𝑌𝑃𝐸
= 2500 ./𝑛𝑎𝑖𝑣𝑒 − ℎ𝑎𝑠ℎ − 𝑐𝑎𝑡. 𝑠ℎ
Kali Linux application is a ROM
And the process of installing it is carried out in specific The cracked password is shown in the previous steps.

types of phones, such as: [cc lang=”bash” width=”780″]

• Nexus $ 𝑎𝑖𝑟𝑐𝑟𝑎𝑐𝑘 − 𝑛𝑔 − 𝑎2 − 𝑏 𝑀𝐴𝐶


− 𝑤 𝑟𝑜𝑐𝑘𝑦𝑜𝑢. 𝑡𝑥𝑡 𝑛𝑎𝑚𝑒. 𝑐𝑎𝑝
• OnePlus One
And some of the Samsung releases, and unofficially it Figure 2 shows details and performance of hashcat
method.
can be installed on some other phones, the ultimate
goal of the application remains to test the extent of Wi-
Fi penetration through the tools provided by the Kali
Linux application. In view of the advantages that this
application provides to its users, it is one of the most
famous competitors in the field of Wi-Fi penetration in
the world, which makes it the ideal program to hack
on Android. And the fame that we talk about through
the responses of Kali Linux NetHunter shows the good
reputation of the application of affirmative actions
Fig.3: Hashcat Information Segmentation
represented in the comments.
Bellow the steps attacking a network through the 4.5 SHA (512) Linux
specific victim router’s, and shows the way to see the The Secure Hash Algorithms (SHA) are a set of hash
vulnerability in WPA, WPA-2. [9,10]. functions regularly utilized to hash passwords. By
$ sudo apt-get install aircrack-ng default, Curve employments SHA-512 for passwords,
Turning airmong ON
$ 𝑎𝑖𝑟𝑚𝑜𝑛 − 𝑛𝑔 but a few frameworks may still be utilizing the MD5
Monitoring the Network algorithm. This article depicts how to extend password
$ 𝑎𝑖𝑟𝑚𝑜𝑛 − 𝑛𝑔 𝑠𝑡𝑎𝑟𝑡 𝑤𝑙𝑎𝑛0
Enabling MMI security[13], see figure 3.
$ 𝑖𝑤𝑐𝑜𝑛𝑓𝑖𝑔
Stop and killing process that return errors
9
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021

his private key, which no one else knows, to decrypt


the message and view it. In this way, no one else will
know the content of the message, Muhammad because
he wrote the Unblinded Origin, and Umar is the only
one who can decipher it.

5.2 PGP Program


PGP (short for Pretty Good Privacy) adopts the

Fig.4: SHA-512 Performance


principle of encryption with public keys and can be

4.6 MD5 (Message-Digest) hashing: used to sign and encrypt data: signing to verify the

When the user choosing or entering the password then source and prevent impersonation, and encryption to

this password will be hashed to be encrypted by MD5 maintain data privacy. Be aware, before using the

hashing[ (Asaad, 2020)]. For-example : password= program, of the legal restrictions in its use. In some

0001 will be encrypted to: [EncryptedPass] countries, it is forbidden to send messages with a

Bellow figure 4 briefly steps of MD5 algorithm. strong blindness outside the country.

5.3 TLS Protocol


TLS (and its earlier version SSL) is frequently used to
secure communications in a computer network. The
protocol aims to preserve the privacy of the data
transmitted through communication by encrypting it,
to authenticate the identities of communicators using
public key cryptography, and to ensure the integrity of
the data by collecting a checksum check for each data
packet. The most popular Linux implementation of
Fig.5: MD5 Hash Algorithm this standard is the OpenSSL library that supports

5. Cryptography and Encryption Techniques and cryptographic algorithms including DES, Blowfish,

their Uses in Linux: and IDEA.

5.1 Encryption of Public Keys 5.4 HTTPS Protocol


Public-key cryptography uses a key (string) to encrypt It is an evolution of the HTTP protocol by including it
and another to decrypt it, unlike other encryption within a TLS (or SSL) secured communication. The
methods that use the same key for the two tasks. The primary purposes of using HTTPS on websites are
use of a private key for encryption (the public key) and authentication, privacy protection and cross-data
another to decrypt it (the private key) aims to bypass integrity verification.
the necessity to secure the transmission of the single
5.5 S / MIME Protocol
key during the exchange of encrypted messages.
The name is an acronym for the Secure Multipurpose
Everyone's public key is available to everyone without
Internet Mail Extension, which is an open standard
exception, while the private key maintains a secret of
that relies on public key cryptography to secure email
its own. For example, when Muhammad wants to send
and other types of communications on the network.
encrypted mail to Omar, he uses Omar’s public key to
encrypt the mail. When the mail reaches Omar, he uses
10
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021

5.6 Virtual Private Network dirb dnsmap.txt fern-wifi nmap.lst seclists

There are several implementations of the secure IP dirbuster fasttrack.txt metasploit rockyou.txt.gz wfuzz

standard on Linux. The IPSEC standard (acronym for 𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶/𝑢𝑠𝑟/𝑠ℎ𝑎𝑟𝑒
/𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡𝑠$ 𝑐𝑎𝑡 𝑟𝑜𝑐𝑘𝑦𝑜𝑢. 𝑡𝑥𝑡
Internet Protocol Security) is an effort behind the IETF
Will extract millions of suggested passwords”, to reach it
Internet Engineering Task Force that aims to establish
on advanced way so:
encrypted communications at the network level (Layer
𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶ ~$ 𝑐𝑎𝑡 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡
3) and provide ways to verify data integrity, access $𝑠𝑢𝑑𝑜 ℎ𝑦𝑑𝑟𝑎 − 𝐿 “𝑢𝑠𝑒𝑟𝑛𝑎𝑚𝑒” − 𝑃 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡 \
control, authentication and confidentiality. > [“𝐼𝑃 𝐴𝑑𝑑𝑟𝑒𝑠𝑠”] 𝑠𝑠ℎ

5.7 SSH Protocol SSH is a secure shell protocol and it’s a safe way to
There are several software packages on Linux to use login from one to another computer[ (Asaad, 2020)].
SSH, the most prominent of which is OpenSSH. SSH [sudo] password for networkchuck: [“Victim’s
Network”]
was designed to replace insecure remote
[“Password Generated”]
communication protocols such as rlogin, rsh and rexec
5.2 Attacking using Offline Method
that were sending data with little security precautions.
$ 𝑆𝑢𝑑𝑜 ℎ𝑎𝑠ℎ𝑐𝑎𝑡 − 𝑎 → 𝐸𝑛𝑡𝑒𝑟
The OpenSSH software package relies on public key
encryption to encrypt communications between host 𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐: ~$ 𝑚𝑎𝑛 ℎ𝑎𝑠ℎ𝑐𝑎𝑡

hosts and to authenticate users. It can also be used to Attack Mode

log into a remote server or to copy data between hosts 0 = 𝑆𝑡𝑟𝑎𝑖𝑔ℎ𝑡


1 = 𝐶𝑜𝑚𝑏𝑖𝑛𝑎𝑡𝑖𝑜𝑛
while protecting against man in the middle attacks and
3 = 𝐵𝑟𝑢𝑡𝑒 − 𝑓𝑜𝑟𝑐𝑒
other attacks.
6 = 𝐻𝑦𝑏𝑟𝑖𝑑 𝑊𝑜𝑟𝑑𝑙𝑖𝑠𝑡 + 𝑀𝑎𝑠𝑘
5.8 Pluggable Authentication Modules 7 = 𝐻𝑦𝑏𝑟𝑖𝑑 𝑀𝑎𝑠𝑘 + 𝑊𝑜𝑟𝑑𝑙𝑖𝑠𝑡
Recent releases of Linux distributions come loaded The attack is a straight mode for the next step.
with a unified authentication mechanism called $ 𝑆𝑢𝑑𝑜 ℎ𝑎𝑠ℎ𝑐𝑎𝑡 − 𝑎 0
Pluggable Authentication Modules, PAM that allows − 𝑚 → 𝐸𝑛𝑡𝑒𝑟 [“𝐻𝑎𝑠ℎ 𝑡𝑦𝑝𝑒𝑠 𝑐𝑜𝑛𝑡𝑎𝑖𝑛 𝑚𝑜𝑟𝑒 𝑡ℎ𝑎𝑛 7000 𝑡𝑦𝑝𝑒𝑠”]
applications operating in user space to change their
authentication requirements and method as needed. Then, when the Hash types appear we’ll choose the

This mechanism can be used, among other things. (1800 = SHA-512 (Linux)) by writing it’s number.

6. Attack Methods
In kali-linux has two ways to attack as shown in this
section online and offline attack method

6.1 Attacking using Online Method:


𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶ ~$ 𝑐𝑑/𝑢𝑠𝑟/𝑠ℎ𝑎𝑟𝑒/𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡𝑠
− →𝐸𝑛𝑡𝑒𝑟.
𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶/𝑢𝑠𝑟/𝑠ℎ𝑎𝑟𝑒/𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡𝑠$ 𝑙𝑠 − →𝐸𝑛𝑡𝑒𝑟.
dirb dnsmap.txt fern-wifi nmap.lst seclists
dirbuster fasttrack.txt metasploit rockyou.txt.gz wfuzz
𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶/𝑢𝑠𝑟/𝑠ℎ𝑎𝑟𝑒/𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡𝑠$ 𝑠𝑢𝑑𝑜 𝑔𝑧𝑖𝑝
− 𝑑 𝑟𝑜𝑐𝑘𝑦𝑜𝑢. 𝑡𝑥𝑡. 𝑔𝑧
[𝑠𝑢𝑑𝑜] 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑 𝑓𝑜𝑟 𝑛𝑒𝑡𝑤𝑜𝑟𝑘𝑐ℎ𝑢𝑐𝑘:

11
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021

a vulnerability to reset a password and benefit for this in an


ethical hacking.
7. References
1. Bing, H. (2012, January). Analysis and research of
system security based on android. In 2012 Fifth
International Conference on Intelligent Computation
Technology and Automation (pp. 581-584). IEEE.
2. Broad J, Bindner A, Hacking with Kali – Practical
Penetration Testing Techniques, Elsevier, 2014., ISBN:
978-0-12-407749-2. Retrieved from:
$ 𝑆𝑢𝑑𝑜 ℎ𝑎𝑠ℎ𝑐𝑎𝑡 − 𝑎 0 − 𝑚 1800 ftp://lab.dnict.vn/1.DNICT/2.Ebooks/books/Hackin
− 𝑜 𝑐𝑟𝑎𝑐𝑘𝑒𝑑𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑𝑠. 𝑡𝑥𝑡\ → 𝐸𝑛𝑡𝑒𝑟
g%20with%20Kali.pdf.
[“1800 is a one the hashed types for SHA-512(Linux)”]
3. Bradley M, (2017, June 9) An Overview of Wireless
> ℎ𝑎𝑠ℎ𝑒𝑠. 𝑡𝑥𝑡 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡
Protected Access 2. Retrieved from:
Thr:1 Vec:4
https://www.lifewire.com/what-is-wpa2-818352
𝑅𝑒𝑐𝑜𝑣𝑒𝑟𝑒𝑑 … : ½ (50.00%) 𝐷𝑖𝑔𝑒𝑠𝑡𝑠,
4. Step By Step Kali Linux and Wireless Hacking Basics-
𝑃𝑟𝑜𝑔𝑟𝑒𝑠𝑠 … … . : 80/80 (100.00%)
WEP Hacking (2015, May 19). Retrieved from:
𝑅𝑒𝑗𝑒𝑐𝑡𝑒𝑑 … … . . . : 0/80 (0.00%)
𝑅𝑒𝑠𝑡𝑜𝑟𝑒. 𝑃𝑜𝑖𝑛𝑡. . : 40/40 (100.00%) http://www.wirelesshack.org/step-by-step-kali-linux-
𝑅𝑒𝑠𝑡𝑜𝑟𝑒. 𝑆𝑢𝑏. #1 … : 𝑆𝑎𝑙𝑡: 1 𝐴𝑚𝑝𝑙𝑖𝑓𝑖𝑒𝑟: 0 − 1 1 and-wireless-hacking-basics-wep-hacking-part-3.html
𝐶𝑎𝑛𝑑𝑖𝑑𝑎𝑡𝑒𝑠. #1 ∶ 𝑛𝑒𝑡𝑤𝑜𝑟𝑘 − 𝑛𝑎𝑚𝑒 −> 𝑒𝑥𝑡𝑟𝑎𝑐𝑡𝑒𝑑 𝑛𝑎𝑚𝑒 5. Borges A (2014, February 20), Cracking Wireless
Networks. Retrieved from:
Started: Date/Time https://alexandreborgesbrazil.files.wordpress.com/20
Stoped: Date/Time 14/02/cracking_wep_networks1.pdf
6. d'Otreppe T, Introduction to WiFi Security and
$ Sudo hashcat -a 0 -m 1000 -o crackedpasswords.txt\ Aircrack-ng, Wireshark Developer and User
→Enter “1000 is a one of the hashed types for NTLM”. Conference-Sharkfest 2012, UC Berkeley, June 24 – 27.
> “𝐻𝑎𝑠ℎ𝑒𝑑 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑 ℎ𝑒𝑟𝑒” 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡 →𝐸𝑛𝑡𝑒𝑟 2012. Retrieved from:
Session …….: Hashcat https://sharkfestus.wireshark.org/sharkfest.12/prese
Status………: Cracked ntations/MB-
Hash.Name..: NTLM Introduction_to_WiFi_Security_and_Aircrack-ng.pdf
Hash.Target..: [Physical Address] 7. Sabih Z, Learn Ethical Hacking From Scratch. Retrieved
from: https://www.udemy.com/learn-ethical-
$ 𝑆𝑢𝑑𝑜 𝑐𝑎𝑡 𝑐𝑟𝑎𝑐𝑘𝑒𝑑𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑𝑠. 𝑡𝑥𝑡 hackingfrom-scratch/learn/v4/content.
$ Sudo cat crackedpasswords.txt 8. Aircrack command series, URL: https://www.aircrack-
[Physical Address]: [OriginalPassword] ng.org/doku.php?id=aircrack-ng#wpa
9. WPS explained, URL: https://www.wi-
6. Conclusion fi.org/discover-wi-fi/wifi-protected-setup
10. Pixie Dust Attack explained,
Penetration testing helps to secure networks, and highlights
URL: https://forums.kali.org/showthread.php?24286-
the security issues. In this paper investigate different aspects WPS-Pixie-DustAttack-(Offline-WPS-Attack)
of penetration testing including tools, attack methodologies 11. Sak B., Ram J. Mastering Kali Linux Wireless Pentesting,
and implementing some methods on Linux OS specific in Packt, 2016, ISBN 978-1-78528-556-1, p.p. 97-99,
Available from: http://it-
Kali Linux, using some methods such as hashcat SHA-512
ebooks.info/book/1461060711/
with their techniques. Then this implementation supports 12. Asaad, R. R. (2020). Implementation of a Virus with
some unique modes of attack for over 200 highly-optimized Treatment and Protection Methods. ICONTECH
INTERNATIONAL JOURNAL, 4(2), 28-34.
hashing algorithms. And it’s also support CPUs, GPUs, and
13. Gueron, S., Johnson, S., & Walker, J. (2011, April). SHA-
some hardware accelerators on Linux, Windows, and OSX, 512/256. In 2011 Eighth International Conference on
and has facilities to help enable distributed password Information Technology: New Generations (pp. 354-
358). IEEE.
cracking. It’s same when passing commands to Hashcat then
14. Ramachandran V, Buchanan C, Kali Linux Wireless
automatically using the best method to crack passwords, Penetration Testing Learn to Penetrate Wi-Fi and
either CPU or GPU depending on the Graphics driver you Wireless Networks to Secure your System from
Vulnerabilities, 2nd Edition, Packt Publishing, 2015,
have installed or not. In this paper shows that the way to use
ISBN-10: 1783280417
12

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy