2 Renas712998
2 Renas712998
net/publication/349059692
CITATIONS READS
21 9,203
1 author:
SEE PROFILE
All content following this page was uploaded by Renas Rajab Asaad on 06 April 2021.
ABSTRACT
This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This
study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The
brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a
time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash
algorithm and SHA-512 (Linux). In this article, we will learn about the various wireless attacks. These days, wireless networks
are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an
Ethernet cable to gain Internet access is not feasible. For this convenience, wireless connections are not as secure as Ethernet
connections. In this article, we will explore various methods for manipulating wireless attacks and their techniques including
several methods on Linux.
1. Introduction
Wireless networks become useful nowadays. They
2. Literature Review
utilized all over the world in several fields of security,
Kali Linux is the world’s most powerful and popular
at domestic, at work and indeed open places in arrange
penetration testing platform, used by security
to associate to the Web and do a trade or private things
professionals in a wide range of specializations,
[1,2]. Other than all the points of interest in making
including penetration testing, forensics, reverse
commerce and life simpler, there are certain
engineering, and vulnerability assessment. It is the
downsides in terms of dangers. The frailty of remote
culmination of years of refinement and the result of a
systems has been causing a part of inconvenience in
continuous evolution of the platform, from WHoppiX
terms of breaking into banks, companies, and
to WHAX, to BackTrack, and now to a complete
government organizations. The recurrence of these
penetration testing framework leveraging many
assaults is as it heightened, as to organize chairmen are
features of Debian GNU/Linux and the vibrant open
not completely harmonized when it comes to securing
source community worldwide. Kali Linux has not been
remote systems in a strong and reliable way[3]. A
built to be a simple collection of tools, but rather a
remote network can be split utilizing Kali Linux
flexible framework that professional penetration
working framework and it'll be spoken to within the
testers, security enthusiasts, students, and amateurs
segment that takes after. Remote systems have gotten
can customize to fit their specific needs.
to display all over. They are used all over the world
3. Implementation
totally different regions of life, at domestic, at work
A multifunctional device for wireless internet access
and indeed open places in arrange to associate to the
„Huawei HG530“ by „Huawei Technologies“ will be
Web and do commerce or private things[1,4].
7
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021
used for this cybersecurity research. As an end device 3.1 Cracking Wireless Network in Kali Linux
a smart phone with operating system Android v4.2.2 In this section will discussed the two methods of
is used. The attacking system is mobile computer with cracking, and the two methods rely on different
OS KALI LINUX, figure 1 shows explanation techniques to crack or break the safety barrier on
steps[2,5]. victim’s router, the methods are:
a. Online Method Depends on:
- Identify username.
- Check cat command for wordlist.
- Using Secure Shell Protocol.
- Brute-Force Attacking.
b. Offline Method Depends on:
- Message-Digest hashing (MD5).
- Hashcat algorithm.
- Hash Type “Sha-512 (Linux)”.
- Straight attacking.
- Hash Type NTLM.
4.6 MD5 (Message-Digest) hashing: used to sign and encrypt data: signing to verify the
When the user choosing or entering the password then source and prevent impersonation, and encryption to
this password will be hashed to be encrypted by MD5 maintain data privacy. Be aware, before using the
hashing[ (Asaad, 2020)]. For-example : password= program, of the legal restrictions in its use. In some
0001 will be encrypted to: [EncryptedPass] countries, it is forbidden to send messages with a
Bellow figure 4 briefly steps of MD5 algorithm. strong blindness outside the country.
5. Cryptography and Encryption Techniques and cryptographic algorithms including DES, Blowfish,
There are several implementations of the secure IP dirbuster fasttrack.txt metasploit rockyou.txt.gz wfuzz
standard on Linux. The IPSEC standard (acronym for 𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶/𝑢𝑠𝑟/𝑠ℎ𝑎𝑟𝑒
/𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡𝑠$ 𝑐𝑎𝑡 𝑟𝑜𝑐𝑘𝑦𝑜𝑢. 𝑡𝑥𝑡
Internet Protocol Security) is an effort behind the IETF
Will extract millions of suggested passwords”, to reach it
Internet Engineering Task Force that aims to establish
on advanced way so:
encrypted communications at the network level (Layer
𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐 ∶ ~$ 𝑐𝑎𝑡 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡
3) and provide ways to verify data integrity, access $𝑠𝑢𝑑𝑜 ℎ𝑦𝑑𝑟𝑎 − 𝐿 “𝑢𝑠𝑒𝑟𝑛𝑎𝑚𝑒” − 𝑃 𝑤𝑜𝑟𝑑𝑙𝑖𝑠𝑡. 𝑡𝑥𝑡 \
control, authentication and confidentiality. > [“𝐼𝑃 𝐴𝑑𝑑𝑟𝑒𝑠𝑠”] 𝑠𝑠ℎ
5.7 SSH Protocol SSH is a secure shell protocol and it’s a safe way to
There are several software packages on Linux to use login from one to another computer[ (Asaad, 2020)].
SSH, the most prominent of which is OpenSSH. SSH [sudo] password for networkchuck: [“Victim’s
Network”]
was designed to replace insecure remote
[“Password Generated”]
communication protocols such as rlogin, rsh and rexec
5.2 Attacking using Offline Method
that were sending data with little security precautions.
$ 𝑆𝑢𝑑𝑜 ℎ𝑎𝑠ℎ𝑐𝑎𝑡 − 𝑎 → 𝐸𝑛𝑡𝑒𝑟
The OpenSSH software package relies on public key
encryption to encrypt communications between host 𝐾𝑎𝑙𝑖 − 𝑙𝑖𝑛𝑢𝑥 − 𝑝𝑐: ~$ 𝑚𝑎𝑛 ℎ𝑎𝑠ℎ𝑐𝑎𝑡
This mechanism can be used, among other things. (1800 = SHA-512 (Linux)) by writing it’s number.
6. Attack Methods
In kali-linux has two ways to attack as shown in this
section online and offline attack method
11
Academic Journal of Nawroz University (AJNU), Vol.10, No.1, 2021