Exploring Wireless Network Security
Exploring Wireless Network Security
wireless access point. Here, we use Alfa awus 036h high gain antenna on our wireless card.
Deauthentication Attack
The act of forcing a device to disconnect from a network is known as a de-authentication attack. This kind
of Denial-of-Service (DoS) attack prevents the router and the device from communicating with one another.
Here, the attack is facilitated by a streamlined methodology instead of using more intricate techniques. The
four-way handshake procedure within the de-authentication frame is exploited by the attack. In technical
terms, this is known as:
“A sanctioned technique to inform a rogue station that it has been disconnected from the network”
(Autumn, 2018).
In essence, the router sends a de-authentication frame to the device, notifying it of disconnection
A legal device is used in a de-authentication attack, when the attacker notifies the router, "I am
disconnecting." In order to carry out this attack, the attacker first gets the device's BSSID, then impersonates
the device and sends the router a de-authentication frame. By doing this, the device will be guaranteed to
disengage from the network. The absence of encryption beneath Layer 3 of the OSI model is the main factor
making this attack feasible. Attackers can more easily sniff and take advantage of data packets at lower
layers since they are not encrypted, but those above Layer 3 are.
Advanced Exploits
• WPA/WPA2 Cracking: During the interruption of a four-way handshake, the user attempts to reconnect
to the network. At this point, the attacker captures the handshake frame and cracks it using tools such as
Hashcat or Aircrack-ng.
• Man-in-the-Middle (MITM) Attack: Hackers establish a rogue access point to intercept and obtain
sensitive information from the target.
• Service Interruption: A de-authentication attack is a specific type of Denial of Service (DoS) attack that
disrupts the connection between a device and the network here
1
For this attack, I created a test Wi-Fi network named "Google's Pixel 7a" and set the password for this
network as "11111111".
Hardware: Wireless Network Adapter (AWS 036nha).
Software: Aircrack-ng
2
Step 1: Open Terminal in Kali Linux
• Open a terminal and list all the network adapters connected to the PC.
Figure 5 iwconfig
3
Step 3: List all the available APs with the command “airodump-ng”.
• In the next step, we are going to use "airodump-ng wlan0mon." Here wlan0mon is the adapter's
name after monitor mode. Try to find available APs and select the target we are going to do the
DOS attack.
4
Step5: Broadcast De-authenticate users on the specific AP.
5
Capturing and Cracking WPA/WPA2 Wi-Fi passwords
Using wireless access points as entry points to a network or system is another method attackers may employ.
A thorough understanding of WPA/WPA2 protocols can help enhance the network security of an
organization. This section will explain how attackers capture wireless hashes and crack them into plaintext
to obtain network passwords.
Figure 10 iwconfig
Step2: Capture the 4 way handshake in the file name “handshake”:
• Using the command “sudo airodump-ng -c 11 –bssid C6:91:9D:95:10:F8 -w handshake wlan0mon”
• 11 – Channel Number
• C6:91:9D:95:10:F8 – BSSID of the target.
6
Step3: Create a wordlist called using “Crunch”
• For ease, I created a word list using numbers from 0 to 3 from the letter count from 6 to 8.