Commands
SSID/ESSID= The network name (e.g. Casa_Mario, Vodafone1234).BSSID= the MAC address of the Access Point (e.g. 00:1A:2B:3C:4D:5E).
Tools
WiFi security auditing tools suite.
The Aircrack-ng suite encompasses over 20 tools tailored for auditing Wi-Fi networks (Airmon-ng, Airodump-ng, Airgraph-ng, Aireplay-ng, Airdecap-ng, Aircrack-ng, etc.).
Information
ifconfig [<IFACE>]
iwconfig [<IFACE>]sudo airmon-ngDriver Capabilities
iw listChannel & Frequency
iwlist <IFACE> channel
iwlist <IFACE> frequency | grep Currentsudo ifconfig <IFACE> down
sudo iwconfig <IFACE> channel 64
sudo iwconfig <IFACE> freq "5.52G"
sudo ifconfig <IFACE> upMonitor Mode
We cannot simply set this with the iwconfig utility. Rather, we need what is referred to as a management daemon. This management daemon is responsible for responding to stations or clients connecting to our network. Commonly we would utilize hostapd for this task. As such, we would first want to create a sample configuration.
This configuration would simply bring up an open network with the name SSID-Hello-World. With this network configuration, we could bring it up with the following command.
Scan
Available WiFi Networks
Scanning and Collecting
To scan across all available bands (2.4 GHz and 5 GHz)
Graph
Starting from an CSV airodump-ng dump.
Illustrates the connections between clients and access points.
N.B. it will not display any APs without connected clients.
It shows which APs each client is trying to connect to by displaying the probes sent out by the clients.
Connect to a network
Complete the connection setup by obtaining an IP address (-r to remove)
Complete the connection setup by obtaining an IP address
If the network uses WPA3 instead of WPA2, we would need to add key_mgmt=SAE to our wpa_supplicant configuration file to connect to it.
Complete the connection setup by obtaining an IP address
Decrypting
Eliminate numerous frames from unencrypted capture file that are not relevant to our analysis.
Cracking
Collect enough IVs
You need to have a wordlist and capture a four-way handshake (EAPOL, four packets). It also works with only packets 2-3 or 3-4 of EAPOL.
MAC address spoofing
Attacks
Finding Hidden SSIDs
We can use Deauthentication. we can use aireplay-ng to send deauthentication requests to the client. When the client reconnects to the hidden SSID, airodump-ng will capture the request and reveal the SSID. However, deauthentication attacks do not work on WPA3 networks.
Or you can use bruteforce. We can see the length while using airodump-ng.
Bruteforce SSIDs.
<STYLE> = upper case (u), digits (n), all printed (a), lower and upper case (c), lower and upper case plus numbers (m)
sudo mdk3 wlan0mon p -b <STYLE> -c 1 -t <BSSID>
sudo mdk3 wlan0mon p -f <WORDLIST> -t <BSSID>
Deauthentication
Test for packet injection
Deauthentication attack
-0 Deauth Attack, 5 n. pack send (0=continuously), -a Access Point, -c Client.
Last updated
Was this helpful?