Skip to main content

Posts

Showing posts from April, 2014

Wireless Hacking - Part9

HACKING WPA2-PSK WITH KALI LINUX A wireless network is a network that uses radio waves to connect computers and other like devices together. The implementation is done at the physical layer (Layer1) of the OSI model. WPA2 (Wi-Fi Protected Access) is a wireless security protocol that makes use of AES encryption and CCMP, a TKIP replacement. It is stronger than the other wireless security protocols (WEP, WPA). WPA2 pre-shared keys use passphrases. This is the weakness I will exploit to crack a WPA2 protected network and gain access to it. Doing so requires software and hardware resources, and patience. The success of such attacks can also depend on how active and inactive the users of the target network are. We are going to take a step-by-step look at how you can break WPA2 using Kali Linux. Our attack tool is the aircrack suite of tools in Kali Linux and we will employ the sniffing method; this involves intercepting packets as they are transmitted over a network. If you feel yo

Wireless Hacking - Part8

WIRELESS HACKING WITH AIRCRACK-NG What you will learn How to use the Aircrack-ng tool. Aircrack-ng is a widely used tool with capabilities to crack WEP and WPA. Introduction Given our increasing need to stay connected via social media, email and, therefore, have access to the Internet, the availability of free, open WiFi access points in institutions, shops and in some areas, city-wide access points has become the norm. We don’t give a second thought to accessing a free WiFi spot in a coffee shop or otherwise since it enables us to maintain access. But, what about our home? While you may have followed our best advice to select a password for your router, implemented WPA/WPA2 encryption, it is possible, with help, to access these also. In this article, we outline the use of a tool called ‘Aircrack-ng’ used by security professionals to access secured WiFi. Cracking WEP Versus WPA The approach used to crack the WPA/WPA2 pre-shared key versus WEP differ significantly. WEP