Professional Documents
Culture Documents
WIRELESS NETWORK
By Hariraj Rathod
8th sem
Department of Electronics and Communication
Wireless
BASIC WORKING
When a user uses wireless internet they generate
what are called data packets.
Packets are transmitted between the wireless
card and the wireless access point via radio
waves whenever the computer is connected with
the access point.
WIRELESS ENCRYPTION
The
WEP
WPA
WPA2
WEP
WEP CONTINUED
WEP CONTINUED
WPA OR WPA2
Wlan1
wireless interface
Mon0 monitor mode
Handshake
Dictionary
passwords.
.cap file used to store packets.
MONITOR MODE
TOOLS USED
TOOLS USED.CONTINUED
AIRCRACK-NG
AIRCRACK-NG CONTINUED
AIRCRACK-NG CONTINUED
AIRCRACK-NG CONTINUED
AIRCRACK-NG CONTINUED
AIRCRACK-NG CONTINUED
WORD FIELD
Word Field is a brute force attack.
Command line used wordfield [OPTION...]
MINLENGTH [MAXLENGTH]
Wordfield -a -n 8 8" will output all possible
alphanumeric strings which are 8 characters
long.
wordfield -a -n 8 8 | aircrack-ng b
00:17:9A:82:44:1B -w - /home/pranav/Wifire02.cap
This attack is really effective on weak keys.
Source: http://lastbit.com/pswcalc.asp
REAVER TOOL.
Reaver is fantastic tool to crack WPS pin
written by Craig Heffner.
This tool exploits the wps 8 digit pin.
1 bit is a checksum bit.
7 unknown numbers, meaning there are a
possible 10^7 (10,000,000) combinations which
will take approximately 116 days to break at 1
attempt every second.
BESECURED
REFERENCES
Wi-Fi security WEP, WPA and WPA2 Guillaume
Lehembre
http://en.wikipedia.org/wiki/WiFi_Protected_Access#WPS_PIN_recovery
https://sites.google.com/site/clickdeathsquad/Home/
cds-wpacrack
http://samiux.blogspot.in/2010/04/howtocrackwpawpa2-psk-with-john.html
http://www.zer0trusion.com/2011/09/crackingwpawithout-dictionary.html
Tactical Network Solutions
WiFi Security Megaprimer by Vivek Ramchandran
THANKS : )