User Tools

Site Tools


project:wifi-warzone:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
project:wifi-warzone [2016/06/09 11:47] ruzaproject:wifi-warzone:start [2017/01/25 13:27] (current) – [Wireless networks] ruza
Line 1: Line 1:
 ====== WiFi Warzone ====== ====== WiFi Warzone ======
  
-{{template>infobox|+{{template>:project:infobox|
 name=WiFi warzone| name=WiFi warzone|
 image=broken-wifi.jpg?200| image=broken-wifi.jpg?200|
Line 10: Line 10:
 status=active status=active
 }} }}
 +~~META:
 +status = active
 +~~
  
 ===== Why? ===== ===== Why? =====
 "WiFi warzone" is an test and training environment built in brmlab hackerspace aimed on pentesting wireless networks, because, You know, attacking other people's computer is not always legal. "WiFi warzone" is an test and training environment built in brmlab hackerspace aimed on pentesting wireless networks, because, You know, attacking other people's computer is not always legal.
  
-This lab should is not about "I know the shared key, therefore I'm done" only, but also about understanding and knowing wireless pentesting principles through your own personal experience. **Crack that key by yourself**, even if somebody told you what the shared key is.+This lab should not be about "I know the shared key, therefore I'm done" only, but also about understanding and knowing wireless pentesting principles through your own personal experience. **Crack that key by yourself**, even if somebody told you what the shared key is.
  
 What you should learn is not to know the "exact string" which will enable you to connect. You should learn how to setup a proper tools to crack it by yourself, which WiFi card and driver works well for you, which wifi card is able to do things like packet injection, how hard/easy it is, where to get appropriate wordlist, how to create it, etc. What you should learn is not to know the "exact string" which will enable you to connect. You should learn how to setup a proper tools to crack it by yourself, which WiFi card and driver works well for you, which wifi card is able to do things like packet injection, how hard/easy it is, where to get appropriate wordlist, how to create it, etc.
Line 29: Line 32:
 [[https://wiki.openwrt.org/toh/tp-link/tl-wr1043nd|TP-link WR1043NDv1]] with [[https://www.dd-wrt.com/site/support/router-database?action=routerList&criteria=wr1043%5C&site=drupal|DD-WRT v24SP2]] firmware installed. Whole HW&SW setup is somewhat extended via Optware (opkg) and few ugly instalation hacks onto an 8GB USB stick. All wireless networks set up are available on 802.11 b/g/n. Upstream connectivity it routed through [[wp>Tor_(anonymity_network)]]. [[https://wiki.openwrt.org/toh/tp-link/tl-wr1043nd|TP-link WR1043NDv1]] with [[https://www.dd-wrt.com/site/support/router-database?action=routerList&criteria=wr1043%5C&site=drupal|DD-WRT v24SP2]] firmware installed. Whole HW&SW setup is somewhat extended via Optware (opkg) and few ugly instalation hacks onto an 8GB USB stick. All wireless networks set up are available on 802.11 b/g/n. Upstream connectivity it routed through [[wp>Tor_(anonymity_network)]].
  
 +{{  :project:wr703n.jpg?100|}}
 +HACKME-WPS runs at [[https://wiki.openwrt.org/toh/tp-link/tl-wr703n|TP-link WR703N]].
 ==== Client side ==== ==== Client side ====
 === client NOT associated to AP/ESSID === === client NOT associated to AP/ESSID ===
Line 37: Line 42:
  
 ==== Wireless networks ==== ==== Wireless networks ====
 +Since all the upstream connectivity on this HW device is routed through [[wp>Tor_(anonymity_network)]] this additional ESSID was configured for You to be able to connect to AP that has all connectivity routed through [[wp>Tor_(anonymity_network)]] network.
 +
 === ESSID: "HACKME-WEP" === === ESSID: "HACKME-WEP" ===
 Wireless security: WEP 64 bit encryption with Shared keys\\ Wireless security: WEP 64 bit encryption with Shared keys\\
Line 49: Line 56:
 === ESSID: "HACKME-WPA2" === === ESSID: "HACKME-WPA2" ===
 Wireless security: WPA2-PSK (aka Personal) Wireless security: WPA2-PSK (aka Personal)
 +
 +=== ESSID: "HACKME-WPS" ===
 +Wireless security: WPA/WPA2-PSK (aka Personal)
 +
 +This AP has "Wi-Fi Protected Setup" (WPS) enabled. Hint: be careful. AP will lock you out after few failed attempts.
  
 === ESSID: "brmlabTor" === === ESSID: "brmlabTor" ===
Line 54: Line 66:
  
 Preshared key: same as for brmlab.cz ESSID Preshared key: same as for brmlab.cz ESSID
- 
-Since all the upstream connectivity on this HW device is routed through [[wp>Tor_(anonymity_network)]] this additional ESSID was configured for You to be able to connect to AP that has all connectivity routed through [[wp>Tor_(anonymity_network)]] network. 
  
 ===== ToDo ===== ===== ToDo =====
project/wifi-warzone/start.txt · Last modified: 2017/01/25 13:27 by ruza