project:wifi-warzone:start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
project:wifi-warzone:start [2016/11/25 10:18] – ruza | project:wifi-warzone:start [2017/01/25 13:27] (current) – [Wireless networks] ruza | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== WiFi Warzone ====== | ||
+ | {{template>: | ||
+ | name=WiFi warzone| | ||
+ | image=broken-wifi.jpg? | ||
+ | sw=-| | ||
+ | hw=-| | ||
+ | founder=[[user: | ||
+ | interested=| | ||
+ | status=active | ||
+ | }} | ||
+ | ~~META: | ||
+ | status = active | ||
+ | ~~ | ||
+ | |||
+ | ===== Why? ===== | ||
+ | "WiFi warzone" | ||
+ | |||
+ | This lab should not be about "I know the shared key, therefore I'm done" only, but also about understanding and knowing wireless pentesting principles through your own personal experience. **Crack that key by yourself**, even if somebody told you what the shared key is. | ||
+ | |||
+ | What you should learn is not to know the "exact string" | ||
+ | |||
+ | |||
+ | ===== What? ===== | ||
+ | |||
+ | **Task:** using various techniques, tools and skills try to get an Shared key used to associate to each AP/ESSID. Once You are able to associate to this ESSID and got an working connectivity you're done. Make sure you understand what you've just done :) | ||
+ | |||
+ | Each ESSID has its own shared secret set up. | ||
+ | |||
+ | ==== Hardware and software setup ==== | ||
+ | {{ : | ||
+ | [[https:// | ||
+ | |||
+ | {{ : | ||
+ | HACKME-WPS runs at [[https:// | ||
+ | ==== Client side ==== | ||
+ | === client NOT associated to AP/ESSID === | ||
+ | That's you :) | ||
+ | |||
+ | === client associated to AP/ | ||
+ | an device you can log on and connect in "WiFi client" | ||
+ | |||
+ | ==== Wireless networks ==== | ||
+ | Since all the upstream connectivity on this HW device is routed through [[wp> | ||
+ | |||
+ | === ESSID: " | ||
+ | Wireless security: WEP 64 bit encryption with Shared keys\\ | ||
+ | |||
+ | It's actually not an complicated task to hack into a wireless network with such a wireless security. That's the main reason why WEP encryption is mostly not used and not recommended already these days, yet you can still encounter such networks in the wild. On this AP/ESSID you should start to understand how the lab is built and what can you do with. | ||
+ | |||
+ | === ESSID: " | ||
+ | Wireless security: WPA-PSK (aka Personal) | ||
+ | |||
+ | Hacking this ESSID you should get more practical usable experience for hacking today' | ||
+ | |||
+ | === ESSID: " | ||
+ | Wireless security: WPA2-PSK (aka Personal) | ||
+ | |||
+ | === ESSID: " | ||
+ | Wireless security: WPA/ | ||
+ | |||
+ | This AP has "Wi-Fi Protected Setup" (WPS) enabled. Hint: be careful. AP will lock you out after few failed attempts. | ||
+ | |||
+ | === ESSID: " | ||
+ | Wireless security: WPA2-PSK | ||
+ | |||
+ | Preshared key: same as for brmlab.cz ESSID | ||
+ | |||
+ | ===== ToDo ===== | ||
+ | {{ : | ||
+ | * setup an WiFi client side (client that is connected to the AP and is generating traffic). Attacker is (maybe) able to choose an AP to which an client is connected and also (maybe) generate traffic by himself. | ||
+ | * setup an [[wp> |