Presented By: Rohit Maurya

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Network Security.
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1 Practical stuff Crack the WPA key of this laptop. SSID: « Philips WiFi » Password list and cowpatty table available on CD (only useful today).
Home Wireless Security David Mitchell 12/11/2007.
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
ACM Wi-Fi Workshop Presented By: Chris Rawlings Brad Emge.
Wireless Cracking By: Christopher Zacky.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
What Password Cracking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Module 48 (Wireless Hacking)
[blank page for bug work-around]
Wireless Access Point Product Overview
History and Implementation of the IEEE 802 Security Architecture
Penetration Testing: Concepts,Attacks and Defence Stratagies
OSA vs WEP WPA and WPA II Tools for hacking
Instructor Materials Chapter 6 Building a Home Network
How to crack the password of WiFi Network (Based in Wireless)
Wireless Protocols WEP, WPA & WPA2.
A Smart Mini Wi-Fi Range Extender
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Wireless Access Point Product Overview
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
Wireless Network Security
Practical stuff Crack the WPA key of this laptop (SSID: « Philips WiFi »). Rules: Do not attack anything else on this laptop. You can use aircrack-ng but.
A Wireless LAN Security Protocol
Advanced Penetration testing
Security Student Name :Ala’a Ahmad Mohammad qwassmeh
PPP – Point to Point Protocol
Week 1 – Taster Session dmuhackers DMU Hackers.
Huawei Best Wireless Router for Home
Only For Education Purpose
Wireless Hacking.
WEEK 1.
Hacking Wi-Fi Beyond Script Kiddie and WEP
Advanced Penetration testing
IEEE i Dohwan Kim.
Web Servers / Deployment
Breaking into Wi-Fi Networks
Public-Key, Digital Signatures, Management, Security
Security Issues with Wireless Protocols
WPA Cracking && Hashcat.
Advanced Penetration testing
Presentation transcript:

Presented By: Rohit Maurya WPA,WPA2 Hacking Presented By: Rohit Maurya

Standards of Wi-Fi Security WEP(Wired Equivalent Privacy) : Outdated, Weak Security, Easy to Crack, Not in use anymore. WPA (Wireless Protected Access) : Provide much better security than WEP. WPA2 (Second Version of WPA) : Use more advanced algorithms than WPA.

Prerequisites : Operating System : Linux (Recommended: Kali Linux) Aircrack-ng (Already included in Kali Linux) Fluxion

The Real Thing : How to crack WPA/WPA2 Encryption (Step 1) Open Terminal. Grant Terminal root access by typing: “sudo su”. Know your Wi-Fi Card Name by using this command: “ifconfig”.

Step 2 Put your Wi-Fi in Monitor Mode. For this type in terminal: “airmon-ng start <Wi-Fi card name>” Sometimes some process stop you from using your Wi-Fi card for this. To resolve this issue type: “airmon-ng check kill”

Step 3 Open Fluxion. Go to fluxion folder. Type “./fluxion” to open fluxion.

Step 4 Choose “All Channels” to monitor all networks in your Wi-Fi range.

Step 5 Press Ctrl+C to cancel the scan. Select your target network.

Handshake File In simple words, it carries your password from the client to the server. We need to capture the file to crack the password.

Here’s what will happen on client’s device Client’s device will get deauthorized from the network repeatedly. Client will again type the password to connect to the network. The we’ll get the handshake.

Step 5 After successful capture of handshake file, select your type of attack to crack password. Select “Web Interface”.

Let’s see again what will happen on client’s device Client will see two network of same name as: Original : which he’ll be unable to connect, since we’ll be using deauth attack. Fake : which we’ll use to get password. Sometimes we’ll see multiple networks of same name. Client will see a “Sign-In” Notification to access the network. After that client will be asked to type his password in a “Web Interface”. After typing password fluxion will automatically get the password.

Finally We’ll get the password.

Note There are many possible ways to do a particular task at every step. But I have discussed only one way.

Thank You!