Practical stuff Crack the WPA key of this laptop (SSID: « Philips WiFi »). Rules: Do not attack anything else on this laptop. You can use aircrack-ng but.

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

1 Practical stuff Crack the WPA key of this laptop. SSID: « Philips WiFi » Password list and cowpatty table available on CD (only useful today).
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
ACM Wi-Fi Workshop Presented By: Chris Rawlings Brad Emge.
Wireless Cracking By: Christopher Zacky.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 Wireless Security June 16, 2010 Thomas d’Otreppe de Bouvette Author of Aircrack-ng SHARKFEST ‘10.
Cracking AT&T U-verse Default WPA1/2 Passwords.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
WLAN Security: Cracking WEP/WPA
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Wireless Attacks. Set up the APs Computer IP: Subnet Mask: Router IP address: –
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Wireless Security on the Philippine Setting. Introduction: WHOAMI What’s this all about?
Distributed WPA Cracking CSCI Distributed Systems Spring 2011 University of Colorado Rodney Beede Ryan Kroiss Arpit Sud
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Write a function rule for a graph EXAMPLE 3 Write a rule for the function represented by the graph. Identify the domain and the range of the function.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Grade 7 Chapter 4 Functions and Linear Equations.
Packet Sniffing Hans Kokx
Chapter3 Wireless how safe it is NOT! By: Brett Hoff.
Module 48 (Wireless Hacking)
3GPP meeting Wireless LAN access
Re-evaluating the WPA2 Security Protocol
Wireless Security By: Bryan M Keller.
The best of the algebras
OSA vs WEP WPA and WPA II Tools for hacking
How to crack the password of WiFi Network (Based in Wireless)
Wireless II.
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Presented By: Rohit Maurya
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Securing A Wireless Network
Testing for Conductivity
Simplifying Fractions
Advanced Penetration testing
Week 1 – Taster Session dmuhackers DMU Hackers.
Only For Education Purpose
Wireless Hacking.
Wifi Hacking Wifi Protection
Advanced Penetration testing
WEEK 1.
Hacking Wi-Fi Beyond Script Kiddie and WEP
Advanced Penetration testing
Advanced Penetration testing
Advanced Penetration testing
Bell Ringer No Bell Ringer today  You should still be sitting quietly in your seat. Have ALL materials ready to begin class as soon as the bell rings.
Breaking into Wi-Fi Networks
Objective- To use an equation to graph the
Bell Ringer No Bell Ringer today  You should still be sitting quietly in your seat. Have ALL materials ready to begin class as soon as the bell rings.
Objective- To graph a relationship in a table.
WPA Cracking && Hashcat.
Advanced Penetration testing
Presentation transcript:

Practical stuff Crack the WPA key of this laptop (SSID: « Philips WiFi »). Rules: Do not attack anything else on this laptop. You can use aircrack-ng but it’s not mandatory (cowpatty, pyrit, …). If you find the key, call me; do not tell everybody, they may still want to crack it. Password list and cowpatty table available on CD (only useful today).

Practical stuff - Tips Make sure to disable all network managers and other programs using wireless interfaces: airmon-ng check kill Madwifi-ng airmon-ng stop ath0 airmon-ng start wifi0 If you don’t see the handshake with aircrack-ng (or any other tool), open your capture file with wireshark and filter it with « eapol  ».

Practical stuff - Airgraph-ng Creates a picture of the wireless networks Wardriver or just want to monitor your network, this is for you.

Practical stuff - Airgraph-ng (2)

Practical Stuff – Aigraph-ng (3) Run airodump-ng with the parameters you want (however -w is mandatory to make it work). Airodump-ng writes the CSV file every 5 seconds. Whenever you want, start airgraph-ng on the CSV file.

Practical stuff - Airgraph-ng (4) Parameters: Input file: Airodump-ng CSV file (.txt) Graph type: CAPR (Client – AP Relationship): Connected clients CPG (Common Probe Graph): Probed SSID Output file: Picture file name Examples: CAPR: airgraph-ng.py -i ../airgraph-01.txt -t CAPR -o ../airgraph-capr.png CPG: airgraph-ng.py -i ../airgraph-01.txt -t CPG -o ../airgraph-cpg.png