User Tools

Site Tools


newbie_guide

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
newbie_guide [2018/11/21 23:14] – Updated information and removed outdated information mister_xnewbie_guide [2018/11/21 23:31] (current) – [Further tools and information] updated mister_x
Line 66: Line 66:
 ===== Discovering Networks ===== ===== Discovering Networks =====
  
-The first thing to do is looking out for a potential target. The aircrack-ng suite contains [[airodump-ng]] for this - but other programs like +The first thing to do is looking out for a potential target. The aircrack-ng suite contains [[airodump-ng]] for this - but other programs like [[https://kismetwireless.net/|Kismet]] can be used too.
-[[http://www.kismetwireless.net/|Kismet]] can be used too.+
  
-Prior to looking for networks, you must put your wireless card into what is called "monitor mode" Monitor mode is a special mode that allows your PC to listen to every wireless packet.  This monitor mode also allows you to optionally inject packets into a network.  Injection will be covered later in this tutorial.+Prior to looking for networks, you must put your wireless card into what is called "monitor mode" Monitor mode is a special mode that allows your computer to listen to every wireless packet.  This monitor mode also allows you to optionally inject packets into a network.  Injection will be covered later in this tutorial.
  
-To put your wireless card into monitor mode:+To put your wireless card into monitor mode using [[airmon-ng]]:
  
-[[airmon-ng]] start rausb0+  airmon-ng start wlan0
  
-To confirm it is in monitor mode, run "iwconfig" and confirm the mode.  The [[airmon-ng|airmon-ng page]] on the Wiki has generic information and how to start it for other drivers.+It will create create another interface, and append "mon" to it. So, **wlan0** will become **wlan0mon**. To confirm it is in monitor mode, run "iwconfig" and confirm the mode.
  
-Then, start airodump-ng to look out for networks:+Then, start [[airodump-ng]] to look out for networks:
  
-  airodump-ng rausb0+  airodump-ng wlan0mon
  
-"rausb0" is the network interface (nic) name. If you are using a different WLAN device than a rt2570 you'll have to use a different nic name. 
-Take a look in the documentation of the nic driver. For most newer drivers, the primary interface name is "wlan0", but for monitoring, a secondary interface ("mon0", created when you run airmon-ng) is used. 
  
 If airodump-ng could connect to the WLAN device, you'll see a screen like this: If airodump-ng could connect to the WLAN device, you'll see a screen like this:
Line 88: Line 85:
 {{https://www.aircrack-ng.org/img/newbie_airodump.png}} {{https://www.aircrack-ng.org/img/newbie_airodump.png}}
  
-[[airodump-ng]] hops from channel to channel and shows all access points it can receive beacons from. Channels 1 to 14 are used for 802.11b and g (in US, they only are allowed to use 1 to 11; 1 to 13 in Europe with some special cases; 1-14 in Japan). Channels between 36 and 149 are used for 802.11a. The current channel is shown in the top left corner.+[[airodump-ng]] hops from channel to channel and shows all access points it can receive beacons from. Channels 1 to 14 are used for 802.11b and g (in US, they only are allowed to use 1 to 11; 1 to 13 in Europe with some special cases; 1-14 in Japan). 802.11a is in the 5GHz and availability in different countries is more fragmented than on 2.4GHz. In general, known channels starts at 36 (32 in some countries) to 64 (68 in some countries) and 96 to 165. Wikipedia has more details on channel availability. The Linux [[https://wireless.wiki.kernel.org/en/developers/Regulatory/CRDA|Central Regulatory Domain Agent]] takes care of allowing/forbidding transmissions on the different channels for your country; however, it needs to be set appropriately 
 + 
 +The current channel is shown in the top left corner.
  
 After a short time some APs and (hopefully) some associated clients will show up. After a short time some APs and (hopefully) some associated clients will show up.
Line 95: Line 94:
  
 ^ BSSID        | The MAC address of the AP  | ^ BSSID        | The MAC address of the AP  |
 +^ RXQ          | Quality of the signal, when locked on a channel |
 ^ PWR          | Signal strength. Some drivers don't report it  | ^ PWR          | Signal strength. Some drivers don't report it  |
 ^ Beacons      | Number of beacon frames received. If you don't have a signal strength you can estimate it by the number of beacons: the more beacons, the better the signal quality | ^ Beacons      | Number of beacon frames received. If you don't have a signal strength you can estimate it by the number of beacons: the more beacons, the better the signal quality |
Line 111: Line 111:
 ^ Probes       | Network names (ESSIDs) this client has probed  | ^ Probes       | Network names (ESSIDs) this client has probed  |
  
-Now you should look out for a target network. It should have a client connected because cracking networks without a client is an advanced topic (See [[how_to_crack_wep_with_no_clients|How to crack wep with no clients]]). It should use WEP encryption and have a high signal strength. Maybe you can re-position your antenna to get a better signal. Often a few centimeters make a big difference in signal strength.+Now you should look out for a target network. It should have a client connected because cracking networks without a client is an advanced topic (See [[how_to_crack_wep_with_no_clients|How to crack WEP with no clients]]). It should use WEP encryption and have a high signal strength. Maybe you can re-position your antenna to get a better signal. Often a few centimeters make a big difference in signal strength.
  
 In the example above the net 00:01:02:03:04:05 would be the only possible target because it's the only one with an associated client. But it also has a high signal strength so it's really a good target to practice. In the example above the net 00:01:02:03:04:05 would be the only possible target because it's the only one with an associated client. But it also has a high signal strength so it's really a good target to practice.
Line 119: Line 119:
 Because of the channel hopping you won't capture all packets from your target net. So we want to listen just on one channel and additionally write all data to disk to be able to use it for cracking: Because of the channel hopping you won't capture all packets from your target net. So we want to listen just on one channel and additionally write all data to disk to be able to use it for cracking:
  
-  airodump-ng -c 11 --bssid 00:01:02:03:04:05 -w dump rausb0+  airodump-ng -c 11 --bssid 00:01:02:03:04:05 -w dump wlan0mon
  
 With the -c parameter you tune to a channel and the parameter after -w is the prefix to the network dumps written to disk.  The "-''''-bssid" combined with the AP MAC address limits the capture to the one AP.  The "-''''-bssid" option is only available on new versions of airodump-ng. With the -c parameter you tune to a channel and the parameter after -w is the prefix to the network dumps written to disk.  The "-''''-bssid" combined with the AP MAC address limits the capture to the one AP.  The "-''''-bssid" option is only available on new versions of airodump-ng.
Line 151: Line 151:
 Try to connect to your AP using [[aireplay-ng]]: Try to connect to your AP using [[aireplay-ng]]:
  
-  aireplay-ng --fakeauth 0 -e "your network ESSID" -a 00:01:02:03:04:05 rausb0+  aireplay-ng --fakeauth 0 -e "your network ESSID" -a 00:01:02:03:04:05 wlan0mon
  
 The value after -a is the BSSID of your AP. The value after -a is the BSSID of your AP.
Line 185: Line 185:
 Wait for a client to show up on the target network. Then start the attack: Wait for a client to show up on the target network. Then start the attack:
  
-  aireplay-ng --arpreplay -b 00:01:02:03:04:05 -h 00:04:05:06:07:08 rausb0+  aireplay-ng --arpreplay -b 00:01:02:03:04:05 -h 00:04:05:06:07:08 wlan0mon
  
 -b specifies the target BSSID, -h the MAC of the connected client. -b specifies the target BSSID, -h the MAC of the connected client.
Line 200: Line 200:
 the -r <filename> option. the -r <filename> option.
  
-When using the arp injection technique, you can use the PTW method to crack the WEP key.  This dramatically reduces the number of data packets you need and also the time needed.  You must capture the full packet in airodump-ng, meaning do not use the "-''''-ivs" option when starting it.  For [[aircrack-ng]], use "aircrack -z <file name>". (PTW is the default attack in 1.0-rc1.)+When using the ARP injection technique, you can use the PTW method to crack the WEP key.  This dramatically reduces the number of data packets you need and also the time needed.  You must capture the full packet in airodump-ng, meaning do not use the "-''''-ivs" option when starting it.  For [[aircrack-ng]], use "aircrack -z <file name>". (PTW is the default attack)
  
 If the number of data packets received by airodump-ng sometimes stops increasing you maybe have to reduce the replay-rate. You do this with the -x <packets per second> option. I usually start out with 50 and reduce until packets are received continuously again. Better positioning of your antenna usually also helps. If the number of data packets received by airodump-ng sometimes stops increasing you maybe have to reduce the replay-rate. You do this with the -x <packets per second> option. I usually start out with 50 and reduce until packets are received continuously again. Better positioning of your antenna usually also helps.
Line 210: Line 210:
 Keep your airodump-ng and aireplay-ng running. Open another window and run a [[deauthentication]] attack: Keep your airodump-ng and aireplay-ng running. Open another window and run a [[deauthentication]] attack:
  
-  aireplay-ng --deauth 5 -a 00:01:02:03:04:05 -c 00:04:05:06:07:08 rausb0+  aireplay-ng --deauth 5 -a 00:01:02:03:04:05 -c 00:04:05:06:07:08 wlan0mon
  
 -a is the BSSID of the AP, -c the MAC of the targeted client. -a is the BSSID of the AP, -c the MAC of the targeted client.
  
-Wait a few seconds and your arp replay should start running.+Wait a few seconds and your ARP replay should start running.
  
-Most clients try to reconnect automatically. But the risk that someone recognizes this attack or at least attention is drawn to the stuff happening on the WLAN is higher +Most clients try to reconnect automatically. But the risk that someone recognizes this attack or at least attention is drawn to the stuff happening on the WLAN is higher than with other attacks.
-than with other attacks.+
  
  
  
 ====== Further tools and information ====== ====== Further tools and information ======
-[[https://www.tuto-fr.com/tutoriaux/crack-wep/aircrack-ng.php|Tutorial in french for aircrack-ng]] [[https://www.tuto-fr.com/en/tutorial/tutorial-crack-wep-aircrack.php|or in english]]+ 
 +More tutorials can be found on [[tutorial|this page]].
newbie_guide.txt · Last modified: 2018/11/21 23:31 by mister_x