-
-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
b3e2805
commit 1a59036
Showing
15 changed files
with
302 additions
and
42 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
23 changes: 23 additions & 0 deletions
23
attacking-wireless-clients/de-authenticate-a-wireless-client.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,25 @@ | ||
# De-authenticate a Wireless Client | ||
|
||
#### De-authenticating a Wireless Client | ||
|
||
De-authenticating a client from a wireless network is a process used to forcibly disconnect the client from the network. This can be used by network administrators to manage network access or troubleshoot issues. Below are the steps to de-authenticate a wireless client: | ||
|
||
**Step 1: Identify the Client** | ||
|
||
First, you need to find the MAC address of the client you wish to de-authenticate. You can usually find this information from your router's admin interface. | ||
|
||
**Step 2: Use De-authentication Tools** | ||
|
||
Many tools exist that can send de-authentication packets to a client, such as `aireplay-ng` in Linux. Use the following command: | ||
|
||
```bash | ||
sudo aireplay-ng -0 1 -a [AP MAC ADDRESS] -c [CLIENT MAC ADDRESS] wlan0 | ||
``` | ||
|
||
Replace `[AP MAC ADDRESS]` with the MAC address of your access point and `[CLIENT MAC ADDRESS]` with the MAC address of the client. | ||
|
||
**Step 3: Verify the Client is De-authenticated** | ||
|
||
After sending the de-authentication packets, the client should be disconnected from the network. You can verify this by checking the client's network status or by looking at the connected devices list in your router's admin interface. | ||
|
||
_Note: Unauthorized de-authentication of clients is illegal and should only be performed on networks you own or have permission to manage._ |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,21 @@ | ||
# Pin Brute Force | ||
|
||
### WPS Pin Brute Force Attack | ||
|
||
WPS (Wi-Fi Protected Setup) is a network security standard designed to simplify the process of connecting devices to a secure Wi-Fi network without the need to enter a complex password. It achieves this by using a PIN (Personal Identification Number), which is an eight-digit number that can be entered to connect a device to the network. | ||
|
||
### **How Brute Force Attack Works** | ||
|
||
A brute force attack on WPS PINs involves systematically trying every possible combination until the correct one is found. Considering the WPS PIN is an eight-digit number, the number of possible combinations is 10^8 (100,000,000). However, due to the way the WPS protocol is designed, the number of attempts needed may be significantly lower. | ||
|
||
The eight-digit PIN is split into two parts: the first seven digits and the last digit, which serves as a checksum for the previous seven. Because of this structure, the effective number of combinations to brute force is reduced to 10^7 (10,000,000). Additionally, after the first four digits are confirmed, the protocol confirms this, effectively splitting the brute force process and further reducing the complexity. | ||
|
||
### **Risks and Mitigations** | ||
|
||
Performing a WPS PIN brute force attack is considered a security risk, and using such methods to gain unauthorized access to networks is illegal and unethical. Network administrators need to understand this risk so they can take appropriate security measures: | ||
|
||
* Disable WPS on the router. | ||
* Use a strong WPA2 or WPA3 security protocol for the Wi-Fi network. | ||
* Regularly monitor network access for any unauthorized attempts. | ||
|
||
Please ensure you are authorized and it is legal before attempting any kind of security testing on networks that you do not own. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,36 @@ | ||
--- | ||
description: >- | ||
Explore our comprehensive article on WPS Pixie Dust attack – a critical aspect | ||
of cybersecurity. Get to know its implications, prevention tactics, and | ||
mitigation strategies. Learn to secure your syste | ||
--- | ||
|
||
# Pixie Dust | ||
|
||
#### WPS Pixie Dust Attack | ||
|
||
The WPS Pixie Dust attack is a type of cyberattack which targets the Wi-Fi Protected Setup (WPS) protocol, a network security standard to create a secure wireless home network. This attack takes advantage of a vulnerability in the WPS PIN method of connecting devices to a wireless network. | ||
|
||
**How it Works** | ||
|
||
When a device tries to connect to a WPS-enabled network, it can do so using a PIN which is an 8-digit number. This PIN is highly susceptible to brute-force attacks because it’s split into two parts; the first part contains 7-digits and the second part is a checksum of the first part, leaving the actual unknown digits to 7. The Pixie Dust attack exploits this by trying to retrieve the WPS PIN during the exchange known as the E-S1 and E-S2. | ||
|
||
**Vulnerability** | ||
|
||
The vulnerability comes from the fact that some WPS-enabled routers will transmit enough information during this exchange that allows attackers to deduce the PIN using advanced offline calculations. This usually happens within a matter of seconds to several hours, depending on the complexity of the PIN and the processing power available to the attacker. | ||
|
||
**Mitigation** | ||
|
||
To mitigate the risk of a Pixie Dust attack, it is recommended to: | ||
|
||
* Disable WPS on your router. | ||
* Regularly update router firmware. | ||
* Use a strong WPA2 encryption with a complex passphrase. | ||
|
||
Please note that not all routers are susceptible to a Pixie Dust attack, and security for wireless networks is continually evolving. It’s crucial to stay updated with the latest security practices to protect your network. | ||
|
||
Here are some resources that can help: | ||
|
||
* **National Institute of Standards and Technology (NIST):** [https://www.nist.gov/cyberframework](https://www.nist.gov/cyberframework) | ||
* **Wi-Fi Alliance:** [https://www.wi-fi.org/](https://www.wi-fi.org/) | ||
* **US-CERT:** [https://www.cisa.gov/sites/default/files/publications/infosheet\_US-CERT\_v2.pdf](https://www.cisa.gov/sites/default/files/publications/infosheet\_US-CERT\_v2.pdf) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
# WPS Null Pin | ||
|
||
### WPS Null Pin Attack | ||
|
||
WPS, or Wi-Fi Protected Setup, is a network security standard designed to simplify the process of connecting devices to a wireless network. However, it's vulnerable to several types of attacks, one of which is the WPS Null Pin attack. | ||
|
||
### **How WPS Null Pin Attack Works** | ||
|
||
The WPS Null Pin attack takes advantage of a flaw in the implementation of the WPS protocol where an empty or null PIN—essentially a PIN consisting of all zeroes—can be accepted by a router or access point as a valid means of authentication. | ||
|
||
Example of a command used in a WPS Null Pin attack with a tool like Reaver: | ||
|
||
``` | ||
reaver -i wlan0mon -b 00:90:4C:C1:AC:21 -p "\x00\x00\x00\x00\x00\x00\x00\x00" | ||
``` | ||
|
||
### **Preventing WPS Null Pin Attacks** | ||
|
||
To secure a network against WPS Null Pin attacks, it's advisable to: | ||
|
||
* Disable WPS on your router. | ||
* Regularly update router firmware to ensure any security patches for WPS are applied. | ||
* Monitor network authentication attempts to detect unusual patterns that may indicate an attack in progress. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,9 @@ | ||
--- | ||
coverY: 0 | ||
--- | ||
|
||
# WPS Versions | ||
|
||
#### Wi-Fi Protected Setup (WPS) Versions | ||
|
||
Wi-Fi Protected Setup (WPS) is a network security standard |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,24 @@ | ||
# Passwords | ||
|
||
#### Understanding the Basics of Wi-Fi Security | ||
|
||
**Types of Wi-Fi Encryption** | ||
|
||
* WEP (Wired Equivalent Privacy) | ||
* WPA (Wi-Fi Protected Access) | ||
* WPA2 (Wi-Fi Protected Access II) | ||
* WPA3 (Wi-Fi Protected Access III) | ||
|
||
WEP is the oldest and most vulnerable to cracking due to its weak encryption mechanism. WPA improved on WEP's weaknesses, and WPA2 further enhanced security. WPA3 is the latest standard and offers the strongest security. | ||
|
||
**Methods Used for Cracking Wi-Fi Passwords** | ||
|
||
1. **Brute Force Attack**: Attempting all possible combinations until the correct password is found. | ||
2. **Dictionary Attack**: Using a list of potential passwords (words from a dictionary) and trying them. | ||
3. **Rainbow Table Attack**: Comparing the network's encrypted password against a precomputed table of possible values. | ||
4. **Phishing**: Trick users into revealing their Wi-Fi password through a fake authentication page. | ||
5. **Social Engineering**: Gaining password information through manipulation or deceit. | ||
|
||
**Legal and Ethical Considerations** | ||
|
||
Cracking Wi-Fi passwords without authorization is illegal and unethical. Conducting such activities can result in severe legal consequences. It is important to respect others' privacy and data security. Always ensure you have explicit permission before attempting to test the security of any Wi-Fi network. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,39 @@ | ||
--- | ||
description: >- | ||
Dive deep into our latest article about WPA Rainbow Tables. Discover in-depth | ||
knowledge on how to enhance your network security using this powerful tool. | ||
Revealing secrets about WPA Rainbow Tables | ||
--- | ||
|
||
# Rainbow Tables | ||
|
||
WPA Rainbow Tables are pre-computed databases used to crack WPA/WPA2 passwords through a process called a rainbow table attack.  | ||
|
||
These tables contain millions, even billions, of pre-calculated hashes for various combinations of characters, making it much faster to find the password associated with a particular hash compared to brute-forcing every possible password. | ||
|
||
### **WPA vs. WPA2 Rainbow Tables** | ||
|
||
There are separate rainbow tables for WPA and WPA2 due to differences in their hashing algorithms. WPA uses MD5, while WPA2 uses a stronger hashing algorithm called PBKDF2 (Password-Based Key Derivation Function 2). PBKDF2 makes it much more computationally expensive to generate and use rainbow tables for WPA2, offering better protection. | ||
|
||
### Understanding WPA Rainbow Tables | ||
|
||
WPA Rainbow Tables are exceptional tools designed for cracking Wi-Fi Protected Access (WPA and WPA2) passwords. These tables are essentially pre-computed collections of hash values that are used to streamline the process of password recovery. | ||
|
||
### **How Do Rainbow Tables Work?** | ||
|
||
Rainbow tables counteract the time-consuming method of brute-force attacks by providing a pre-calculated list of potential passwords and their corresponding hash values. The workflow involves: | ||
|
||
1. Capturing the handshake between a client and an access point. | ||
2. Searching the rainbow table for a hash matching the handshake. | ||
3. Once found, the corresponding password is revealed, thus breaking the encryption. | ||
|
||
### **Advantages of Using Rainbow Tables** | ||
|
||
* **Speed:** Pre-calculation of hashes saves considerable time during attack execution. | ||
* **Efficiency:** Rainbow tables make it possible to crack complex passwords that would otherwise require immense computational resources. | ||
|
||
### **Limitations and Defense** | ||
|
||
Modern security measures, such as the implementation of salting and the use of stronger password hashing algorithms like bcrypt, make rainbow tables less effective.  | ||
|
||
Furthermore, network administrators are encouraged to use strong, unique passwords and upgrade to advanced security protocols like WPA3 to mitigate the risk of such attacks. |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,19 @@ | ||
# Bands & Channels | ||
|
||
Wi-Fi utilizes radio waves to transmit data wirelessly. These radio waves are divided into different bands, each with its own characteristics and advantages. The two most common Wi-Fi bands are 2.4 GHz and 5 GHz. | ||
|
||
* **2.4 GHz band:** This band is the older and more widely used of the two. It offers wider coverage and can better penetrate walls and other obstacles. However, it is also more crowded, as it is used by many other devices, such as Bluetooth devices, microwave ovens, and cordless phones. This can lead to interference and slower speeds. | ||
* **5 GHz band:** This band is less crowded than the 2.4 GHz band and offers faster speeds. However, it has a shorter range and cannot penetrate walls and other obstacles as well. This means that you may need to have more access points if you have a large home or office. | ||
|
||
In addition to the 2.4 GHz and 5 GHz bands, there is also a new 6 GHz band that is starting to be used by some Wi-Fi devices. The 6 GHz band offers even faster speeds and less congestion than the other two bands. However, it is still too early to say how widely adopted it will be. | ||
|
||
The channels that your Wi-Fi router uses can also affect your speed and performance. Each band is divided into several channels, and it is important to choose a channel that is not being used by other Wi-Fi networks in your area.  | ||
|
||
If you are using a 2.4 GHz router, you should choose a channel that is at least 5 channels away from any other Wi-Fi networks. For 5 GHz routers, you can choose any available channel. | ||
|
||
Here are some additional tips for choosing the right Wi-Fi band and channel: | ||
|
||
* If you have a small home or office and only need to connect a few devices, the 2.4 GHz band may be sufficient. | ||
* If you have a large home or office and need to connect many devices, or if you need the fastest possible speeds, the 5 GHz band is a better choice. | ||
* If you live in an apartment building or other crowded area, you may need to experiment with different channels to find one that is not being used by other networks. | ||
* You can use a Wi-Fi analyzer tool to see which channels are being used in your area. |
Oops, something went wrong.