Time for action – cracking WEP

Follow these instructions to get started:

  1. Let's first bring up our rogue access point using airbase-ng and give it the ESSID Rogue:
    Time for action – cracking WEP
  2. We now want to create a bridge between the Ethernet interface, which is part of the authorized network, and our rogue access point interface. To do this, we will first install bridge-utils files, create a bridge interface, and name it Wifi-Bridge. The following screenshot shows the required commands in action:
    apt-get install bridge-utils
    brctl addbr Wifi-Bridge

    Let's see the following output of the command:

    Time for action – cracking WEP
  3. We will then add both the Ethernet and the At0 virtual interface created by Airbase-ng to this bridge:
    brctl addif Wifi-Bridge eth0
    brctl addif Wifi-Bridge ath0

    The screenshot of the command as follows:

    Time for action – cracking WEP
  4. We will then bring with these interfaces up to bring the bridge up with the following commands:
    ifconfig eth0 0.0.0.0 up
    ifconfig ath0 0.0.0.0 up

    The screenshot of the command as follows:

    Time for action – cracking WEP
  5. We will then enable IP forwarding in the kernel to ensure that packets are forwarded:
    echo 1 > /proc/sys/net/ipv4/ip_forward
    

    The screenshot of the command as follows:

    Time for action – cracking WEP
  6. Brilliant! We are done. Now, any wireless client connecting to our rogue access point will have full access to the authorized network using the wireless-to-wired Wifi-Bridge we just built. We can verify this by connecting a client to the rogue access point. Once connected, if you are using Vista, your screen might look like the following:
    Time for action – cracking WEP
  7. Notice that it receives an IP address from the DHCP daemon running on the authorized LAN:
    Time for action – cracking WEP
  8. We can now access any host on the wired network from this wireless client using this rogue access point. Next, we will ping the gateway on the wired network:
    Time for action – cracking WEP

What just happened?

We created a rogue access point and used it to bridge all the authorized network LAN traffic over the wireless network. As you can see, this is a really serious security threat as anyone can break into the wired network using this bridge.

Have a go hero – rogue access point challenge

Check whether you can create a rogue access point that uses WPA/WPA2-based encryption to look more legitimate on the wireless network.

Pop quiz – attacks on the WLAN infrastructure

Q1. What encryption does a rogue access point use in most cases?

  1. None.
  2. WEP.
  3. WPA.
  4. WPA2.

Q2. What is the advantage of having the same MAC address as the authorized access point in an evil twin?

  1. It makes detecting the evil twin more difficult.
  2. It forces the client to connect to it.
  3. It increases the signal strength of the network.
  4. None of the above.

Q3. What do DoS attacks do?

  1. They bring down the overall throughput of the network.
  2. They do not target the clients.
  3. They can only be done if we know the network WEP/WPA/WPA2 credentials.
  4. All of the above.

Q4. What do rogue access points do and how can they be created?

  1. They allow backdoor entry into the authorized network.
  2. They use WPA2 encryption only.
  3. They can be created as software-based access points or can be actual devices.
  4. Both 1 and 3.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.17.91