Time for action – cracking PEAP

Follow the given instructions to get started:

  1. We double-check the eap.conf file to ensure that PEAP is enabled:
    Time for action – cracking PEAP
  2. We then restart the RADIUS server with freeradius-wpe –s –X:
    Time for action – cracking PEAP
  3. We monitor the log file created by FreeRADIUS-WPE:
    Time for action – cracking PEAP
  4. Windows has native support for PEAP. Let's ensure that certificate verification has been turned off:
    Time for action – cracking PEAP
  5. We need to click on the Configure tab that is next to Secured password (EAP-MSCHAP v2) and tell Windows not to automatically use our Windows logon name and password:
    Time for action – cracking PEAP
  6. We will also have to force it to select User authentication in the Advanced Settings dialog box:
    Time for action – cracking PEAP
  7. Once the client connects to the access point, the client is prompted for a username and password. We use Monster as the username and abcdefghi as the password:
    Time for action – cracking PEAP
  8. As soon as we do this, you should be able to see the MSCHAP-v2 challenge response appear in the log file.
  9. We now use asleap to crack this using a password list file that contains the password abcdefghi, and we are able to crack the password!

What just happened?

We set up our Honeypot using FreeRADIUS-WPE. The enterprise client is misconfigured to not use certificate validation with PEAP. This allows us to present our own fake certificate to the client, which it gladly accepts. Once this happens, MSCHAP-v2, the inner authentication protocol, kicks in. As the client uses our fake certificate to encrypt the data, we are easily able to recover the username, challenge, and response tuples.

MSCHAP-v2 is prone to dictionary attacks. We use asleap to crack the challenge and response pair, as it seems to be based on a dictionary word.

Have a go hero – attack variations on PEAP

PEAP can be misconfigured in multiple ways. Even with certificate validation enabled, if the administrator does not mention the authentic servers in connect to these servers list, the attacker can obtain a real certificate for another domain from any of the listed certifying authorities. This will still be accepted by the client. Other variations of this attack are possible as well.

We will encourage you to explore the different possibilities in this section.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.5.217