Wi-Fi Hacking
Wi-Fi networks have become more secure over time, with most access points now using WPA 2 Pre Shared Key and AES encryption, no security measure is completely foolproof. One vulnerability of WPA 2 PSK is that the password, in encrypted form, is shared via a 4-way handshake when a user authenticates through the access point. Hackers can capture the 4-way handshake packet and attempt to crack the encrypted password using a wordlist. While there are other methods to crack Wi-Fi passwords, using a wordlist is the simplest and most commonly used by attackers.
Understanding about 2.4 GHz and 5 GHz WIFI Networks.
Wi-Fi networks use different frequency ranges or bands, such as 2.4 GHz and 5 GHz, to transmit data. These bands determine the frequency range and channels used for communication. To connect to a Wi-Fi network, the device must support the same band as the network. For instance, if the Wi-Fi network uses the 5 GHz frequency, the device needs to support this band to connect to the network. Furthermore, if a wireless adapter supports a specific band, it can capture or intercept data transmitted over that band.
Understanding Managed Mode and Monitor Mode.
Managed mode and monitor mode are two modes of operation for a wireless network interface card (NIC) that enable different types of wireless communication.
Managed mode is the default mode of operation for a wireless NIC. In this mode, the NIC behaves as a client and connects to an access point (AP) to access a wireless network. Managed mode allows the NIC to send and receive data over the wireless network, but it cannot capture or sniff wireless traffic.
Monitor mode, on the other hand, is a special mode of operation that allows the NIC to capture or sniff wireless traffic. In this mode, the NIC behaves as a passive listener, capturing all wireless traffic that it can receive on a specific channel. Monitor mode is commonly used for wireless network monitoring and troubleshooting, as well as for wireless network security auditing and testing.
To switch from managed mode to monitor mode, the wireless NIC must support monitor mode, and the user must explicitly activate it using specialized tools or commands. While in monitor mode, the NIC cannot connect to a wireless network as a client, and the user must switch back to managed mode to access wireless networks.
To Check Mode
To view the “Mode” of the wireless card on a Linux system, you can open a terminal and execute the following command:
To activate monitor mode on a wireless NIC in Linux, we can use a command-line tool called airmon-ng. To do this, open a terminal and execute the following command, replacing "wlan1" with the name of your wireless NIC:
This command will create a new virtual interface on your wireless NIC, which will be used for monitor mode. You can then use this virtual interface to capture or sniff wireless traffic using tools like Wireshark for tcpdump.
Note that you need to have administrative privileges to run this command, so you may be prompted to enter your password. Additionally, make sure that any Wi-Fi connections on the NIC are disconnected before enabling monitor mode, as it can interfere with network connections.
To verify if your card has been successfully switched to monitor mode, please run the following command:
Packet sniffing with airodump-ng is a common technique used for capturing and analyzing wireless traffic in real-time. Airodump-ng is a command-line tool that comes with the Aircrack-ng suite of wireless security tools.
To use airodump-ng, open a terminal and execute the following command:
This command will start airodump-ng in monitor mode, using the wireless interface "wlx00c0ca2613bb" (which is the name of the virtual interface created by airmon-ng). Airodump-ng will start scanning all wireless traffic on the current channel and display information about the detected access points (APs) and clients.
BSSID:This signifies the unique identifier, known as the MAC address, assigned to our router or access point.
PWR: This column shows how close or far the router is to our device.
Beacons: These are the data units transmitted by the Access Point to indicate its availability or existence.
# Data: This column displays the captured data packets.
MB: The highest achievable data rate provided by the Access Point
CIPHER: The Cipher detected on the network
ESSID; The name of the WIFI network
fly is the name of the file where captured packets have been stored.