hack
Diferencias
Muestra las diferencias entre dos versiones de la página.
Ambos lados, revisión anteriorRevisión previaPróxima revisión | Revisión previaÚltima revisiónAmbos lados, revisión siguiente | ||
hack [2020/04/15 17:20] – [Packet Sniffing (airodump)] gregkedro | hack [2020/04/17 16:20] – [Change Adapter Mode] gregkedro | ||
---|---|---|---|
Línea 2: | Línea 2: | ||
**Adapters: | **Adapters: | ||
+ | * Tools are found in the [[https:// | ||
===== Adapter Setup ===== | ===== Adapter Setup ===== | ||
Línea 121: | Línea 122: | ||
Do an '' | Do an '' | ||
+ | * **Important: | ||
1. Disable the interface. | 1. Disable the interface. | ||
Línea 131: | Línea 133: | ||
< | < | ||
- | 3. Enable monitor mode. | + | 3. Enable monitor mode [1]. |
< | < | ||
Línea 141: | Línea 143: | ||
Run '' | Run '' | ||
+ | |||
+ | [1] The '' | ||
+ | * '' | ||
+ | * '' | ||
+ | * '' | ||
+ | * '' | ||
+ | * '' | ||
+ | * '' | ||
+ | * '' | ||
---- | ---- | ||
Línea 166: | Línea 177: | ||
</ | </ | ||
- | Once you find a target in the information provided by '' | + | Once you find a target |
---- | ---- | ||
Línea 172: | Línea 183: | ||
===== Targeted Sniffing ===== | ===== Targeted Sniffing ===== | ||
- | Here you specify the BSSID+Channel you want to play with... | + | Here you specify the target network (BSSID + Channel) you want to play with... |
- | From the general sniff of all traffic you just did, copy the target BSSID and Channel number: | + | **Target One Specific Network: |
+ | * Run it without '' | ||
+ | * You will see two sections: the top is the network, the bottom shows the clients (" | ||
< | < | ||
Línea 193: | Línea 206: | ||
< | < | ||
- | aireplay-ng --deauth 10000000 -a XX: | + | aireplay-ng --deauth=10000000 -a XX: |
# program | # program | ||
</ | </ | ||
The '' | The '' | ||
+ | * Remember: to get a client MAC address, you run airodump-ng and specify the network in order to see all the clients. The clients show up in the second (lower) block of information, | ||
- | This still may fail unless you are also running '' | + | < |
+ | |||
+ | This still may fail unless you are also running '' | ||
---- | ---- | ||
Línea 261: | Línea 277: | ||
==== WPA & WPA2 ==== | ==== WPA & WPA2 ==== | ||
- | The only difference is the ecryption method: WPA uses TKIP & WPA2 uses CCMP. The same methods will work with both WPA and WPA2. | + | The only difference is the ecryption method: WPA uses TKIP and WPA2 uses CCMP. The same methods will work with both WPA and WPA2. |
**Misconfiguration Exploit:** WPS (allows clients to connect without the password). | **Misconfiguration Exploit:** WPS (allows clients to connect without the password). | ||
Línea 270: | Línea 286: | ||
* Check this first (since WPA/WPA2 are so difficult to crack). | * Check this first (since WPA/WPA2 are so difficult to crack). | ||
- | 1. TOOL: '' | + | 1. TOOL: '' |
- | < | + | < |
+ | wash --interface wlan0 # if this errors out, do the following... | ||
+ | ifconfig wlan0 down # or ifdown wlan0 | ||
+ | iwconfig wlan0 mode auto | ||
+ | ifconfig wlan0 up # or ifup wlan0 | ||
+ | wash --interface wlan0 # remember to change mode back to monitor for the hacks | ||
+ | </ | ||
2. Associate with the network (as above)... set this up but **//DO NOT RUN IT YET//**... | 2. Associate with the network (as above)... set this up but **//DO NOT RUN IT YET//**... |
hack.txt · Última modificación: 2020/04/17 16:21 por gregkedro