Wireless networks generally fall into two categories:
- WPA2 PSK (Pre-Shared Key): Commonly used in home networks.
- WPA2 Enterprise: Typically used in business environments, with a more complex setup.
Since WPA2 Enterprise is more challenging to set up and test, this guide focuses on WPA2 PSK, which is quicker to attack and commonly documented in blog posts.
-
Evaluating PSK Strength: Capture a WPA2 handshake and attempt to crack the PSK (password).
-
Reviewing Nearby Networks: Identify and assess nearby networks for vulnerabilities.
-
Assessing Guest Networks:
- Check if guest networks are properly separated from main networks.
- Attempt to crack the guest network password.
-
Checking Network Access: Verify the level of access allowed once connected to the network.
-
Alfa Wireless Card:
- Capable of packet injection and monitoring.
- Supports both 2.4GHz and 5GHz frequencies.
- Alfa and Panda are recommended brands.
- See: Best WiFi Adapters for Kali Linux
-
Router
-
Laptop
-
Switch Wireless Card to Monitor Mode: Enables capturing all wireless traffic in range.
-
Discover Network Information: Identify channel and BSSID of the target network.
-
Capture Data: Select the target network and capture data packets.
-
Perform Deauthentication (Deauth) Attack: Force a connected user to reconnect to the network.
-
Capture WPA Handshake: Obtain the handshake when a user reconnects to the network.
-
Attempt to Crack the Handshake: Use tools to crack the WPA2 handshake and retrieve the PSK.
-
Connect Router to Kali Linux:
- Connect your router to the Kali Linux machine.
- Verify the connection using
iwconfig
.
-
Prepare the Wireless Card:
- Stop interfering processes:
airmon-ng check kill
- Start monitor mode on the wireless card:
airmon-ng start wlan0
- Stop interfering processes:
-
Verify Monitor Mode:
- Check if
wlan0mon
appears:iwconfig
- Check if
-
Scan for Devices:
- Use
airodump-ng
to scan for nearby devices:airodump-ng wlan0mon
- Look for the
TP-Link
router in the scan results. Note down the channel and BSSID (e.g.,50:C7:BF:8A:00:73
).
- Use
-
Capture Data:
- Start capturing packets from the specific channel and BSSID:
Replace
airodump-ng -c [CHANNEL] --bssid [BSSID] -w capture wlan0mon
[CHANNEL]
with the noted channel number and[BSSID]
with the router’s BSSID.
- Start capturing packets from the specific channel and BSSID:
-
Perform Deauthentication Attack:
- Open a new terminal tab and execute the following to deauthenticate a connected user:
Replace
aireplay-ng -0 1 -a [BSSID] -c [CLIENT_MAC] wlan0mon
[BSSID]
with the router’s BSSID and[CLIENT_MAC]
with the MAC address of a connected client (found in the scan results).
- Open a new terminal tab and execute the following to deauthenticate a connected user:
-
Verify WPA Handshake:
- In the
airodump-ng
tab, ensure you seeWPA Handshake
at the top, indicating successful capture.
- In the
-
Crack the Password:
- Use
aircrack-ng
to crack the captured handshake with a wordlist:Replaceaircrack-ng -w [WORDLIST] -b [BSSID] capture.cap
[WORDLIST]
with the path to your wordlist file and[BSSID]
with the router’s BSSID.
- Use