Notes

This book was written for BackTrack, but it's fully compatible with Kali Linux.

Chapter 1: Wireless Lab Setup

Hardware requirements

Software requirements

Installing BackTrack

This is fairly obvious and has been documented in countless places on the web, so I won't dwell on this.

Setting up the access point

Setting up the wireless card

Connecting to the access point

Chapter 2: WLAN and its Its Inherent Insecurities

Revisiting WLAN frames

The book assumes you have a basic understanding of the protocol and the packet headers

We will now use Wireshark. Alternatives to Wireshark are, for example, Airodump-NG, Tcpdump, and Tshark.

Next, we'll create a monitor mode interface for promiscuous mode - a mode which allows a network card to capture any packets in the air, not just the
ones destined for it.

Creating a monitor mode interface

Sniffing wireless packets

Viewing Management, Control, and Data frames

Sniffing data packets for our network

Packet injection

Important note on WLAN sniffing and injection

Experimenting with your Alfa (or other) card

Role of regulatory domains in wireless

Each country has different laws for power levels and frequencies

Experimenting with your card

Chapter 3: Bypassing WLAN Authentication

Hidden SSIDs

Uncovering hidden SSIDs

MAC filters

Beating MAC filters

Open Authentication

Open authentication authenticates all clients which connect. There's no authentication at all.

Bypassing Open Authentication

Shared Key Authentication

Bypassing Shared Authentication

Chapter 4: WLAN Encryption Flaws

WLAN encryption

WEP encryption

WPA/WPA2

Cracking WPA-PSK weak passphrase

Speeding up WPA/WPA2 PSK cracking

Decrypting WEP and WPA packets

Connecting to WEP and WPA networks

WEP

WPA

# WPA-PSK/TKIP

network={
    ssid=<SSID>
    key_mgmt=WPA-PSK
    proto=WPA
    pairwise=TKIP
    group=TKIP
    psk="<PSK>"
}

Chapter 5: Attacks on the WLAN Infrastructure

Default accounts and credentials on the access point

Denial of service attacks

De-Auth DoS attack

Evil twin and access point MAC spoofing

Evil twin with MAC spoofing

Rogue access point

Rogue access point

Chapter 6: Attacking the Client

Honeypot and Mis-Association attacks

Orchestrating a mis-association attack

Caffe Latte attack

Conducting the Caffe Latte attack

De-Authentication and Dis-Association attacks

De-Authenticating the client

Dis-Association attack on the client

Hirte attack

AP-less WPA-Personal cracking

AP-less WPA cracking

Chapter 7: Advanced WLAN Attacks

Man-in-the-Middle attack

Man-in-the-Middle attack

Man-in-the-Middle over pure wireless

Wireless Eavesdropping using MITM

Wireless eavesdropping

Session Hijacking over wireless

Session hijacking over wireless

Finding security configurations on the client

Enumerating wireless security profiles

Chapter 8: Attacking WPA-Enterprise and RADIUS

Setting up FreeRadius

Setting up the AP with FreeRadius-WPE

Attacking PEAP

Cracking PEAP (with a Honeypot)

Attacking EAP-TTLS

Cracking EAP-TTLS

Security best practices for Enterprises

Chapter 9: WLAN Penetration Testing Methodology

Wireless penetration testing

Planning

Discovery

Discovering wireless devices

Attack

Finding rogue access points

Finding rogue access points

Finding unauthorized clients

Cracking WPA

Compromising the clients

Reporting

Appendix A: Conclusion and Road Ahead

Building an advanced Wi-Fi lab

Staying up-to-date