The Dutch HackInfo The Dutch HackInfo
  • News
  • Hacking
    • Algemene hacker info
    • Kali Linux Info Portal
    • Black Hat conference
    • Blackhat SEO technieken
    • Hacking magazines
    • iPhone Hacking
    • Test your hack skills
    • Virus creation kit
    • Webcam Hacking
    • WiFi Hacking
  • Security
    • Anoniem surfen
    • Encryptie
    • Firewall software
    • Security Tools General
    • Virusscanner software
    • Web App Security tools
  • Tweaking
    • PlayStation tweaks
    • Wii tweaks
    • Xbox tweaks
    • Kinect tweaks
    • iPhone tweaks
    • Apple TV
    • RaspBerry Pi
    • DIY
  • Tooling
    • Wifi Pentesting
    • Implants & Remote Access
    • Hotplug Attacks
    • All other tools
  • Good Stuff
    • Peter draait door
    • Background
    • NSA Dossier
    • Live cyberaanvallen
    • The HackInfo Weekly
    • Archive
  • Zoeken
  • Sign in

Wifi Pentesting

Wireless hacking tools

How to: Find the Best Free Wi-Fi

Details
hackmod.com
20 August 2009
Hits: 6679

 

Top-Image

Don’t we all wish that at least some things in life be free? Wi-Fi is on most wish lists. Wi-Fi is an inherent part of airwaves around us. The only problem – It’s not obvious, it’s shut tight and it’s not free to access.

But just like free parking, there are a few places where Wi-Fi can be accessed without spending a penny. That’s the easy part. The difficult part is scanning the airwaves in search of Wi-Fi hotspots. Thankfully, the first is accessible thanks to some public hotspots and the second, using software tools and Wi-Fi firmware.

We have cleared a lot of air with our own collection of Wi-Fi how-tos. Lifehacker’s The Definitive Guide to Finding Free Wi-Fi is also an important add-on for your Wi-Fi bag of tricks. The guide takes you through three levels of need in the search for free Wi-Fi. Just how extreme is your need?

The Easy Effort Way Using Public Hotspots

Locate public Wi-Fi hotspots around libraries, Barnes & Noble bookstores, McDonald’s, the airport, university campus, independent coffee shop, or hotel lobbies. These are probable places which offer free Wi-Fi as a utility.

Check out our Free Airport Wi-Fi Hack or the cheeky Become a War Driving Pro – Hack WEP and Wi-Fi post.

The Medium Effort Way Using Apps

Apps

Many free Windows, Mac and mobile OS apps enhance Wi-Fi scan and seek. The Lifehacker guide recommends NetStumbler and WeFi for Windows, iStumbler for Mac, JiWire Free Wi-Fi Finder (iPhone), WiFiFoFum (Windows Mobile) and WeFi again for the Android.

You can go online with a smartphone and check out a few web apps to find a Wi-Fi hotspot. The guide mentions WiFinder, Hotspot Haven, JiWire, Wi-Fi Hotspot List and Hotspotr as bookmark worthy.

Also, check out Ekahu HeatMapper (Windows only) for wireless signal strength mapping.


The High Effort Way Using Hacks

The Lifehacker guide looks at ways to hookup your smartphone as a wireless router. And also the really acute way of hacking into a WEP-secured wireless network with Backtrack.

Check out our own high effort How To: iPhone as a Wireless Router for your Laptop.

At HacknMod we have also looked at ways to enhance a Wi-Fi signal –

  • Make a DIY Wifi Repeater/Range Extender
  • How to: Blazing Fast Internet Speed with Dual Band Wifi
  • Get all the Wifi you can handle

The resources are around us. A few rounds of learning by doing will make you a Wi-Fi ninja.

Source: Hackmod.com

Hackertool Metasploit ook geschikt voor Windows XP

Details
Security.nl
13 March 2009
Hits: 11230
Voor het gebruik van beveiligingstools en het testen van je netwerk hoef je niet per definitie Linux te gebruiken, ook Windows XP volstaat prima. Hackertool Metasploit is voor veel beveiligers, systeembeheerders en hobbyisten een handig gereedschap bij het vinden van beveiligingsproblemen. Vorig jaar oktober verscheen versie 3.2, die ook op Windows werkt.
Read more: Hackertool Metasploit ook geschikt voor Windows XP

Wireless Hacking Tools

Details
KriekOS
10 December 2008
Hits: 65019

Wired Equivalent Privacy (WEP) is often mistakenly thought of as a protocol designed to 100% protect wireless traffic, when this is not the case. WEP is easy to crack and shouldn’t be used.

WEP Hacking Tutorials and Resources:

  1. WEP can be cracked in 10 minutes easily.
  2. Related hacking project: War Driving Tips, Tricks, and Software
  3. Learn to Hack WEP using Mac or Linux
  4. WEP hacking video tutorial.
  5. If all else fails, try the default admin router passwords.

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are commonly used in this regard:

1 Network Stumbler a.k.a NetStumbler
This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.
NetStumbler

2 Kismet
One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.
kismet

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.

Aircrack
This is a very easy to use tool that can be used to sniff and crack WEP keys.  While many people bash the use of WEP, it is certainly better than using nothing at all.  Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.
airsnort

CowPatty
This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.
cowpatty

ASLeap
If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked.  LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.
asleap


Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.

Wireshark (formerly Ethereal)

While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.
ethereal

yahooim
(Yahoo IM Session being sniffed in Ethereal)

The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet.

 

Protecting Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID.  Ensure your WLAN is protected by using advanced Authentication and Encryption.

Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key.  This would take longer to crack.  If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).

Cowpatty – Use a long and complex WPA Pre-Shared Key.  This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer.  If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out.  If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.

Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.  WPA2, which uses AES, is essentially unrealistic to break by a normal hacker.  Even WEP will encrypt the data.  When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL.  For corporate users, use IPSec VPN with split-tunneling disabled.  This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Source: ethicalhacker.net

Page 4 of 4
  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
  • End

We have 1403 guests and no members online

Feed Entries
  • FAQ
  • About
Bootstrap is a front-end framework of Twitter, Inc. Code licensed under MIT License. Font Awesome font licensed under SIL OFL 1.1.