Skip to main content

Finding Wireless Networks


              

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be used for site surveys. I actually know of one highly known public wireless hotspot provider that uses this utility for their site surveys.

(NetStumbler Screenshot)
Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.

(Kismet Screenshot)

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.
Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys.  While many people bash the use of WEP, it is certainly better than using nothing at all.  Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

(Screenshot of Airsnort in Action)
CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.

(Cowpatty Options Screenshot)


ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked.  LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.

(Asleap Options  Screenshot)

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.
Wireshark (formerly Ethereal) – While there has been much debate on the proper way to pronounce this utility, there is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.

(Screenshot of Ethereal in Action)

(Yahoo IM Session being sniffed in Ethereal)
The aforementioned utilities, or similar ones, will be necessities in your own wireless security toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab environment. And cost is no excuse as all of these tools are available freely on the Internet. 

Protecting Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.
NetStumbler – Do not broadcast your SSID.  Ensure your WLAN is protected by using advanced Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption
Airsnort – Use a 128-bit, not a 40-bit WEP encryption key.  This would take longer to crack.  If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).
Cowpatty – Use a long and complex WPA Pre-Shared Key.  This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer.  If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out.  If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.
ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.
Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.  WPA2, which uses AES, is essentially unrealistic to break by a normal hacker.  Even WEP will encrypt the data.  When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL.  For corporate users, use IPSec VPN with split-tunneling disabled.  This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Comments

Popular posts from this blog

STEALING PASSWORD WITH GOOGLE HACK

Google is a treasure trove full of important information, especially for  the underground  world. This Potential fact can also be utilized in the data for the username and password stored on a server. If the administrator save important data not in the  complete system authentifikasi folder, then most likely be reached by the google search engine. If data is successfully steal in by the unauthorized person, then the will be in misuse. Here, some google search syntax to crawl the password: 1.  "Login: *" "password =*" filetype: xls  (searching data command to the system files that are stored in  Microsoft Excel ) 2.  allinurl: auth_user_file.txt  (to find files auth_user_file.txt containing password on server). 3.  filetype: xls inurl: "password.xls"  (looking for username and password in ms excel format). This command can change with admin.xls) 4.  intitle: login password  (get link to the  login page  with the login words on the

How to customize icons with icon packs

Hello Readers I Pawan Sharma going to share one of the best method to customize your android phone with icon packs. This customization method works with both rooted and non rooted user difference is that a rooted user can change whole system icons whereas non rooted user only can change icon of its launcher. Note-If you are a rooted user then follow first method . So things we need to do this customization. 1.Activated xposed 2.Unicon module Steps for customizations- First activate unicon module from xposed installer Go to xposed installer>modules>tick on unicon module. See screenshot Now download any icon pack from play store and set it by unicon module... NOTE-ABOVE METHOD WORKS ONLY FOR ROOTED USER Non rooted user-Non rooted user can also customizer thier desktop from any third party launcher Some higly recommended launchers are- 1. Nova launcher 2. Apex launcher Download compati

Make your keyboard tinted everywhere

Ok guyz I Pawan Sharma going to share one awesome trick from which you can make your android keyboard fully tinted like your status bar or accordingly to the action bar(header). But but but this trick only works with rooted phones if you have a rooted phone then welcome to this post.After apply these methods surely your phone will rock on every screen. OK so things we need for this tricks are- 1.Rooted phone(android above then 4.3 jelly bean) 2.Super user installed 3.Xposed installer 4.Flat style keyboard 5.Gboard 1.Rooted Phone-If you do not have a rooted phone then dont worry you can root it easily there are many methods of rooting on internet,search your phone model on google for root method it will tell you how to root. There is one common app which root most probably all phones as i tested it on many phones that apk name is Kingroot You can download it from above link,just download it and connect internet open app click on root button.....wait until complete,this pro