Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Kali Linux Wireless Penetration Testing: Beginner's Guide
Kali Linux Wireless Penetration Testing: Beginner's Guide
Kali Linux Wireless Penetration Testing: Beginner's Guide
Ebook377 pages2 hours

Kali Linux Wireless Penetration Testing: Beginner's Guide

Rating: 0 out of 5 stars

()

Read preview

About this ebook

About This Book
  • Learn wireless penetration testing with Kali Linux; Backtrack’s evolution
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
Who This Book Is For

If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.

LanguageEnglish
Release dateMar 30, 2015
ISBN9781783280421
Kali Linux Wireless Penetration Testing: Beginner's Guide
Author

Vivek Ramachandran

Vivek Ramachandran is a world renowned security researcher and evangelist. He is the discoverer of the wireless "Caffe Latte Attack" and has delivered presentations in world renowned Information Security conferences such as Defcon and Toorcon in the US. His discoveries and talks have been widely quoted by the International media including - BBC Online, Network World, The Register, Mac World, Computer Online and others. In 2006, Microsoft declared Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. In 2005, he was awarded a team achievement award by Cisco Systems for his work in the 802.1x and Port Security modules. He is well known in the hacking and security community as the founder of SecurityTube.net , a free video based computer security education portal which gets an estimated 100,000 monthly visitors. Vivek is also an accomplished trainer and travels around the world conducting workshops and training sessions for corporates and students. He holds a degree in B.Tech from IIT Guwahati and acts as an advisor to the computer science department's Security Lab.

Read more from Vivek Ramachandran

Related to Kali Linux Wireless Penetration Testing

Related ebooks

Software Development & Engineering For You

View More

Related articles

Reviews for Kali Linux Wireless Penetration Testing

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Kali Linux Wireless Penetration Testing - Vivek Ramachandran

    Table of Contents

    Kali Linux Wireless Penetration Testing Beginner's Guide

    Credits

    About the Authors

    About the Reviewer

    www.PacktPub.com

    Support files, eBooks, discount offers, and more

    Why subscribe?

    Free access for Packt account holders

    Disclaimer

    Preface

    What this book covers

    What you need for this book

    Who this book is for

    Conventions

    Reader feedback

    Customer support

    Errata

    Piracy

    Questions

    1. Wireless Lab Setup

    Hardware requirements

    Software requirements

    Installing Kali

    Time for action – installing Kali

    What just happened?

    Have a go hero – installing Kali on VirtualBox

    Setting up the access point

    Time for action – configuring the access point

    What just happened?

    Have a go hero – configuring the access point to use WEP and WPA

    Setting up the wireless card

    Time for action – configuring your wireless card

    What just happened?

    Connecting to the access point

    Time for action – configuring your wireless card

    What just happened?

    Have a go hero – establishing a connection in a WEP configuration

    Pop quiz – understanding the basics

    Summary

    2. WLAN and its Inherent Insecurities

    Revisiting WLAN frames

    Time for action – creating a monitor mode interface

    What just happened?

    Have a go hero – creating multiple monitor mode interfaces

    Time for action – sniffing wireless packets

    What just happened?

    Have a go hero – finding different devices

    Time for action – viewing management, control, and data frames

    What just happened?

    Have a go hero – playing with filters

    Time for action – sniffing data packets for our network

    What just happened?

    Have a go hero – analyzing data packets

    Time for action – packet injection

    What just happened?

    Have a go hero – installing Kali on VirtualBox

    Important note on WLAN sniffing and injection

    Time for action – experimenting with your adapter

    What just happened?

    Have a go hero – sniffing multiple channels

    The role of regulatory domains in wireless

    Time for action – experimenting with your adapter

    What just happened?

    Have a go hero – exploring regulatory domains

    Pop quiz – WLAN packet sniffing and injection

    Summary

    3. Bypassing WLAN Authentication

    Hidden SSIDs

    Time for action – uncovering hidden SSIDs

    What just happened?

    Have a go hero – selecting deauthentication

    MAC filters

    Time for action – beating MAC filters

    What just happened?

    Open Authentication

    Time for action – bypassing Open Authentication

    What just happened?

    Shared Key Authentication

    Time for action – bypassing Shared Authentication

    What just happened?

    Have a go hero – filling up the access point's tables

    Pop quiz – WLAN authentication

    Summary

    4. WLAN Encryption Flaws

    WLAN encryption

    WEP encryption

    Time for action – cracking WEP

    What just happened?

    Have a go hero – fake authentication with WEP cracking

    WPA/WPA2

    Time for action – cracking WPA-PSK weak passphrases

    What just happened?

    Have a go hero – trying WPA-PSK cracking with Cowpatty

    Speeding up WPA/WPA2 PSK cracking

    Time for action – speeding up the cracking process

    What just happened?

    Decrypting WEP and WPA packets

    Time for action – decrypting WEP and WPA packets

    What just happened?

    Connecting to WEP and WPA networks

    Time for action – connecting to a WEP network

    What just happened?

    Time for action – connecting to a WPA network

    What just happened?

    Pop quiz – WLAN encryption flaws

    Summary

    5. Attacks on the WLAN Infrastructure

    Default accounts and credentials on the access point

    Time for action – cracking default accounts on the access points

    What just happened?

    Have a go hero – cracking accounts using brute-force attacks

    Denial of service attacks

    Time for action – deauthentication DoS attacks

    What just happened?

    Have a go hero – disassociation attacks

    Evil twin and access point MAC spoofing

    Time for action – evil twins and MAC spoofing

    What just happened?

    Have a go hero – evil twins and channel hopping

    A rogue access point

    Time for action – cracking WEP

    What just happened?

    Have a go hero – rogue access point challenge

    Pop quiz – attacks on the WLAN infrastructure

    Summary

    6. Attacking the Client

    Honeypot and Mis-Association attacks

    Time for action – orchestrating a Mis-Association attack

    What just happened?

    Have a go hero – forcing a client to connect to the Honeypot

    The Caffe Latte attack

    Time for action – conducting a Caffe Latte attack

    What just happened?

    Have a go hero – practise makes perfect!

    Deauthentication and disassociation attacks

    Time for action – deauthenticating the client

    What just happened?

    Have a go hero – disassociation attack on the client

    The Hirte attack

    Time for action – cracking WEP with the Hirte attack

    What just happened?

    Have a go hero – practise, practise, practise

    AP-less WPA-Personal cracking

    Time for action – AP-less WPA cracking

    What just happened?

    Have a go hero – AP-less WPA cracking

    Pop quiz – attacking the client

    Summary

    7. Advanced WLAN Attacks

    A man-in-the-middle attack

    Time for action – man-in-the-middle attack

    What just happened?

    Have a go hero – man-in-the-middle over pure wireless

    Wireless Eavesdropping using MITM

    Time for action – Wireless Eavesdropping

    What just happened?

    Have a go hero – finding Google searches

    Session hijacking over wireless

    Time for action – session hijacking over wireless

    What just happened?

    Have a go hero – application hijacking challenge

    Finding security configurations on the client

    Time for action – deauthentication attacks on the client

    What just happened?

    Have a go hero – baiting clients

    Pop quiz – advanced WLAN attacks

    Summary

    8. Attacking WPA-Enterprise and RADIUS

    Setting up FreeRADIUS-WPE

    Time for action – setting up the AP with FreeRADIUS-WPE

    What just happened?

    Have a go hero – playing with RADIUS

    Attacking PEAP

    Time for action – cracking PEAP

    What just happened?

    Have a go hero – attack variations on PEAP

    EAP-TTLS

    Security best practices for Enterprises

    Pop quiz – attacking WPA-Enterprise and RADIUS

    Summary

    9. WLAN Penetration Testing Methodology

    Wireless penetration testing

    Planning

    Discovery

    Attack

    Cracking the encryption

    Attacking infrastructure

    Compromising clients

    Reporting

    Summary

    10. WPS and Probes

    WPS attacks

    Time for action – WPS attack

    What just happened?

    Have a go hero – rate limiting

    Probe sniffing

    Time for action – collecting data

    What just happened?

    Have a go hero – extension ideas

    Summary

    A. Pop Quiz Answers

    Chapter 1, Wireless Lab Setup

    Pop quiz – understanding the basics

    Chapter 2, WLAN and its Inherent Insecurities

    Pop quiz – understanding the basics

    Chapter 3, Bypassing WLAN Authentication

    Pop quiz – WLAN authentication

    Chapter 4, WLAN Encryption Flaws

    Pop quiz – WLAN encryption flaws

    Chapter 5, Attacks on the WLAN Infrastructure

    Pop quiz – attacks on the WLAN infrastructure

    Chapter 6, Attacking the Client

    Pop quiz – Attacking the Client

    Chapter 7, Advanced WLAN Attacks

    Pop quiz – advanced WLAN attacks

    Chapter 8, Attacking WPA-Enterprise and RADIUS

    Pop quiz – attacking WPA-Enterprise and RADIUS

    Index

    Kali Linux Wireless Penetration Testing Beginner's Guide


    Kali Linux Wireless Penetration Testing Beginner's Guide

    Copyright © 2015 Packt Publishing

    All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

    Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

    Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

    First published: September 2011

    Second edition: March 2015

    Production reference: 1230315

    Published by Packt Publishing Ltd.

    Livery Place

    35 Livery Street

    Birmingham B3 2PB, UK.

    ISBN 978-1-78328-041-4

    www.packtpub.com

    Credits

    Authors

    Vivek Ramachandran

    Cameron Buchanan

    Reviewer

    Marco Alamanni

    Commissioning Editor

    Erol Staveley

    Acquisition Editor

    Sam Wood

    Content Development Editor

    Shubhangi Dhamgaye

    Technical Editor

    Naveenkumar Jain

    Copy Editor

    Rashmi Sawant

    Project Coordinator

    Harshal Ved

    Proofreaders

    Simran Bhogal

    Stephen Copestake

    Indexer

    Monica Ajmera Mehta

    Production Coordinator

    Komal Ramchandani

    Cover Work

    Komal Ramchandani

    About the Authors

    Vivek Ramachandran has been working on Wi-Fi Security since 2003. He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON. In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets.

    Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He is best known in the hacker community as the founder of SecurityTube.net, where he routinely posts videos on Wi-Fi Security, assembly language, exploitation techniques, and so on. SecurityTube.net receives over 100,000 unique visitors a month.

    Vivek's work on wireless security has been quoted in BBC Online, InfoWorld, MacWorld, The Register, IT World Canada, and so on. This year, he will speak or train at a number of security conferences, including Blackhat, Defcon, Hacktivity, 44con, HITB-ML, BruCON Derbycon, Hashdays, SecurityZone, SecurityByte, and so on.

    I would like to thank my lovely wife for all her help and support during the book-writing process. I would also like to thank my parents, grandparents, and sister for believing in me and encouraging me for all these years, and last but not least, I would like to thank all the users of SecurityTube.net who have always been behind me and supporting all my work. You guys rock!

    Cameron Buchanan is a penetration tester by trade and a writer in his spare time. He has performed penetration tests around the world for a variety of clients

    Enjoying the preview?
    Page 1 of 1