Header Ads

Hack-WiFi Like Pro Hacker - Part 1

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Welcome dear friends, Since a long time people have been requesting me on guide to hacking Wi-Fi, and so finally I have decided to write a complete series on hacking Wi-Fi.

Let's Get Started with Wi-Fi Terms and Technologies:

So before we start it's really very important to understand the basics before you start with complicated hacking and further creating your own hacks. 

So, let's dive in the Elaborated journey of Wi-Fi hacking!



Specification:

To really understand how to hack Wi-Fi, we need to master with basic terms. First, let's discuss some specification. Let's begin with Access Point, The radio Frequency transmitting Wi-Fi signals is known as AP, These APs are capable of sending out signals (between 2.4 and 5 Ghz) that comply with a number of different standards which are as followed: 

  • 802.11a, 
  • 802.11b,
  • 802.11g, and
  • 802.11n.
The table below reviews the key features of these Wi-Fi standards.
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
These standards are generally backwardly compatible so that a wireless n adapter will also be able to pick up g and b signals. We will focus on the most popularly used standards which are b, g, and n. 



Security Standards:

From the Hacker's perspective, wireless security features are among the most relevant features. Multiple security methods have been developed in order to secure Wi-Fi. Our attack strategy will depend upon which of these security technologies is being used. 

So, let's get a quick look at some of the security measures below.

WEP:

Wired Equivalent Privacy, which is abbreviated as WEP, was the first wireless security measure developed. As it name suggests, it intended to provide security to the end-user that was basically similar to the privacy that was used in a wired environment. Unfortunately, it had many vulnerabilities.


For numerous reasons, WEP is remarkably easy to crack due to the flaws in the RC4 encryption algorithm. It is very easy to crack WEP within minutes, as WEP uses a 24-bit initialization vector (IV) that could be captured in the data-stream, and this could then be used to discover the password using statistical techniques. 
Regardless of which I still find WEP encryption being used by many domestic and small business users. 


WPA: 

Wi-Fi Protected Access (WPA), the Wi-Fi Alliance introduced WPA encryption to remove the weaknesses of WEP. The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for WPA. WEP used a 64-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.


WPA2:

WPA2 replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security.[6] Certification began in September 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. 

Find out More About WPA Terminology Here

Channels:

As our old age radio, Wi-Fi does have channels, Wi-Fi channel works in a way to protect two different frequencies to interfere with each other. The 802.11 standard allows channels ranging from 1 thru 14. 



Each channel has a width of 22 Mhz around its central frequency. To avoid interference, an AP can use any of these channels, but to avoid any overlap, channels 1, 6, and 11 are most often utilized in the U.S. The other channels can be used, but because you need five channels between the working channels to not overlap signals, with three or more channels, only 1, 6, and 11 will work.

Aircrack-Ng:

In almost all of our Wi-Fi hacking tricks, we will be using aircrack-ng which is included in Kali-Linux. Even in those hacks where we use other tools such cowpatty or reaver, we will use the aircrack-ng suite of tools for some part of the hack, so you need to be familiar with it.

I'll probably discuss Aircrack-Ng in depth in my coming articles.  

WiFi Adapters:

One of the basic needs to becoming an effective Wi-Fi hacker is the Wi-Fi adapter. Usually, the Wi-Fi adapter on your laptop or desktop is deficient for that purposes. The key feature we need is the ability to inject packets into the access point and most of the wireless adapters are incapable of packet injection. Aircrack-ng has a list of Wi-Fi adapters that can work with their suite of tools. 


Stay Connected for Complete Guide.

To be Continued.......


Theme images by rajareddychadive. Powered by Blogger.