Hacking Articles Part 18

35 3 0
                                        

Kali Linux - Wireless Attacks

[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]

Andito na tayo guys, Part 18 na hehe, medyo malayo-layo na ang ating nararating. In this discussion I will be discussing some WiFi crackers that we will see and use in Kali Linux. Lets Get it on!

Fern Wifi Cracker

-is one of the tools that Kali has to crack wireless.

Before opening Fern, we should turn the wireless card into monitoring mode. To do this, type "airmon-ng start wlan-0" in the terminal.

Now, open the Fern Wireless Cracker.

Step 1. go to Applications -> Click "Wireless Attacks" -> "Fern Wireless Cracker"

Step 2. Select the Wireless card as shown in the following screenshot.

 Select the Wireless card as shown in the following screenshot

Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.

Step 3: Click "Scan for Access Points".

Step 4: After finishing the scan, it will show all the wireless networks found. In this case, only "WPA networks" was found.

Step 5: Click WPA networks. It shows all the wireless found. Generally, in WPA networks, it performs Dictionary attacks as such.

Step 6: Click "Browse" and find the wordlist to use for attack.

Step 7: Click "Wifi Attack".

Step 8: After finishing the dictionary attack, it found the password.

Kismet

-is a WIFI network analyzing tool.It is a 802.11 layer-2 wireless network detector, sniffer, and intrusion detection system. It will work with any wireless card that supports raw monitoring (rfmon) mode,and can sniff 802.11a/b/g/n traffic. It identifies the networks by collecting packets and also hidden networks.

Para gamitin ito, gawing monitoring mode ang wireless card sa pamamagitan ng pagtype ng "airmon-ng start wlan-0" sa terminal.

At pwede na nating simulan ang paggamit ng tool na ito:

Step 1: To launch it, buksan ang terminal at itype ang "kismet".

Step 2: Click "OK"

Step 3: Click "Yes" kapag nagtanong ito na Buksan ang server ng Kismet. Kapag No ang pinindot mo, ito ay hihinto.

Step 4: In Startup options, Leave it as default and click "Start"

Step 5: magapakita ito ng isang table at itatanong kung ito ba yung wireless card. Then click "Yes"

Step 6: In this case, the wireless source is "wlan0". ito ay ilalagay mo sa "Intf" section then click "Add"

Step 7: It will start sniffing the wifi networks.

Step 8: Click on any network, it produces the wireless details.

GISKismet

-is a wireless visualization tool to represent data gathered using Kismet in a practical way. It stores information in a database so we can query data and generate graphs using SQL.

- it usually uses SQLite for the database and GoogleEarth/ KML files for graphing.

So paano ba ito gamitin?

Step 1: Para mabuksan ang GISKismet, pumunta lang sa : Applications -> Click "Wireless Attacks" -> giskismet.

Kung natatandaan nyo sa kaninag tool, gumamit tayo ng Kismet para magexplore ng data tungkol sa wireless networks at lahat ng data ng Kismet ay nalalagay sa netXML files.

Step 2: Para maimport ang file sa Giskismet, type "root@kali: ~# giskismet -x Kismet-filename.netxml" at magsisimula na itong mag import ng mga files.

Pagkatapos maimport, pwede na natin itong maimport sa Google Earth yung mga hotspots na nakita natin.

Step 3: Assume na mayroon na tayong nainstall na Google Earth, Click File -> Open File that Giskismet created -> Click "Open"

Then, lalabas ang map na tulad nito.

Then, lalabas ang map na tulad nito

Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.

Ghost Phisher

-is a popular tool that helps to create fake wireless access points and then later to create Man-in-The-Middle-Attack.

Step 1: To open it, click Applications -> Wireless Attacks -> "ghost phishing".

Step 2: After opening it, we will set up the fake AP using the following details.

Wireless Interface Input: wlan0

SSID: wireless AP name

IP address: IP that the AP will have

WAP: Password that will have this SSID to connect

Step 3: Click the Start button.

Wifite

-It is another wireless clacking tool, which attacks multiple WEP, WPA, and WPS encrypted networks in a row.

Firstly, the wireless card has to be in the monitoring mode.

Step 1: To open it, go to Applications ->Wireless Attack -> Wifite.

Step 2: Type "wifite –showb" to scan for the networks.

Step 3: To start attacking the wireless networks, click Ctrl + C.

Step 4: Type "1" to crack the first wireless.

Step 5: After attacking is complete, the key will be found.

Hacking ArticlesWhere stories live. Discover now