WiFi Hacking
Last modified: 2024-06-19
Investigation
Online Tools
-
Wireless Network Mapping. If you have the BSSID, you can get the location.
You need to create an account to use the advanced search.
Check Status
-
Retrieve the Device IP Address
# IP address ip addr # IP address - Show the specific interface only ip addr show eth0 ip addr show eth1 ip addr show tun0 # IPv4 only ip -4 addr # IPv6 only ip -6 addr # Static route ip route
-
Delete Network Interfaces From Your Devices
ip link delete docker0
-
Find Current WiFi IP Address
We can get the ip adress of the WiFi that we’re currently connecting by checking a default gateway in results of
ipconfig
command.ipconfig # Outputs ... Default gateway . . . . . : 192.168.1.1
-
Find Another Computer's IP Address/MAC Address on Network
arp -av
-
Get Public IP Address
We can get our public ip address from command line as below.
curl https://api.ipify.org
Alternatively, we can get the public ip online like https://www.whatismyip.com/.
Crack WiFi Passwords
Default Router Credentials
admin:Admin
admin:admin
admin:password
admin:Michelangelo
root:admin
root:alpine
sitecom:Admin
telco:telco
Crack from A Packet Capture File
If we have a packet capture file (.cap or .pcap) of the WiFi network, we can crack the WiFi password using the file.
aircrack-ng example.cap -w wordlist.txt
Find BSSID From SSID
- Access to WiGLE and login.
- Go to View → Advanced Search.
- Open the General Search tab.
- Input the SSID in the SSID/Network Name.
- Check the result.
MAC Address Spoofing
First of all, you need to use network adapter which has monitor mode on your machine.
Aircrack-ng is a complete suite of tools to assess WiFi network security.
-
Preparation
# Show available interfaces airmon-ng # Put an interface into monitor mode airmon-ng start wlan0 airmon-ng start eth0 # or iwconfig wlan0 mode monitor iwconfig eth0 mode monitor # Choose the access point (monitor mode) airodump-ng wlan0mon
-
Retrieve Client's MAC Addresses
# Retrieve client's MAC address from the chosen access point # -c 9: channel 9 # --bssid: target router MAC address # -w psk: the dump file prefix # eth0: interface name airodump-ng -c 6 --bssid XX:XX:XX:XX:XX:XX -i wlan0mon airodump-ng -c 9 --bssid 00:14:6C:7E:40:80 -w psk eth0
-
Spoof MAC Address using the Retrieved Address
# Take down the network at first ip link set wlan0 down # Set MAC address which you got by airodump-ng in the previous section macchanger -m XX:XX:XX:XX:XX:XX wlan0 # Bring up the network ip link set wlan0 up
-
Confirmation
# Check the current MAC address macchanger -s wlan0
-
Reset to the Original MAC Address
# Reset to the original (permanent) MAC address macchanger -p wlan0
Deauthentication Attack
Reference: https://medium.com/@flytechoriginal/state-of-wifi-security-in-2024-b88091015cc2
Using (Freeway)[https://github.com/FLOCK4H/Freeway], we can easily achieve this attack.
sudo Freeway -i wlan1 -a deauth
Other Useful Tools
-
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
-
List of MAC OUI (Organizationally Unique Identifier). You can get the information from the BSSID.
-
Access to the OUI Standards
If the target BSSID is "B4:5D:50:AA:86:41", search text by inputting "B4-5D-50" on the string search.
Then check the information.
-