📓
CEHv10 Study Guide++
  • CEHv10 Study Guide++
  • 01-Essential Knowledge
  • 02-Reconnaissance and Footprinting
  • 03-Scanning and Enumeration
  • 04-Sniffing and Evasion
  • 05-System Hacking
  • 06-Web Server and Web Application Hacking
  • 07-Wireless Network Hacking
  • 08-Mobile and IoT Hacking
  • 09-Security in Cloud Computing
  • 10-Malware and Other Attacks
  • 11-Cryptography
  • 12-Social Engineering
  • 13-Pen Testing
Powered by GitBook
On this page
  • Table of Contents
  • Wireless Network Hacking
  • Wireless Terminologies
  • Wireless Standards
  • Wireless Encryption
  • Wireless Hacking Threats
  • Wireless Attacks
  • Wireless Hacking Methodology
  • Bluetooth Hacking

07-Wireless Network Hacking

Previous06-Web Server and Web Application HackingNext08-Mobile and IoT Hacking

Last updated 4 years ago

Table of Contents

Wireless Network Hacking

Wireless Terminologies

  • Access Point (AP): used to connect wireless devices to a wireless/wired network

  • Association: process of connecting a wireless device to an AP

  • Service Set Identifier (SSID)

    • 32 char unique wireless identifier given to WLAN

    • Can be hidden, but provides no security

  • Orthogonal Frequency-Division Multiplexing (OFDM): carrying waves in various channels

  • Multiple input, Multiple output OFDM (MIMO-OFDM): influencing spectral efficiency of 4G and 5G services

  • Direct-Sequence Spread Spectrum (DSSS): combining all available waveforms into a single purpose

  • Frequency-hopping Spread Spectrum (FHSS): also known as FH-CDMA, transmitting radio signals by rapidly switching a carrier among many frequency channels

  • Basic Service Set (BSS): communication between a single AP and its clients

  • Basic Service Set Identifier (BSSID): MAC address of the wireless access point

  • ISM Band: a set of frequencies for international industrial, scientific, and medical communities

  • Spectrum Analyzer: verifying wireless quality, detecting rogue access points and detects attacks, Wireless Intrusion Prevention System (WIPS) is also capable of searching for and locating rogue access points

  • 2 types of wireless networks: Ad hoc (no access point) and Infrastructure

  • LEAP: proprietary version of EAP developed by Cisco

  • PEAP: protocol that encapsulates EAP within TLS tunnel

Types of Wireless Authentication Model

  • Open System: no authentication

  • Shared Key Authentication: authentication through a shared key/password

  • Centralized Authentication: authentication through something like RADIUS (Remote Authentication Dial-In User Service)

Types of Wireless Antennas

  • Directional Antenna: unidirectional antenna, signals in one direction, eg: Yagi Uda antenna

  • Omnidirectional Antenna: signals in all directions

  • Parabolic Grid Antenna: a semi-dish in form of grid, long-distance Wi-Fi transmissions by making highly focused radio beams

  • Dipole Antenna: also called doublet, is bilaterally symmetrical balanced antenna, feeds on a balanced parallel-wire RF transmission line

  • Reflector Antenna: used to concentrate EM energy that radiated or received at a focal point

Wireless Standards

Standard

Speed (Mbps)

Freq. (GHz)

Modulation Type

Range (Meters)

802.11

1, 2

2.4

DSSS, FHSS

20-100

802.11a

54

5

OFDM

35-100

802.11b

11

2.4

DSSS

35-140

802.11g

54

2.4

OFDM

38-140

802.11n

54-600

2.4, 5

MIMO-OFDM

70-250

802.15.1 Bluetooth

25-50

2.4

GFSK, π/4-DPSK, 8DPSK

10-240

802.15.4 Zigbee

0.25

2.4

O-QPSK, GFSK, BPSK

1-100

802.16 WiMax

34-1000

2-11

SOFDMA

1600-9650

  • 802.11d: enhancement to 802.11a and 802.11b, global portability, allow variation in freq, power levers, and bandwidth

  • 802.11e: guidance for prioritization of data, voice and voice transmission enabling QoS

  • 802.11i: standard for WLANs (Wireless Local Area Networks) that provides improved encryption for networks using 802.11a, 802.11b, and 802.11g standards; denfines WPA2-Enterprise/WPA2-Personal for Wi-Fi

  • 802.11ac: high throughput network at 5GHz, faster and more reliable than 802.11n, Gigabit networking

  • Z-Wave: primarily for home automation, 800-900 MHz radio, 100 meters range

How to remember all 802.11x standards

  • Speed 54 OFDM: ang

  • Frequency 5: an

  • Range: a\<b=g\<n

  • n: s600, f2.4/5, MIMO-OFDM, 250

  • d/e/i/ac: diversity global, ensure QoS, implement encryption, acceleration

Wireless Encryption

WEP (Wired Equivalent Privacy)

  • WEP doesn't effectively encrypt anything

IV (Initialization Vector)

  • Used to calculate a 32-bit integrity check value (ICV)

  • IVs are generally small and are frequently reused

  • Sent in clear text as a part of the header, combined with RC4 makes it easy to decrypt the WEP key

  • An attacker can send disassociate requests to the AP to generate a lot of these

WPA/WPA2 (Wi-Fi Protected Access)

  • WPA uses TKIP (Temporal Key Integrity Protocol) with a 128-bit key

  • WPA changes the key every 10,000 packets

  • WPA transfers keys back and forth during an Extensible Authentication Protocol (EAP)

  • WPA uses four-way handshake to derive keys

  • WPA2 Personal: using a Pre-shared key (PSK) to authenticate, preconfigured password

  • WPA2 Enterprise: can tie an EAP or RADIUS server into the authentication

  • WPA2 ensures FIPS 140-2 compliance

  • Message Integrity Codes (MIC): named MICHEAL, hashes for CCMP to protect integrity

  • Cipher Block Chaining Message Authentication Code (CBC-MAC): integrity process of WPA2

Wireless Standard

Encryption

IV Size (Bits)

Key Length (Bits)

Integrity Check (ICV)

WEP

RC4

24

40/104

CRC-32

WPA

RC4 + TKIP

48

128

MIC/CRC-32

WPA2

AES-CCMP

48

128

CBC-MAC (CCMP)

Wireless Hacking Threats

  • Access Control Attacks: War Driving, Rogue AP, MAC Spoofing, AP Misconfiguration, Ad Hoc Association, Promiscuous Client, Client Mis-association, Unauthorized Association

  • Integrity Attacks: Data Frame Injection, WEP Injection, Bit-Flipping Attack, Replay Attacks

  • Confidentiality Attacks: Eavesdropping, Traffic Analysis, Cracking WEP Key, Evil Twin AP, Honeypot AP, Session Hijacking, Masquerading, MITM

  • Availability Attacks: AP Theft, Disassociation Attack, EAP Failure, Beacon Flood, DoS, Auth/De-auth Flood, Routing Attack, ARP Cache Poisoning Attack

  • Authentication Attacks: Cracking, Identity Theft, Shared Key Gusseing, Password Speculation, Application Login Theft, Key Reinstallation Attack

Wireless Attacks

Rogue Access Point

  • Placing an access point controlled by an attacker

Evil Twin

  • Also known as a mis-association attack

  • A rogue AP with a SSID similar to the name of a popular network

Honeypot AP Attack

  • Faking a well-known hotspot with a rogue AP

Ad Hoc Connection Attack

  • Directly connecting to another phone via ad-hoc network

  • Not very successful as the other user has to accept connection

DoS Attack

  • Either sends de-auth packets to the AP or jam the wireless signal

  • With a de-auth, attacker can have the users connect to attacker's AP instead if it has the same name

MAC Filter

  • Only allowing certain MAC addresses on a network

  • Easily broken because you can sniff out MAC addresses already connected and spoof it

  • Tools for spoofing including SMAC and TMAC

Wireless Hacking Methodology

Network Discovery

  • WarWalking: walks around with Wi-Fi to detect open wireless networks

  • WarDriving: driving around with Wi-Fi to detect open wireless networks

  • WarFlying: using drones to detect wireless networks

  • WarChalking: drawing symbols in public places to advertise open Wi-Fi networks

  • Tools

    • inSSIDer Office: Wi-Fi optimization and troubleshooting tool

    • WifiExplorer: known as Wi-Fi scanner, mobile platform to discover Wi-Fi networks

GPS Mapping

  • Discovers a target wireless network then draws a map of the network

  • Tool

    • WiGLE: map for wireless networks

    • NetStumbler: tool to find networks, a Windows tool

    • Skyhook: Wi-Fi AP database

    • Wi-Fi Finder: hotspot finder

Wireless Traffic Analysis

  • Determine Wi-Fi requirements

  • Learn capabilities of a wireless card

  • Determine chipset of Wi-Fi card

  • Verify chipset capabilities

  • Determine drivers and patches required

  • Tools

    • AirPcap: Wi-Fi USB dongle

    • Wireshark with AirPcap: Wi-Fi packet sniffer

    • SteelCentral Packet Analyzer

    • OmniPeek Enterprise

    • Ekahau Spectrum Analyzer

    • Airodump-np: reveal hidden SSID

    • AirMagnet WiFi Analyzer

    • Kismet

      • Wireless packet analyzer/sniffer used for discovery

      • Working on Linux and OSX, Win 10 under WSL

      • Working without sending any packets (passively)

      • Working by channel hopping

      • Can detect access points that have not been configured

      • Can discover wireless networks that not sending beacon frames

      • Ability to sniff packets and save them to a log file (readable by Wireshark/tcpdump)

Tools

  • NetSurveyor

    • Tool for Windows that does similar features to NetStumbler and Kismet

    • Doesn't require special drivers

  • WiFi Adapter

    • AirPcap is mentioned for Windows, but isn't made anymore

    • pcap: driver library for Windows

      port <port> and host <ip>
    • libpcap: driver library for Linux

  • Cisco Adaptive Wireless IPS: security auditing tool

  • WatchGuard WIPS: IPS

  • AirMagnet Planner: wireless network planning tool

  • Zenmap: vulnerability scanning tool

  • Wi-Fi Protector: protects phone from ARP attack, such as DoS or MITM

  • WiFiGuard

Wireless Encryption Cracking

WEP Cracking

  • Easy because of weak IVs

  • Process

    1. Start a compatible adapter with injection and sniffing capabilities

    2. Start a sniffer to capture packets

    3. Force the creation of thousands of packets (generally with de-auth)

    4. Analyze captured packets

  • Methods to crack WEP including PTW, FMS, Korek technique

  • Tools

    • Aircrack-ng

      • sniffer, detector, traffic analysis tool and a password cracker

      • Using dictionary list attacks for WPA and WPA2

      • Other attacks PTW, FMS, and Korek are for WEP only

    • Cain and Abel

      • Sniffing packets and cracks passwords (may take longer)

      • Relying on statistical measures and PTW technique to break WEP

    • KisMAC: MacOS tool to brute force WEP or WPA passwords

    • WEPAttack

    • WEPCrack

    • Portable Penetrator

WPA Cracking

  • Much more difficult than WEP cracking

  • Using a constantly changing temporal key and user-defined password

  • Key Reinstallation Attack (KRACK): replaying attack that uses third handshake of another device's session

  • Most other attacks are simply brute-forcing password

  • Tools

    • Elcomsoft Wireless Security Auditor

    • WIBR: WiFi Bruteforce Hack

Bluetooth Hacking

Bluetooth Modes

  • Discovery mode: how the device reacts to inquiries from other devices

    • Discoverable: answering all inquiries

    • Limited Discoverable: restricting the action

    • Nondiscoverable: ignoring all inquiries

  • Pairing mode: how the device deals with pairing requests

    • Pairable: accepting all requests

    • Non-pairable: rejecting all connection requests

Bluetooth Attacks

  • Bluesmacking: sending oversized ping to victim's device, DoS attack

  • Bluejacking: sending unsolicited messages

  • Bluesnarfing: stealing information via Bluetooth

  • Bluesniffing: finding hidden and discoverable Bluetooth devices

  • Bluebugging: remotely taking over a device via Bluetooth, sniffs data

  • Blueprinting: collecting device information over Bluetooth to create info graphics

  • Other attacks: MAC Spoofing Attack, MITM/Impersonation Attack

  • Tools

    • BluetoothView: monitoring activity of Bluetooth devices around you

    • Super Bluetooth Hack: all-in-one package

    • Bluetooth Firewall

Wireless Network Hacking
Wireless Terminologies
Types of Wireless Authentication Model
Types of Wireless Antennas
Wireless Standards
How to remember all 802.11x standards
Wireless Encryption
WEP (Wired Equivalent Privacy)
IV (Initialization Vector)
WPA/WPA2 (Wi-Fi Protected Access)
Wireless Hacking Threats
Wireless Attacks
Rogue Access Point
Evil Twin
Honeypot AP Attack
Ad Hoc Connection Attack
DoS Attack
MAC Filter
Wireless Hacking Methodology
Network Discovery
GPS Mapping
Wireless Traffic Analysis
Tools
Wireless Encryption Cracking
WEP Cracking
WPA Cracking
Bluetooth Hacking
Bluetooth Modes
Bluetooth Attacks