Post 71 - Not so secret secret

19 Dec 2024

Task 17, Day 11 Wi-Fi attacks If you’d like to WPA, press the star key!

Attacks on Wi-Fi

For educational purposes only:

The 4-way Handshake

Basic steps:

The handshake doesn’t directly reveal the PSK, but involves encrypted messages that can only be understood with the same PSK.

The Vulnerability

Anyone can “hear” this conversation happening, and can use it as the basis to attempt offline brute-forcing or dictionary attacks. This involves trying different possible passwords and comparing the results to the captured handshake until the same result is achieved.

The Practical

In terminal:

Monitor mode on the wireless device allows it to listen to all traffic on a specific channel, whether directed at the device or not. Captures all traffic within range for analysis without ever joining network. To set device in monitoring mode:

Application

Using 2 terminals to observe capture and issue commands:

The Task

Retrieve SSID, BSSID, and PSK info.

Networking module