SlideShare a Scribd company logo
Technology Open Source
                             Laboratory




FastTrack Linux
          Wireles Hacking




             Novizul Evendi
              C.E.O T'Lab
Hardware Requierment
Hardware

Card Wireless ( USB/PCI/PCMCIA )
    Recommended :
    PCMCIA with Prism2 Firmware or Orinoco Compatible
    USB with Prism Firmware or Orinoco Compatible

PC/Notebook/Laptop with Linux/BSD OS
    Recommended :
    Notebook/Laptop with PCMCIA slot

More Info: http://www.aircrack-ng.org/doku.php?id=compatible_cards

Optional Antenna!
Wireless Tools
Wireles Tools

  Wardriving tools:
    => Kismet; Dstumbler; Airsnort, aircrack, etc

  WEP keys cracker:
    => Aircrack; wepcrack Dwepcrack, WepAttack, etc

  WPA Pre-shared keys cracker :
    => cowpatty, Aircrack, wpa-buddy, etc
Wardriving Tools
Wardriving Tools


 Passive detection: Listening to all wireless traffic and extract
 information from packets obtained.

 Active detection: Sending wireless probe requests and
 analyze the network answers.
Kismet
Kismet

  Needsdriver which are capable of reporting
  packets in rfmon :

         ACX100, ADMTek, Atheros, Cisco, Prism2, Orinoco, WSP100,
         Drone, pcapfile, wrt54g, Broadcom


  Not work : Intel Centrino, Airport Extreme, Atmel, Realtek, HermesI



  Source
        Code Download from :
  www.kismetwireless.com
Aircrack
TPLINK TL-WN321G




Packet Injection
Aireplay
           TPLINK TL-WN321G
WEP keys cracker
WEP keys cracker


 Statistic attacks on weak initialization vector value (IV )
  ●
    Airsnort
  ●
    Aircrack
  ●
    Wepcrack ( perl script )
  ●
    Dwepdump & Dwepcrack bsd_airtools
WEP keys cracker


 Bruteforce or dictionary attacks:
  ●
    weplab
  ●
    wepdecrypt
WPA Pre-shared keys cracker
WPA keys cracker


 Dictionary attacks
  ●
    Aircrack (release 2.2)
  ●
    Cowpatty
Bypass WLAN authentication
Tunelling
ICPM Tunelling
DNS Tunelling
Mac/HW Clonning
Web : www.tlab.co.id
Technology Open Source
                              Mail : karuwak@tlab.co.id
            Laboratory




                    Penutup


                                       Demo



FAN : T’Lab                      @TLabUpdate

More Related Content

PDF
Ch 5: Port Scanning
PDF
Tomas Hlavacek - IP fragmentation attack on DNS
PPT
Port Scanning
PDF
Hardening Three - IDS/IPS Technologies
PPT
Dynamic Port Scanning
PDF
Offline bruteforce attack on WiFi Protected Setup
PDF
IDS & Passive Network Defense
PPTX
Recon with Nmap
Ch 5: Port Scanning
Tomas Hlavacek - IP fragmentation attack on DNS
Port Scanning
Hardening Three - IDS/IPS Technologies
Dynamic Port Scanning
Offline bruteforce attack on WiFi Protected Setup
IDS & Passive Network Defense
Recon with Nmap

What's hot (20)

PDF
Brocade - Stingray Application Firewall
ODP
Wireless security beyond password cracking by Mohit Ranjan
PPT
Module 3 Scanning
ODP
SoHo Honeypot (LUGS)
PPTX
Network scanning
PDF
St Louis Linux Users Group Wireguard (for Fun and Networking)
ODP
PPTX
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
PDF
Kali tools list with short description
PPTX
UPC router reverse engineering - case study
PDF
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
PDF
Brute forcing Wi-Fi Protected Setup
PDF
20141106 asfws unicode_hacks
PDF
Abusing Interrupts for Reliable Windows Kernel Exploitation (en)
PPTX
BackTrack5 - Linux
PPT
Backtrack os 5
PDF
PPT
Seminariode Seguridad L2
DOCX
Type of DDoS attacks with hping3 example
PPTX
Network Traffic Search using Apache HBase
Brocade - Stingray Application Firewall
Wireless security beyond password cracking by Mohit Ranjan
Module 3 Scanning
SoHo Honeypot (LUGS)
Network scanning
St Louis Linux Users Group Wireguard (for Fun and Networking)
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Kali tools list with short description
UPC router reverse engineering - case study
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
Brute forcing Wi-Fi Protected Setup
20141106 asfws unicode_hacks
Abusing Interrupts for Reliable Windows Kernel Exploitation (en)
BackTrack5 - Linux
Backtrack os 5
Seminariode Seguridad L2
Type of DDoS attacks with hping3 example
Network Traffic Search using Apache HBase

Viewers also liked (13)

PDF
E-commerce
PDF
Information System Security
PDF
PDF
Dialog Technoprener
PDF
Outline course Backtrak Pentest
PPT
Small servers
PDF
Hacking Is Not Always a Crime
PDF
Hacking Backtrak Mobile
DOC
Modul praktikum hardware dan software
PDF
Modul teknisi komputer kursus
PDF
Virtualisasi Hacking
PDF
Mobile Hacking
PDF
Computer Forensic
E-commerce
Information System Security
Dialog Technoprener
Outline course Backtrak Pentest
Small servers
Hacking Is Not Always a Crime
Hacking Backtrak Mobile
Modul praktikum hardware dan software
Modul teknisi komputer kursus
Virtualisasi Hacking
Mobile Hacking
Computer Forensic

Similar to Wireless Hacking Fast Track (20)

PPTX
Exploiting WiFi Security
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Parrot Drones Hijacking
PPTX
PDF
Netcat 101 by-mahesh-beema
PDF
Netcat - 101 Swiss Army Knife
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
KEY
Twisted: a quick introduction
PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
PPTX
Incident response: Advanced Network Forensics
PDF
RAZORPOINT TCP/UDP PORTS LIST
PDF
Aircrack
PPT
8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02
PPTX
Wireless Security null seminar
PDF
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
PPT
Freeware Security Tools You Need
PDF
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
PDF
modul2-footprintingscanningenumeration.pdf
Exploiting WiFi Security
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Parrot Drones Hijacking
Netcat 101 by-mahesh-beema
Netcat - 101 Swiss Army Knife
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Twisted: a quick introduction
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Incident response: Advanced Network Forensics
RAZORPOINT TCP/UDP PORTS LIST
Aircrack
8c21da14 1c9c-44ee-8e24-9a1ddd64ca82-150211062639-conversion-gate02
Wireless Security null seminar
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Freeware Security Tools You Need
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Modul 2 - Footprinting Scanning Enumeration.ppt
modul2-footprintingscanningenumeration.pdf

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx

Wireless Hacking Fast Track