SlideShare a Scribd company logo
25th Jan 2017
WIRELESSPenetration Testing
Pich Phearun
(Developer@Freelancer)
NEAKIT.COM
Peng Chhaileng
(Developer@Freelancer)
Contents
https://facebook.com/groups/khnog/ http://khnog.net/
1. Introduction
2. Why do we have to do Wireless Penetration Testing?
3. Types of Wireless Penetration Testing
4. How easily hacking into wireless network
5. Demostation
What is Wireless Pen testing?
https://facebook.com/groups/khnog/ http://khnog.net/
The process of activity evaluation information security
measures implemented in a wireless network to analyze
design weaknesses, technical flaws and vulnerabilities.
Wi-Fi Security and Pentesting
Why is Wireless Pen testing?
https://facebook.com/groups/khnog/ http://khnog.net/
- To secure your network
- You resource are exposed to unknown to user
- You network can be captured
- You network and connectivity maybe
used for illegal activities
How to hack WiFi 😂
https://facebook.com/groups/khnog/ http://khnog.net/
Hacking in to WiFi is included in Wireless Pentesting, so
it’s will be an example today.
There are some possible ways to hack WiFi.
1. WPS (Dumpper, Reaver, WiFite, …)
2. Wireless Traffic Capture (Wireshark, …)
3. Phishing WiFi (…)
4. …
Hack via WPS Pin
https://facebook.com/groups/khnog/ http://khnog.net/
You might not know it but you might know Dumpper and JumpStart LOL xD
Capturing Wireless Traffic
https://facebook.com/groups/khnog/ http://khnog.net/
- Some wireless cards support Monitor mode, we can
capture the wireless traffic.
- When someone tries to connect to a WiFi, the
password sent to router will be captured.
- Some tools to do that are wireshark, aircrack,
airodump, …
https://facebook.com/groups/khnog/ http://khnog.net/
Capturing Wireless Traffic
When a user connects to a wifi, the password sent to router is
captured.
https://facebook.com/groups/khnog/ http://khnog.net/
Capturing Wireless Traffic
Passwords list will be required to decrypt the wifi password in wifi
packet captured.
Hack via Phishing
https://facebook.com/groups/khnog/ http://khnog.net/
Process of WiFi Phishing
1. Hacker creates a fake Access Point looks like the
real one with DHCP Server.
2. A fake login webpage is hosted with web server
installed on attacker’s PC.
3. Hacker sends deauthentication attack to the real
WiFi.
4. Real WiFi will no longer connectable, so the
victim will connect to the fake one.
5. By using DNS Spoofing, users will be redirect to
the fake login page when they browse to the
Internet.
Hack via Phishing
https://facebook.com/groups/khnog/ http://khnog.net/
Attacker Victim
One
Victim connects to a wifi
Hack via Phishing
https://facebook.com/groups/khnog/ http://khnog.net/
Attacker Victim
Two
Victim will no longer connect to wifi, so it connect to a fake access
point on attacker computer.
Deauthentication attack
Attacker disconnect victim from router by
performing deaauthentication attack
Un-connectable
Hack via Phishing
https://facebook.com/groups/khnog/ http://khnog.net/
Attacker Victim
Three
WiFi password will be required on a fake webpage hosted on
attacker’s web server.
By performing a DNS Spoofing, every time the
victim browses to the internet it will redirect to
attacker’s web server.
Un-connectable
192.168.2.1
192.168.2.100
Victim-MacBook-Pro:~ Bong$ ping facebook.com
PING facebook.com (192.168.2.1): 56 data bytes
64 bytes from 192.168.2.1: icmp_seq=0 ttl=50 time=89.260 ms
64 bytes from 192.168.2.1: icmp_seq=1 ttl=50 time=123.832 ms
64 bytes from 192.168.2.1: icmp_seq=2 ttl=50 time=293.910 ms
Hack via Phishing
https://facebook.com/groups/khnog/ http://khnog.net/
Sample
Demonstration
https://facebook.com/groups/khnog/ http://khnog.net/
https://goo.gl/W333Ty
Conclusion
https://facebook.com/groups/khnog/ http://khnog.net/
- Cracked password needs dictionary file to read.
- If we mix the password with small letter, capital letter, number, and
some special characters; cracking time is long too.
- Not all passwords are in dictionary file.
- – Change default setting on your router
- • When you install router modify id and pwd to something else rather
than default
- – Disable SSID broadcast
- • Hides network from beginner intruder. Ie. Windows Wireless Zero
config utility
- • Will not keep you safe from more advance hackers
- – Turn off network when not in use
- • Impossible to hack a network that it is not running
- – MAC address filtering
- • AP grants access to certain MAC addresses • Not fully proof, but
good countermeasure
- – Encryption • Use of WPA
- • Use long and random WPA keys Maghan Das
Thank you 😘 😘

More Related Content

PDF
FortiGate Firewall HOW-TO - DMZ
DOCX
Mikrotik basic configuration
PDF
HOTSPOT on MikroTik Router
PPTX
Mikrotik Tutorial
PDF
MikroTik Firewall : Securing your Router with Port Knocking
PDF
Open ssl certificate (https) for hotspot mikrotik
PDF
System and Network administrator
PDF
IPsec for IMS
FortiGate Firewall HOW-TO - DMZ
Mikrotik basic configuration
HOTSPOT on MikroTik Router
Mikrotik Tutorial
MikroTik Firewall : Securing your Router with Port Knocking
Open ssl certificate (https) for hotspot mikrotik
System and Network administrator
IPsec for IMS

What's hot (19)

PPTX
MikroTik Basic Training Class - Online Moduls - English
PDF
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
PDF
Router security-configuration-guide-executive-summary
PDF
VXLAN and FRRouting
PPTX
Network testing course
PDF
How to prevent ssh-tunneling using Palo Alto Networks NGFW
PPT
Fortinet FortiOS 5 Presentation
PDF
001 introduction Fortigate Administration Introduction
PDF
Fortinet FortiGate 100D
PPT
Fortigate Training
PDF
Chapter 10 wireless hacking [compatibility mode]
PDF
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
PDF
Wireless Cracking using Kali
PDF
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
PDF
Palo Alto VM-100 Configuration Lab
PDF
Ccna 2 Chapter 8 V4.0 Answers
PPTX
Router hardening project.slide
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PDF
Ccna 2 Chapter 8 V4.1 Answers
MikroTik Basic Training Class - Online Moduls - English
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Router security-configuration-guide-executive-summary
VXLAN and FRRouting
Network testing course
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Fortinet FortiOS 5 Presentation
001 introduction Fortigate Administration Introduction
Fortinet FortiGate 100D
Fortigate Training
Chapter 10 wireless hacking [compatibility mode]
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Wireless Cracking using Kali
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Palo Alto VM-100 Configuration Lab
Ccna 2 Chapter 8 V4.0 Answers
Router hardening project.slide
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Ccna 2 Chapter 8 V4.1 Answers
Ad

Viewers also liked (20)

PDF
Bonding Interface in MikroTik
PDF
SIP (Session Initiation Protocol)
PDF
Core Concept of TCP/IP
PDF
Network Security-Honeypot
PDF
Network Attack Counter
PDF
Cambodia International Backbone Network
PDF
Routing Implementation - Cisco vs. Mikrotik
PPT
Hot Spot Network Manager
PDF
Virtual Extensible LAN (VXLAN)
PDF
Mikrotik Hotspot User Manager
PDF
Network Exploitation
PDF
Hotspot on Mikrotik Router
PDF
BGP
PDF
Terminal Access Controller
PDF
Bandwidth Management on Linux
PDF
Bidirectional Forwarding Detection (BFD)
PDF
Network Mapper (NMAP)
PDF
Why / How to become the Linux certified
PDF
Real-time Static Malware Analysis Using NepenthesFE
PPTX
Network Analysis Tips & Tricks with Omnipeek
Bonding Interface in MikroTik
SIP (Session Initiation Protocol)
Core Concept of TCP/IP
Network Security-Honeypot
Network Attack Counter
Cambodia International Backbone Network
Routing Implementation - Cisco vs. Mikrotik
Hot Spot Network Manager
Virtual Extensible LAN (VXLAN)
Mikrotik Hotspot User Manager
Network Exploitation
Hotspot on Mikrotik Router
BGP
Terminal Access Controller
Bandwidth Management on Linux
Bidirectional Forwarding Detection (BFD)
Network Mapper (NMAP)
Why / How to become the Linux certified
Real-time Static Malware Analysis Using NepenthesFE
Network Analysis Tips & Tricks with Omnipeek
Ad

Similar to Wireless Network Pentestration (20)

PPTX
Wireless hacking
PPTX
Wireless v2
PPTX
DevLink - WiFu: You think your wireless is secure?
PDF
Fundamentals of network hacking
PPTX
Wireless hacking
PDF
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
PPT
Hack wireless internet connections or wifi
PPT
Howtohackwirelessinternetconnections 100105124156-phpapp01
PDF
International Conference On Electrical and Electronics Engineering
PPTX
Wi-Fi Hacking with the help of various tools.pptx
PPTX
Wireless penetration testing
PPT
How to hack wireless internet connections
PPTX
Wireless Security null seminar
PPTX
Wifi cracking
PDF
Wireless security
PPTX
WiFi security
PPT
Network security
PPT
Ethical hacking is a based on computer hacking
PDF
CyberIgnite.pdf
DOC
cyber security practissssssssssssssssssssssssssssssssssssssssssscalM.doc
Wireless hacking
Wireless v2
DevLink - WiFu: You think your wireless is secure?
Fundamentals of network hacking
Wireless hacking
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Hack wireless internet connections or wifi
Howtohackwirelessinternetconnections 100105124156-phpapp01
International Conference On Electrical and Electronics Engineering
Wi-Fi Hacking with the help of various tools.pptx
Wireless penetration testing
How to hack wireless internet connections
Wireless Security null seminar
Wifi cracking
Wireless security
WiFi security
Network security
Ethical hacking is a based on computer hacking
CyberIgnite.pdf
cyber security practissssssssssssssssssssssssssssssssssssssssssscalM.doc

More from KHNOG (14)

PDF
Introduction to BRAS
PDF
ElasticISP
PDF
Policy Based Routing (PBR)
PDF
IT Service Level Agreement
PDF
Rapid Ring Protection Protocol (RRPP)
PDF
Introduction to Python
PDF
Transmission Technologies
PDF
Interior Routing Protocols
PDF
Testing Fiber-Optic Systems
PDF
RPM Junos-service
PDF
Incoming Outgoing Spam Filter
PDF
MPLS
PDF
How to Prevent DHCP Spoofing
PDF
Software Define Network (SDN) and Openflow
Introduction to BRAS
ElasticISP
Policy Based Routing (PBR)
IT Service Level Agreement
Rapid Ring Protection Protocol (RRPP)
Introduction to Python
Transmission Technologies
Interior Routing Protocols
Testing Fiber-Optic Systems
RPM Junos-service
Incoming Outgoing Spam Filter
MPLS
How to Prevent DHCP Spoofing
Software Define Network (SDN) and Openflow

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
MIND Revenue Release Quarter 2 2025 Press Release
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Wireless Network Pentestration