Cracking WPA/WPA2 with Non-Dictionary Attacks

29
By Swaroop YermalkaR

description

null Pune Chapter - September 2012 Meet

Transcript of Cracking WPA/WPA2 with Non-Dictionary Attacks

Page 1: Cracking WPA/WPA2 with Non-Dictionary Attacks

By

Swaroop YermalkaR

Page 2: Cracking WPA/WPA2 with Non-Dictionary Attacks

Changing the

world

through Wireless

Communication!

Page 3: Cracking WPA/WPA2 with Non-Dictionary Attacks

Dj Akhil Talreja

Page 4: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 5: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 6: Cracking WPA/WPA2 with Non-Dictionary Attacks

BT5 r3 laptop with wifi card

Dlink router Galaxy

pop

Page 7: Cracking WPA/WPA2 with Non-Dictionary Attacks

Simple WPA/2 Cracking Technique Brute-Force attack Understanding WPS [ Wi-Fi Protected Setup ] Exploring Reaver

Page 8: Cracking WPA/WPA2 with Non-Dictionary Attacks

1. Start Sniffing 2. Capture WPA Handshake 3. Apply Dictionary 4. Crack the password!

Page 9: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 10: Cracking WPA/WPA2 with Non-Dictionary Attacks

Supplicant Authenticator

Probe req,resp

Authentication RR, Association RR

Pre-shared key 256bit Pre-shared key 256bit

PTK PTK Message 2

Snounce + MIC

Message 4

Key install Acknowledgement

Snounce

Source: securitytube.net

Page 11: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 12: Cracking WPA/WPA2 with Non-Dictionary Attacks

Step 1

Step 2

Page 13: Cracking WPA/WPA2 with Non-Dictionary Attacks

Step 3

Step 4

Page 14: Cracking WPA/WPA2 with Non-Dictionary Attacks

1. Monitor air for a new client trying to associate with the access point (passive)

Page 15: Cracking WPA/WPA2 with Non-Dictionary Attacks

2. De-authentication one or all clients and monitor reconnection (active)

De-authentication Packet

Legitimate client AP

Page 16: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 17: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 18: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 19: Cracking WPA/WPA2 with Non-Dictionary Attacks

Source: http://lastbit.com/pswcalc.asp

Page 20: Cracking WPA/WPA2 with Non-Dictionary Attacks

Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computing standard that attempts to allow easy establishment of a secure wireless home network. Created by the Wi-Fi Alliance and introduced in 2007, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases.

Source: wikipedia

Page 21: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 22: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 23: Cracking WPA/WPA2 with Non-Dictionary Attacks

Reaver is fantastic tool to crack this WPS pin written by Craig Heffner. It performs a brute force attack against the AP, attempting every possible combination in order to guess the AP's 8 digit pin number. Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin number.

Source: Tactical Network Solutions articles

Page 24: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 25: Cracking WPA/WPA2 with Non-Dictionary Attacks

n0nEc@nhaCkthi$pa$sw0rd!!!

…use pin as master key!

Page 26: Cracking WPA/WPA2 with Non-Dictionary Attacks
Page 27: Cracking WPA/WPA2 with Non-Dictionary Attacks

Ex: R0ck$t@R

Keep non-dictionary, combination of symbols, digits and numbers.

Page 28: Cracking WPA/WPA2 with Non-Dictionary Attacks

1. Tactical Network Solutions 2. WiFi Security Megaprimer by Vivek Ramchandran

Page 29: Cracking WPA/WPA2 with Non-Dictionary Attacks

Feedback, questions and suggestions:

[email protected]

Swaroop D. YermalkaR