Page 34 - CDM Cyber Warnings November 2013
P. 34







There are 2 different type of WPA2 protocols:
- WPA2-PSK: Here PSK refers to pre-shared key. It is designed for a very small

network i.e. home
- WPA2-ENT: Here ENT refers to enterprise. This is made for enterprises, and is
much more secure than WPA2-PSK as the passphrase is not stored locally.







Access Point & Client Interaction: Before cracking a wireless network, it is essential
to know how the access point and client interact with each other.


The very first step is detect the communication to capture every packet and understand how it
works. When the network is turned on, the following will be seen:


 Null Probe Request (Broadcast message): Sent by client for searching available
wireless networks

 Probe Response: Sent by the access point
 Authentication Request Packet: Client sends a request to the access point
 Authentication Response: Access point responds if it is successful.

 Association Request: Client sends a request to the access point for communicating.
 Association Response: Sent by the access point to the client.

 Data transfer is then initiated.




Cracking the Wireless Network: There are two ways to crack the wireless network:
The Semi Automated Approach & the Fully Automated Approach


The Semi-Automated Approach




1- Get your Wireless Interface up: The first step to cracking a wireless network is to

configure the wireless card and get it up and running. To do this, the below steps should

be followed:
 Plug the wireless card (Alfa Card) to the virtual machine and make sure it is
connected.. Go to VMRemovable Devices Click connect Alfa wireless card



34 Cyber Warnings E-Magazine – November 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   29   30   31   32   33   34   35   36   37   38   39