Page 34 - CDM Cyber Warnings November 2013
P. 34
There are 2 different type of WPA2 protocols:
- WPA2-PSK: Here PSK refers to pre-shared key. It is designed for a very small
network i.e. home
- WPA2-ENT: Here ENT refers to enterprise. This is made for enterprises, and is
much more secure than WPA2-PSK as the passphrase is not stored locally.
Access Point & Client Interaction: Before cracking a wireless network, it is essential
to know how the access point and client interact with each other.
The very first step is detect the communication to capture every packet and understand how it
works. When the network is turned on, the following will be seen:
Null Probe Request (Broadcast message): Sent by client for searching available
wireless networks
Probe Response: Sent by the access point
Authentication Request Packet: Client sends a request to the access point
Authentication Response: Access point responds if it is successful.
Association Request: Client sends a request to the access point for communicating.
Association Response: Sent by the access point to the client.
Data transfer is then initiated.
Cracking the Wireless Network: There are two ways to crack the wireless network:
The Semi Automated Approach & the Fully Automated Approach
The Semi-Automated Approach
1- Get your Wireless Interface up: The first step to cracking a wireless network is to
configure the wireless card and get it up and running. To do this, the below steps should
be followed:
Plug the wireless card (Alfa Card) to the virtual machine and make sure it is
connected.. Go to VMRemovable Devices Click connect Alfa wireless card
34 Cyber Warnings E-Magazine – November 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide