Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Wifi Hacking with Aircrack-ng πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

So today, I wanted to talk about WIFI hacking, how to perform it, as well as how to defend against it. Link to the demonstration video is at the end of the post. But before I start, I would like to mention as a disclaimer that I by no means condone any form of illegal behavior you might use this information for. It's STRICTLY for educational purposes ONLY.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today, I'm going to talk more about ransomware attacks and how to prevent them. This is to raise more awareness on proper Cyber Security data Hygiene methods, as well as other techniques that can be used to prevent any real damage should this attack connect. This article is also going to feature some of my formal QA answers from a recent interview I did most recently.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is Session Hijacking?

πŸŽƒ What are COOKIES?

πŸŽƒ What is Cookie Session Hijacking?

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Patreon Version

πŸŽƒ Wifi Hacking with Aircrack-ng

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

So how does the process work? Well it depends on the type of Wireless security you are trying to crack. In this case since it’s WPA2, the end goal is to intercept the main handshake that occurs between the host and access point when it connects to the network.

Now you might be wondering, how do you get that information if host systems are already connected to AP? The handshake is complete so there’s no way to get that information right? Wait for them to reconnect? Why wait when you can just force them. What you essentially need to do in order to bypass the security, is β€œde-authenticate” them from the network, forcing them to reconnect.

In order to do this you need to tell the AP directly to de-authenticate them since it’s impossible to talk to the specific hosts on the network when you don’t have access to it.Think of the WAP as an HTTP web application server you can send requests and various HTTP headers to, to invoke various responses. In this process we are essentially doing the same thing, sending the right data packets in order to kick end users off the main access point and scan for the handshake in the process. All you NEED, is the right NIC card to perform passive recon for data packets.

The first step is to use airmon-ng in order to place your main NIC card into something that is called β€œmonitor mode”. Monitor mode allows your NIC card to perform passive recon and sniff out any WAP’s, as well as host systems connected to them. It can also be used to check and kill any processes that might interfere with the scan such as the NetworkManager service for example. The next step is to use the airodump-ng command in order to scan RF channels to search for the SSID of the network AP you wish to target.

Once found, you can hone in on the AP and see any and all main systems that are connected to it as well, including any MAC addresses that could possibly allow you to bypass stuff like MAC filters that require you to have a trusted MAC address in order to connect to the network.

Next thing you want to do, while scanning the main AP with airodump-ng is pop open another shell session and then use the aireplay-ng command in order to send authentication packets to force end users to reconnect in order to secure the handshake. THIS PROCESS DOES TAKE TIME.

Now the question is, how to defend against this. Nowadays, AP’s are essentially β€œrandomizing” the frequency channel to prevent people from scanning the access point.If you can’t scan it, then you can’t see the hosts that are on the network, as well as secure the main handshake. It’s something so simple that can stop hackers in their tracks.





portfolio img

If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!

If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States