COURSE: 2021S-T1 ISN 1903 - Wireless and Mobile Device Security 02 (CSFM Group 2)
COURSE: 2021S-T1 ISN 1903 - Wireless and Mobile Device Security 02 (CSFM Group 2)
Submitted By:
David Olaitan Aridiogo
Student ID: 774493
1.Choose three modules from the Aircrack-ng suite.
Answer: The three choice of module from Aircrack suite-ng suite are:
Airbase-ng
Airgraph-ng
Aireplay-ng
c)
d) Configuration steps for Airbase-ng
Step 1: Sniff the Air
First victims AP information must be observed
set wifi-adpater in monitor mode
there are two options to do so, I prefer this commands
"ifconfig wlan0 down"
"iwconfig wlan0 mode monitor"
"ifconfig wlan0 up"
Image via imgur.com
so here we started the eviltwin-AP and it has the
BSSID C4:E9:84:0D:9C:FA
to monitor the connections we open a third terminal and type
"airodump-ng --bssid C4:E9:84:0D:9C:FA -c 2 wlan0"
Term1: monitors the real-AP
Term2: runs the fake-AP
Term3: monitors the fake-AP
Image via imgur.com
wrong ip-address in this picture, should be 192.168.2.1
Image via imgur.com
Image via imgur.com
Run book for Airgraph-ng
a) Function of Airgraph-ng; Airgraph-ng is tool to generate graphs to
visualize data captured by airodump-ng. It can create two types of
graphs:
CAPR: Client – Access Point Relationship, showing all the
clients connected to the different access points
CPG: Common Probe Graph, shows a graph centered on probed
ESSID and devices MAC who probed them
b) Strength of Using Airgraph-ng
We can't read the traffic flowing between devices, but we can watch
the relationship between Wi-Fi devices like laptops, smartphones, and
IoT products to learn about the network and the people behind them.
To understand how a network is connected, we can sniff the Wi-Fi
radio traffic in the area to discover which devices are currently
connected to an access point, building a list of relationships through
Airgraph-ng.
Airgraph-ng is pretty straightforward, as can be seen by its manual
page entry.
NAME
airgraph-ng - a 802.11 visualization utility
SYNOPSIS
airgraph-ng [options]
DESCRIPITION
airgraph-ng graphs the CSV file generated by Airodump-ng. The idea
is that we are showing the
relationships of the clients to the AP's so don't be shocked if we
see only one mapping as
we may only have captured one client
OPTIONS
-h Shows the help screen.
EXAMPLES
airgraph-ng -i dump-01.csv -o dump.png -g CAPR
Options:
--ivs : Save only captured IVs
--gpsd : Use GPSd
--write <prefix> : Dump file prefix
-w : same as --write
--beacons : Record all beacons in dump file
--update <secs> : Display update delay in seconds
--showack : Prints ack/cts/rts statistics
-h : Hides known stations for --showack
-f <msecs> : Time in ms between hopping channels
--berlin <secs> : Time before removing the AP/client
from the screen when no more packets
are received (Default: 120 seconds)
-r <file> : Read packets from that file
-x <msecs> : Active Scanning Simulation
--manufacturer : Display manufacturer from IEEE OUI list
--uptime : Display AP Uptime from Beacon Timestamp
--wps : Display WPS information (if any)
--output-format
<formats> : Output format. Possible values:
pcap, ivs, csv, gps, kismet, netxml, logcsv
--ignore-negative-one : Removes the message that says
fixed channel <interface>: -1
--write-interval
<seconds> : Output file(s) write interval in seconds
--background <enable> : Override background detection.
Filter options:
--encrypt <suite> : Filter APs by cipher suite
--netmask <netmask> : Filter APs by mask
--bssid <bssid> : Filter APs by BSSID
--essid <essid> : Filter APs by ESSID
--essid-regex <regex> : Filter APs by ESSID using a regular
expression
-a : Filter unassociated clients
Options:
-h, --help show this help message and exit
-o OUTPUT, --output=OUTPUT
Our Output Image ie... Image.png
-i INPUT, --dump=INPUT
Airodump txt file in CSV format. NOT the pcap
-g GRAPH_TYPE, --graph=GRAPH_TYPE
Graph Type Current [CAPR (Client to AP Relationship)
OR CPG (Common probe graph)]
If we see the help output for both Airodump-ng and Airgraph-ng, then we're ready
to start intercepting and interpreting packets!
PID Name
561 NetworkManager
627 wpa_supplicant
3561 dhclient
Now, it's time to generate our first graph from the wireless data we've intercepted.
We can think of this data like metadata, telling us which devices were calling each
other, but not what they were saying.First, we'll start a graph of the client AP
relationships. After locating the CSV file we created, run the following command in
a terminal window to create a CAPR graph of which device is connected to which
access point. Replace "CAPRintercept.png" with the name of the graph we want to
create, and '/root/Desktop/cafemak-01.csv' with the path to the CSV file.
airgraph-ng -o CAPRintercept.png -i '/root/Desktop/cafemak-01.csv' -g CAPR
**** WARNING Images can be large, up to 12 Feet by 12 Feet****
Creating wer Graph using, /root/Desktop/cafemak-01.csv and writing to, cafemak.png
Depending on wer system this can take a bit. Please standby......
.
Now that our card is on the correct channel, we can direct the command which will
disconnect the device we've located. The command we will use to do this is formatted like
this:
“aireplay-ng -0 0 -a <bssid of access point> -c <bssid of client device> <name of the
adapter>”
To break down what the commands above are doing:
-0 will set the attack option to option 0, a deauthentication attack which will send
authentication packets pretending to be from the access point to the device.
The 0 that follows indicates to send a continuous stream of deauthentication
packets, but you can also choose a fixed number to send here.
-a will set the BSSID of the Wi-Fi access point that the device is connected to.
-c will set the BSSID of the device we wish to kick off the network.
Our final command for our example would be as follows.
“aireplay-ng -0 0 -a f2:9f:c2:34:55:64 -c a4:14:37:44:1f:ac wlan0mon”
Once this command executes, it will continue to jam the Wi-Fi connection between the
two devices until you cancel the command by hitting the Ctrl-C key combination.
REFERENCE
https://en.kali.tools/?p=598
https://www.aircrack-ng.org/doku.php?id=airgraph-ng
https://linuxhint.com/aireplay_ng/
https://www.freecodecamp.org/news/wifi-hacking-securing-wifi-networks-with-aircrack-
ng/
https://mdickinson.dyndns.org/php/wordpress/?p=1075