Hacking wireless networks

27 March 2023 5 minutes Author: Endpool

Prospects and challenges of wireless communication: how to protect your network from uninvited guests?

Wireless communication technologies are currently the most popular, thanks to which they have great prospects. In the future, people will be able to completely abandon wired communication and switch to mobile. In addition, wireless communication opens up additional opportunities for users. The main advantage of wireless networks (and at the same time their Achilles’ heel) is the availability of the physical medium of data transmission – radio air. And if for sites of public access to network resources (hot spots) such an opportunity is a boon, then for home or local networks, availability outside a certain area defined by the walls of an office or apartment is completely unnecessary. Spatially, the access zone of one node is a sphere, the radius of which is determined by the maximum distance from the center while preserving the stable quality of work of wireless clients. In practice, the spatial access zone is far from a geometrically beautiful figure due to the absorption of the radio signal by the surrounding physical environment.

Speaking in normal language, for the same equipment, the dimensions of access zones in brick and panel houses with a reinforced concrete floor will differ. Be prepared for the fact that by setting up a wireless network, you can connect not only from anywhere in the office, but also from such unexpected places as the attic, the parking lot or the building across the street. If a shielded twisted pair could be used to protect against intrusion during the laying of cable networks, then as a similar solution for the physical limitation of the spatial access zone of a wireless network, a screen made of a grounded metallized mesh stretched along the borders of the access zone will have to be used.

These sections discuss programs that can be used to examine packets on a network. Software designed for WEP/WPA/WPA2 Cracking Tools attacks

WIBR+ — Wifi Bruteforce

This is a program for testing the security of Wi-Fi networks WPA/WPA2 PSK. It detects weak passwords. WIBR+ supports queue creation, user dictionaries, a brute force generator, and advanced monitoring. Two types of attacks can be launched with WIBR+.

Link

coWPAtty

Implementing an offline dictionary attack against WPA/WPA2 networks that use PSK-based authentication (e.g. WPA-Personal) Many industrial networks use a PSK-based authentication mechanism for WPA/WPA2 because it is much simpler than setting up the required RADIUS, submission request and certify the authentication architecture required for WPA-Enterprise authentication.

Link

Elcomsoft Wireless Security Auditor

Elcomsoft Wireless Security Auditor enables attackers to infiltrate a secured Wi-Fi network by intercepting wireless traffic and launching a WPA/WPA2 PSK password attack. It was originally designed to help administrators verify how secure a company’s wireless network is. It tests the security of the wireless network by trying to penetrate the network from the outside or the inside. It can work as a wireless sniffer or run offline by analyzing a dump of network communications. The tool attempts to extract WPA/WPA2 PSK passwords as plaintext.

Link

Wi-Fi packet sniffers

SteelCentral Packet Analyzer

It’s a wired and wireless network analyzer that captures terabytes of packet data. Passing them is the first step to a full analysis in real time and in retrospect. When integrated with Wireshark, it enhances Wireshark by making it more efficient at detecting and diagnosing network problems. SteelCentral Packet Analyzer measures wireless channel usage and helps identify rogue wireless networks and stations.

Link

Omnipeek Network Protocol Analyzer

Provides real-time visibility and analysis of network traffic, as well as a comprehensive view of the activity of the entire wireless network, showing each wireless network, the access points that are part of that network, and the users connected to each access point. It provides real-time visibility and analysis of every part of the network through a single interface, including Ethernet, Gigabit, 10 Gigabit, 802.11a/b/g/n wireless, VoIP, and video to remote offices.

Link

Kismet

It is an 802.11 Layer-2 wireless network detector, analyzer and intrusion detection system. It identifies networks by passively collecting packets and discovering standard named networks. It detects hidden networks and the presence of non-beacon networks through data traffic.

Link

Wi-Fi Analyzer Tools

AirMagnet Wi-Fі Analyzer PRO

AirMagnet Wi-Fi Analyzer PRO automatically detects and diagnoses common Wi-Fi network performance issues, security threats, and wireless network vulnerabilities, helping IT staff quickly resolve end-user issues. This tool detects bandwidth issues, Wi-Fi connectivity issues, device conflicts, multipath issues, and includes a compliance reporting engine, including wireless PCI, SOX, and ISO.

Link

Hack Bluetooth

BtleJack

This software is open source, which allows an attacker to perform a Btlejacking attack using the microibit hardware (https://microbit.org). This helps attackers to block and intercept Bluetooth connections. Once connected, an attacker can intercept, read and export sensitive information shared between connected devices.

Link

BluetoothView

This is a utility that monitors the activity of nearby Bluetooth devices. For each detected Bluetooth device, the following information is displayed: device name, Bluetooth address, primary device type, secondary device type, first detection time, and last detection time. It can also send notifications when a new Bluetooth device is detected.

Link

Other related articles
ServicesSoft
Read more
Hacking wireless networks
The main advantage of wireless networks, as well as their Achilles' heel, is the availability of the physical medium of data transmission - radio air.
334
Found an error?
If you find an error, take a screenshot and send it to the bot.