Assessment of Wireless Network
- WPA2 PSK (Wi-Fi Protected Access Pre-Shared Key) - Personal/Home/Small Business/Small to Medium Business
- WPA2 Enterprise - Large Companies
Activities Performed
- Evaluating strength of PSK: We will capture the handshake and then this handshake will allow us to take the handshake/file offline and try to crack it.
- Reviewing nearby networks: We will just move around the network and will look for nearby wireless devices. We will check that why is xyz device is showing up, why are they broadcasting in the network and we can see if there are possibly any rogue devices in the network.
- Assessing guest networks: Check if there is any guest network. If it is then we will check how strong the password is, If there are separation of networks when we are on the guest network. It comes in the "checking network access" because it falls on the main network as well. If the main network should not have access to certain aspect of the entire network we wanna check that. But specially in a guest network, when we login, then we should not have access to a lot of functionality inside the network because it just a guest network. For example: the guest network should not have access to employee things. or we should not be able to access certain IP address or certain servers.
- Checking network access: Not everyone should have access to all the things.
The Hacking Process (WPA2 PSK)
- Place: Place wireless card into monitory mode
- Discover: Discover information about network: Channel | BSSID (MAC Address)
- Select: Select network and capture data
- Perform: Perform deauth attack: It's gonna de-authenticate the user from the network and then the user will have to reauthenticate and then its gonna cause a handshake to happen.
- Capture: Capture WPA handshake (WPA-PSK) (Hash)
- Attempt: Attempt to crack the handshake