{"id":486,"date":"2011-10-18T22:11:05","date_gmt":"2011-10-18T22:11:05","guid":{"rendered":"http:\/\/41j.com\/blog\/?p=486"},"modified":"2011-10-23T23:23:40","modified_gmt":"2011-10-23T23:23:40","slug":"securitytube-wireless-lan-security-megaprimer-notes-part-10-hacking-isolated-clients","status":"publish","type":"post","link":"https:\/\/41j.com\/blog\/2011\/10\/securitytube-wireless-lan-security-megaprimer-notes-part-10-hacking-isolated-clients\/","title":{"rendered":"SecurityTube, Wireless Lan Security Megaprimer notes: part 10 (Hacking Isolated Clients)"},"content":{"rendered":"<p>Vivek&#8217;s video is <a href=\"http:\/\/www.securitytube.net\/video\/1780\">here<\/a>.<\/p>\n<p>You may have noticed that your phone or laptop autoconnects to wifi networks you&#8217;ve used before.<br \/>\nIn this part Vivek discusses this behaviour and shows how it can be exploited.<\/p>\n<p>Clients acquire preferred lists of SSIDs as they connect to different networks.<\/p>\n<p>When the client is isolated, it will send out &#8220;Probe Request&#8221; packets to try and find the networks it already knows about.<\/p>\n<p>0. Make sure your monitor mode interface (mon0 is up and running as before).<\/p>\n<p>SSID is case sensitive.<\/p>\n<p>1. You&#8217;ll need a client which you&#8217;ve previously connected to a number of networks.<br \/>\n   Leave the Wifi on, but don&#8217;t associate with any network.<\/p>\n<p>2. Load airodump, you should be able to see the client probing for various networks.<\/p>\n<p>3. Start a wireshark capture as usual.<\/p>\n<p>3.1 Use the mac address of the client from airodump like so:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nwlan.addr == MACADDRESS\r\n<\/pre>\n<p>You should see a bunch of &#8220;Probe Request&#8221; packets. You should see probe requests for all the networks your client knows about.<\/p>\n<p>You should note that different operating systems behave differently. Newer OSs don&#8217;t auto-connect to open networks.<\/p>\n<p>Use Cases:<\/p>\n<p>4. Open network, no encryption.<\/p>\n<p>Attacker sniff Probe Request for a network.<br \/>\nAttacker sends a &#8220;Probe Response&#8221; saying &#8220;Yes I&#8217;m that network&#8221;.<br \/>\nTarget is connected to attackers fake access point.<br \/>\nAttacker can attack the client at the IP level.<\/p>\n<p>This is possible because SSID alone is used which network to connect to.<\/p>\n<p>4.1 We can use airbase-ng to create a fake AP as before:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nairbase-ng --essid SecurityTube -a AA:AA:AA:AA:AA:AA mon0\r\n<\/pre>\n<p>Note: You can add a &#8220;-v&#8221; to airbase-ng which displays a lot of interesting information.<\/p>\n<p>4.2 Fire up wireshark add a filter for the MAC: AA:AA:AA:AA:AA:AA, the filter should look like this (where MACADDRESS is the MAC of your client previously found):<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\n(wlan.addr == MACADDRESS) &amp;amp;&amp;amp; (wlan.addr == AA:AA:AA:AA:AA:AA)\r\n<\/pre>\n<p>5. airbase-ng respond to everything!<\/p>\n<p>airbase-ng can be configured to respond to \/ALL\/ probe requests:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nairbase-ng -P -a AA:AA:AA:AA:AA:AA mon0\r\n<\/pre>\n<p>-C can also be used to send of beacon packets for networks probed too, neat!<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nairbase-ng -C 10 -P -a AA:AA:AA:AA:AA:AA mon0 -v\r\n<\/pre>\n<p>Vivek shows this iPhone hopping between different wifi networks which his fake AP is broadcasting.<\/p>\n<p>We&#8217;ll discuss how to can use this behaviour with encrypted networks in later lessons.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vivek&#8217;s video is here. You may have noticed that your phone or laptop autoconnects to wifi networks you&#8217;ve used before. In this part Vivek discusses this behaviour and shows how it can be exploited. Clients acquire preferred lists of SSIDs as they connect to different networks. When the client is isolated, it will send out [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[14,13,12,10,11],"class_list":["post-486","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-pentest","tag-security","tag-securitytube","tag-wifi","tag-wifiprimer"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1RRoU-7Q","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/comments?post=486"}],"version-history":[{"count":2,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/486\/revisions"}],"predecessor-version":[{"id":524,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/posts\/486\/revisions\/524"}],"wp:attachment":[{"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/media?parent=486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/categories?post=486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/41j.com\/blog\/wp-json\/wp\/v2\/tags?post=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}