Wireless Attacks

Syllabus of the OSWP course:

Table of Contents:

1. IEEE 802.11
1.1 IEEE
1.1.1 Committees
1.1.2 IEEE 802.11
1.2 802.11 Standards and Amendments
1.3 Main 802.11 Protocols
1.3.1 Detailed Protocol Descriptions

2. Wireless Networks
2.1 Wireless Operating Modes
2.1.1 Infrastructure Network
2.1.2 Ad-Hoc Network
2.1.3 Wireless Distribution System
2.1.4 Monitor Mode

3. Packets and Network Interaction
3.1 Wireless Packets  802.11 MAC Frame
3.1.1 Header
3.1.2 Data
3.1.3 FCS
3.2 Control Frames
3.2.1 Common Frames
3.3 Management Frames
3.3.1 Beacon Frames
3.3.2 Probe Frames
3.3.2 Authentication
3.3.3 Association/Reassociation
3.3.4 Disassociation/Deauthentication
3.3.5 ATIM
3.3.6 Action Frames
3.4 Data Frames
3.4.1 Most Common Frames 
3.5 Interacting with  Networks
3.5.1 Probe
3.5.2 Authentication
3.5.3 Association
3.5.4 Encryption

4. Getting Started
4.1 Choosing Hardware
4.1.1 Adapter Types
4.1.2 dB, dBm, dBi, mW, W
4.1.3 Antennas
4.2 Choosing a Wireless Card
4.2.1 Alfa AWUS036H
4.3 Choosing an Antenna
4.3.1 Antenna Patterns

5. Linux Wireless Stack and Drivers
5.1 ieee80211 vs. mac80211
5.1.1 ieee80211
5.1.2 mac80211
5.2 Linux Wireless Drivers
5.2.1 Resolving AWUS036H Issues
5.2.2 Loading and Unloading Drivers
5.2.3 mac80211 Monitor Mode
5.2.4 ieee80211 Monitor Mode

6. Aircrack-ng Essentials
6.2 Airmon-ng
6.2.1 Airmon-ng Usage
6.2.2 Airmon-ng Usage Examples
6.2.2 Airmon-ng Lab
6.3 Airodump-ng
6.3.1 Airodump-ng Usage
6.3.3 Precision Airodump-ng Sniffing
6.3.4 Airodump-ng Troubleshooting
6.3.5 Airodump-ng Lab
6.4 Aireplay-ng
6.4.1 Aireplay-ng Usage
6.4.2 Aireplay-ng Troubleshooting
6.4.3 Optimizing Aireplay-ng Injection Speeds
6.5 Injection Test
6.5.1 Injection Test Usage
6.5.2 Aireplay-ng Lab

7. Cracking WEP with Connected Clients
7.1 Initial Attack Setup
7.1.1 Airmon-ng
7.1.2 Airodump-ng
7.2 Aireplay-ng Fake Authentication Attack
7.2.1 Fake Authentication Usage
7.2.2 Fake Authentication Troubleshooting
7.2.3 Running the Fake Authentication Attack
7.2.4 Fake Authentication Lab
7.3 Aireplay-ng Deauthentication Attack
7.3.1 Deauthentication Attack Usage
7.3.2 Deauthentication Troubleshooting
7.3.3 Running the Deauthentication Attack
7.3.4 Deauthentication Lab
7.4 Aireplay-ng ARP Request Replay Attack
7.4.1 What is ARP?
7.4.2 ARP Request Replay Usage
7.4.3 Running the ARP Request Replay Attack
7.4.4 ARP Request Replay Attack Lab
7.5 Aircrack-ng
7.5.1 Aircrack-ng 101
7.5.2 Aircrack-ng Usage
7.5.3 Aircrack-ng Troubleshooting
7.5.4 Running Aircrack-ng
7.5.5 Aircrack-ng Lab
7.6 Classic WEP Cracking Attack Summary

8. Cracking WEP via a Client
8.1 Attack Setup
8.1.1 Attack Setup Lab
8.2 Aireplay-ng Interactive Packet Replay Attack
8.2.1 Natural Packet Selection
8.2.2 Modified Packet Replay
8.2.3 Running the Interactive Packet Replay Attack
8.2.4 Interactive Packet Replay Lab
8.3 Cracking the WEP Key
8.3.1 Lab
8.4 Cracking WEP via a Client Attack Summary

9. Cracking Clientless WEP Networks
9.1 Attack Assumptions
9.2 Attack Setup
9.2.1 Attack Setup Lab
9.3 Aireplay-ng Fragmentation Attack
9.3.1 Fragmentation Attack Usage
9.3.2 Fragmentation Attack Troubleshooting
9.3.3 Running the Fragmentation Attack
9.3.4 Fragmentation Attack Lab
9.4 Packetforge-ng
9.4.1 Packetforge-ng Usage
9.4.2 Running Packetforge-ng
9.4.3 Packetforge-ng Lab
9.5 Aireplay-ng KoreK ChopChop Attack
9.5.1 ChopChop Theory
9.5.2 Aireplay-ng KoreK ChopChop Usage
9.5.3 Running the KoreK ChopChop Attack
9.5.4 KoreK ChopChop Attack Lab
9.6 Interactive Packet Replay and Aircrack-ng
9.6.1 Interactive Packet Replay
9.7 Clientless WEP Cracking Lab
9.8 Clientless WEP Cracking Attack Summary

10. Bypassing WEP Shared Key Authentication
10.2 Attack Setup
10.2.1 Attack Setup Lab
10.3 Aireplay-ng Shared Key Fake Authentication
10.3.1 Deauthenticate a Connected Client
10.3.2 Shared Key Fake Authentication
10.3.3 Running the Shared Key Fake Authentication
10.3.4 Shared Key Fake Authentication Lab
10.4 ARP Request Replay and Aircrack-ng
10.4.1 ARP Request Replay
10.4.2 Aircrack-ng
10.5 Bypassing WEP Shared Key Authentication Lab
10.6 WEP Shared Key Authentication Attack Summary

11. Cracking WPA/WPA2 PSK with Aircrack-ng
11.1 Attack Setup
11.1.1 Attack Setup Lab
11.2 Aireplay-ng Deauthentication Attack
11.2.1 Four-way Handshake Troubleshooting
11.2.2 Deauthentication Attack Lab
11.3 Aircrack-ng and WPA
11.3.1 No valid WPA handshakes found
11.3.2 Aircrack-ng and WPA Lab
11.4 Airolib-ng
11.4.1 Airolib-ng Usage
11.4.2 Using Airolib-ng
11.4.3 Airolib-ng Lab
11.5 Cracking WPA Attack Summary

12. Cracking WPA with JTR and Aircrack-ng
12.1 Attack Setup
12.1.1 Attack Setup Lab
12.2 Editing John the Ripper Rules
12.2.1 Word Mangling Lab
12.3 Using Aircrack-ng with John the Ripper
12.4 John the Ripper Lab
12.5 Aircrack-ng and JTR Attack Summary

13. Cracking WPA with coWPAtty
13.1 Attack Setup
13.1.1 Attack Setup Lab
13.2 coWPAtty Dictionary Mode
13.3 coWPAtty Rainbow Table Mode
13.4 coWPAtty Lab
13.5 coWPAtty Attack Summary

14. Cracking WPA with Pyrit
14.1 Attack Setup
14.1.1 Attack Setup Lab
14.2 Pyrit Dictionary Attack
14.3 Pyrit Database Mode
14.4 Pyrit Lab
14.5 Pyrit Attack Summary

15. Additional Aircrack-ng Tools
15.1 Airdecap-ng
15.1.1 Airdecap-ng Usage
15.1.2 Removing Wireless Headers
15.1.3 Decrypting WEP Captures
15.1.4 Decrypting WPA Captures
15.1.5 Airdecap-ng Lab
15.2 Airserv-ng
15.2.1 Airserv-ng Usage
15.2.2 Using Airserv-ng
15.2.3 Airserv-ng Troubleshooting
15.2.4 Airserv-ng Lab
15.3 Airtun-ng
15.3.1 Airtun-ng Usage
15.3.2 Airtun-ng wIDS
15.3.3 Airtun-ng WEP Injection
15.3.4 Airtun-ng PRGA Injection
15.3.5 Connecting to Two Access Points with Airtun-ng
15.3.6 Airtun-ng Repeater Mode
15.3.7 Airtun-ng Packet Replay Mode
15.3.8 Airtun-ng Lab

16. Wireless Reconnaissance
16.1 Airgraph-ng
16.1.1 CAPR
16.1.2 CPG
16.2 Kismet
16.3 GISKismet
16.4 Wireless Reconnaissance Lab

17. Rogue Access Points
17.1 Airbase-ng
17.1.1 Airbase-ng Usage
17.1.2 Airbase-ng Shared Key Capture
17.1.3 Airbase-ng WPA Handshake Capture
17.2 Karmetasploit
17.2 Karmetasploit Configuration
17.3 Man in the Middle Attack
17.4 Rogue Access Points Lab

Appendix A: Cracking WEP via a Client - Alternate Solutions
A.1 Pulling Packets from Captured Data
A.2 Creating a Packet from a ChopChop Attack
Appendix B: ARP Amplification
B.1 Equipment Used
B.2 One for One ARP Packets
B.3 Two for One ARP Packets
B.4 Three for One ARP Packets