Mesh: all APs are equal without defined roles, extends network reach
Wireless Distribution Systems (WDS): multiple APs connected with a distributed system such as main AP
Wireless Bridging: allows WDS APs to communicate
Wireless Repeating: allows both stations and APs to communicate
Wi-Fi Direct/P2P: devices allows for direct communication without passing the AP first by acting as a software AP using WPS-style connection, eg. internet sharing and file sharing
Network connection steps:
The client sends an authentication request to the AP
The AP sends an authentication response of "successful"
The client sends an association request to the access point
The AP sends an association response if the capability of the clients meets that of the AP
Wire Equivalent Privacy (WEP)
CRC is appended to plaintext message
Message is XORed with key stream which is derived from a concatenation of the secret key and the initialization vector (the seed). The seed is 64 or 128 bits
Encrypted message is sent together with IV to be checked at the receiver from the secret key that is shared
RC4 encryption
Symmetric cipher
Key stream is XOR'd with plain text
Two elements:
Key Scheduling Algorithm (KSA): Initializes state table with IV and WEP key
Pseudo-Random Generation Algorithm (PRGA): Creates the keystream
C32 checksums using ICV
WEP Authentication
Open authentication: client does not provide any credentials, hence everyone can connect
Shared authentication: challenge text is sent to client, must be encrypted with WEP key and sent for verification
WPA Ciphers:
TKIP/WPA1: legacy hardware that can only handle WEP
CCMP/RSN/WPA2: based on AES
Tools, drivers, and stacks
In Linux one driver can cover multiple devices of same chipset
Most drivers are Loadable Kernel Modules (LKM) which are only loaded when necessary
Drivers are located in:
/lib/modules/<kernel-version>
Vermagic indicates for what system the driver was compiled
Firmware states what can be loaded by driver
Some modules may need to be blacklisted if multiple drivers fight for the same resources
Wireless tools
Two sets of tools: iw (new), and iwconfig (legacy)
iwconfig manipulates the basic wireless parameters: change modes, set channels, and keys.
iwlist allows for the initiation of scanning, listing frequencies, bit rates, and encryption keys.
iwspy provides per-node link quality (not often implemented by drivers).
iwpriv allows for the manipulation of the Wireless Extensions specific to a driver.
((wlan addr1 3A:30:F9:0F:E1:95) or (wlan addr2 3A:30:F9:0F:E1:95) or (wlan addr3 3A:30:F9:0F:E1:95) or (wlan addr4 3A:30:F9:0F:E1:95)) and (not subtype beacon)
Remote Wireshark capture with SSHdump:
Choose "External Capture" and configure SSH settings
To use standard user:
sudo dpkg-reconfigure wireshark-common / yes
sudo usermod -a -G wireshark kali