a. Wireless Theory


Network connection steps:

  1. The client sends an authentication request to the AP
  2. The AP sends an authentication response of "successful"
  3. The client sends an association request to the access point
  4. The AP sends an association response if the capability of the clients meets that of the AP

Pasted image 20231101150330.png|475

Wire Equivalent Privacy (WEP)

  1. CRC is appended to plaintext message
  2. Message is XORed with key stream which is derived from a concatenation of the secret key and the initialization vector (the seed). The seed is 64 or 128 bits
  3. Encrypted message is sent together with IV to be checked at the receiver from the secret key that is shared

WEP Authentication

WPA Ciphers:

Tools, drivers, and stacks

/lib/modules/<kernel-version>

Wireless tools

Wireshark setup:

Wireshark capture filters

((wlan addr1 3A:30:F9:0F:E1:95) or (wlan addr2 3A:30:F9:0F:E1:95) or (wlan addr3 3A:30:F9:0F:E1:95) or (wlan addr4 3A:30:F9:0F:E1:95)) and (not subtype beacon)

Remote Wireshark capture with SSHdump:

  1. Choose "External Capture" and configure SSH settings
  2. To use standard user:
sudo dpkg-reconfigure wireshark-common / yes
sudo usermod -a -G wireshark kali