In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software requirements for setting up your own wireless pentesting rig. In this third part of the series, we are going to introduce common wireless attacks and the tools you use to perform them which will prepare you for the fourth and final part of the series, where we will take look at how to conduct a wireless pentest.
Addendum: Pivoting to Parrot
Before we get into wireless attacks, I wanted to provide an update and share some lessons learned from a wireless pentest I conducted at work recently. I haven’t done much with wireless pentesting tools, since the latest version of Kali Linux was released. Some of the wireless tools weren’t installing correctly and the dependencies for some tools weren’t installing correctly. Part of the issue is due to moving away from Python 2.7 due to deprecation and not being updated to Python 3.X. My newest Alf USB WiFi adapter, the AWUS036ACH, even with driver updates was not working on the latest version of Kali Linux.
One solution would have been to use older versions of Kali Linux, but I decided to try Parrot Security, the cyber security-focused version of the Parrot OS distribution of Linux. I was pleasantly surprised. Most of all the latest and greatest wireless pentesting tools were installed and ran properly. This included hcxtools and hcxdumptool required by Wifite and some other tools. Hcxdumptool is a good tool for password cracking and used with Hashcat. I discovered it while setting up my wireless pentesting rig that the SANS Institute uses for Pandas USB WiFi adapters in the SANS Wireless Pentest (Read more...)
*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Phillip Wylie. Read the original post at: http://feedproxy.google.com/~r/eh-net/~3/OIHxA04nIB0/