WIFI Cracking

Majd Abuleil

2 min read

Wi-Fi networks typically use encryption protocols to secure data transmission between devices and the access point. Common Wi-Fi security protocols include:

WEP (Wired Equivalent Privacy):

WEP served as the inaugural encryption protocol in Wi-Fi networks, furnishing rudimentary security by encrypting data exchanged between devices and the access point via a shared key. Nevertheless, WEP’s security stature has since diminished significantly, attributable to exploitable vulnerabilities that render the encryption key susceptible to swift cracking by attackers.

WPA (Wi-Fi Protected Access):

WPA was developed as a successor to WEP (Wired Equivalent Privacy) to rectify its security flaws. It brought in robust encryption techniques and enhanced security features like TKIP (Temporal Key Integrity Protocol) and MIC (Message Integrity Check). Despite being an advancement over WEP, WPA remains susceptible to specific attacks, notably those aimed at exploiting vulnerabilities within TKIP.

WPA2 (Wi-Fi Protected Access 2):

WPA2 is the current gold standard for Wi-Fi security, widely adopted in modern networks. It employs AES (Advanced Encryption Standard) encryption, which is significantly more robust than the encryption used in WEP and WPA. Moreover, WPA2 supports stronger authentication methods like 802.1X/EAP (Extensible Authentication Protocol), enhancing its resilience against attacks compared to earlier versions.

WPA3 (Wi-Fi Protected Access 3):

WPA3 represents the most recent advancement in Wi-Fi security protocols, engineered to elevate security standards and mitigate vulnerabilities identified in WPA2. It brings forth numerous enhancements, notably fortified encryption through individualized data encryption (SAE — Simultaneous Authentication of Equals) and safeguards against offline dictionary attacks. Additionally, WPA3 bolsters security for devices lacking display capabilities, like IoT devices, by streamlining the secure Wi-Fi network connection process.

Attack Techniques:

  • Aircrack-ng: Aircrack-ng is a well-known set of tools used for auditing wireless networks. It offers features like packet sniffing, monitoring, and even attacking Wi-Fi networks. With Aircrack-ng, you can attempt brute-force attacks to crack Wi-Fi passwords for this we can use alfa adaptor.

  • Airgeddon or Evil Twin Attack: Airgeddon is a versatile bash script used for performing wireless security assessments. It’s equipped with various features for creating rogue access points, also known as Evil Twins. These rogue access points trick unsuspecting users into connecting to them, enabling attackers to intercept their network traffic or carry out additional attacks.

  • Man-in-the-Middle (MITM) Attack: Bettercap is a potent tool used for executing Man-in-the-Middle (MITM) attacks on both wired and wireless networks. It can intercept, modify, and inject packets into Wi-Fi traffic, granting attackers the ability to eavesdrop on communications, pilfer sensitive information, or execute various other malicious actions.