Wireless Hacking Tools

Objective:

Know basic wireless LAN hacking tools

There is no shortage of wireless tools for the attacker or the ethical hacker performing a security assessment or a pen test. Over time, tools come and go as technologies change and vulnerabilities are fixed. Therefore, it is important to understand what the tools do and where they fit in the methodology of a security assessment. Just listing all the available tools could easily fill a Chapter; therefore, some of the more well-known tools are discussed here:

Review Break

Many types of tools are available for wireless networks. You need to know the names of the tools and their functions to successfully pass the CEH exam.

Name

Platform

Purpose

NetStumbler

Windows

Wireless LAN detection

Mognet

Java

Wireless sniffer

WaveStumbler

Linux

Wireless LAN detection and sniffer

Aeropeek

Windows

Sniffer and analyzer

AirSnort

Linux

WEP cracking

Kismet

Linux

Sniffer and wireless detector

Void11

Linux

Wireless DoS tool

THC-Wardrive

Linux

Wireless WAP mapping tool

AirTraf

Linux

Sniffer

Airsnarf

Linux

Rogue access point

Aircrack

Linux

WEP cracking tool kit

Challenge

As you have seen in Chapter 9, many tools are available to the hacker for attacking and scanning WLANs. One good set of tools can be found on the Auditor security collection. This bootable version of Linux contains many popular security tools. For this challenge, you will download the ISO from the Auditor website and use it to build a Linux bootable CD. To complete this exercise, you will need Internet access, a CD burner, and a blank CD.

  1. You will need to go to the Auditor site to download. The main page can be found at www.remote-exploit.org/index.php/Auditor.
  2. After starting the download, take a few minutes to look at some of the tools included in this bootable version of Linux. This page can be found at www.remote-exploit.org/index.php/Auditor_tools. Some of the wireless tools include

    • Aircrack (Modern WEP cracker)
    • Aireplay (Wireless packet injector)
    • Wep_Crack (Wep Cracker)
    • Wep_Decrypt (Decrypt dump files)
    • AirSnort (GUI based WEP cracker)
    • ChopChop (Active WEP attack)
    • DWEPCrack (WEP cracker)
    • Decrypt (Dump file decrypter)
    • WEPAttack (Dictionary attack)
    • WEPlab (Modern WEP cracker)
    • Cowpatty (WPA PSK bruteforcer)
  3. After the ISO file has downloaded, you want to use a CD burning tool, such as Nero, to make and image a disk. In Nero, this option can be found under the Recorder, Burn image option.
  4. Now, reboot your computer with the newly burned Auditor disk in the CD-ROM drive. Most CD drives are not known for their speed, so you might need to be patient.
  5. To see how easy this set of tools makes assessing wireless, open Wellenreiter. It is a wireless network discovery and auditing tool. If any wireless networks are in your vicinity, you should begin to capture traffic.
  6. Finally, if you have a Bluetooth-enabled computer, open a shell and execute BTScanner. This handy tool extracts as much information as possible from a Bluetooth device without the requirement to pair.
  7. Continue to explore the various wireless tools found on the CD. This type of configuration offers pen testers easy access to all needed tools on an easy to load distribution.

Securing Wireless Networks

Категории