Network administrators can take steps to help protect their wireless network from outside threats and attacks. Most hackers will post details of any loops or exploits online, and if they find a security hole, they will come in droves to test your wireless network with it. WEP is used for wireless networks. Always change your SSID from the default, before you actually connect the wireless router to the access point. If an SSID broadcast is not disabled on an access point, the use of a DHCP server to automatically assign an IP address to wireless clients should not be used because war driving tools can easily detect your internal IP addressing if the SSID broadcasts are enabled and the DHCP is being used.
As an ethical hacker and penetration tester of an organization, your IT director will assign you the task of testing wireless security, exploiting the flaws in WEP, and cracking the keys present in WEP of an organization. In this lab, we discuss how WPA key is cracked using standard attacks such as korek attacks and PTW attacks.
The objective of this lab is to protect wireless network from attackers. In this lab, you will learn how to:
Crack WEP using various tools
Capture network traffic
Analyze and detect wireless traffic
In this lab you have learnt how to crack WEP using various tools, capture network traffic and analyze and detect wireless traffic. Document the BSSID of the target wireless network connected clients and recovered WEP key. Analyze various Airecrack-ng attacks and their respective data packet generation rate.