Network Cracking (Auditing) Module
WAIDPS also include with the Network auditing Module which allow user to crack a WEP encrypted access point (AP), capturing of WPA/WPA2 Handshake for cracking of WPA Passphase and also bruteforcing the PIN of a Wi-Fi Protected Setup (WPS) enabled router which thereafter revealing the WPA passphase. Apart from cracking of encrypted acess point, WAIDPS also include a “Live Monitoring” of Access Point which will show the detail of wireless clients associated to the specific Access Point.
WARNING : The Network Cracking Module is strictly for auditing your own network or mutual consent of auditing someone network. It is ILLEGAL to attack on someone access point and it is the user's responsibility to obey all applicable laws. Developer assumes no liability and is not responsible for any misuse of WAIDPS.
Network Auditing Main Menu
In order to get into the ‘Network Auditing’ selection menu, user can press [Enter] on the main menu followed by [A] to get into the auditing module. In the Auditing menu, it will display the list of detected access points sorted in the order of WEP, WPS enabled router, WPA Access Point with clients and WPA Access Point. To display more information on the operation, type [Help].
Note : Please allow the WiFi Harvester to harvest for access points and clients detail in the main screen before selecting the “Auditing Network” module.
Cracking of WEP Encrypted Access Point
WAIDPS allow user to crack a WEP encrypted access point with various attacking methods such as ARP replay, interactive ARP replay, Korek & Hirte attack (Developing). It also provide the options of deauthing existing clients and spoofing of MAC address. To select the target to attack, simply enter the number reflected or the MAC address of the Access Point (BSSID). User can also filter the encryption type by typing “WEP”.
Once the target Access Point (AP) is selected, WAIDPS will display the existing AP/Clients detail and also information found on the database which was previously harvested by the “WiFi Harvester”. WAIDPS has also spoofed the MAC address of the attacking interface and also allowing user to spoof their MAC address.
After all information at set, WAIDPS will first attempt to associate with the AP by performing a “Fake Authentication” with the AP. After associated with the AP, WAIDPS will then continue with the default ARP Request Replay attacks. At the same time of attacking the AP, WAIDPS will also attempt to crack the WEP key after obtaining sufficient IVs. Once the WEP encryption is cracked, the WEP key is be displayed and stored in a database for reference.
Example of displaying of cracked Access Point in the Auditing main menu
Apart from the default ARP Request Replay attack mode, WAIDPS also provide other attacking mode such as interactive replay, KoreK Chopchop, Café Latte, Fragmentation and Hirte attack method (Not ready yet). User can enter the WEP Auditing Menu by press [Enter] during the attacking process. Other than the attack methods, in the WEP auditing menu, it also allow user to deauth clients, spoofing of attacking MAC address and also other method of cracking the WEP key.
Cracking of WEP Encrypted Access Point (Usage of previous captured IVs)
WAIDPS will also store the previously captured IVs for subsequent use in cracking of WEP key if user does not have enough time to crack the WEP key. These IVs dump will be added to the current IVs to increase the number of IVs for faster chance of cracking.
Cracking of WEP Encrypted Access Point (Beating MAC Filtered AP)
Some Access Point may have the MAC Filtering option turn on prevent unauthorized client from associating with the AP and also harden cracking of the encryption by newbie. WAIDPS will display error message of possible “MAC Filtered Access Point” if a MAC filtered AP is detected during the fake authentication process.
WAIDPS will provide user with the option of spoofing the existing client MAC address or MAC address found in database that was previously harvested. Simply press [Enter] to display the WEP Auditing Menu and select “4” - Spoof MAC Address to spoof the attacking interface MAC address.
Cracking of WEP Encrypted Access Point (Shared Key Authentication – SKA AP)
A “Shared Key Authentication” (SKA) WEP encrypted network is much more complex than the commonly used “Open” WEP network. WAIDPS will display error message reporting a possible SKA WEP encrypted access point. An existing legitimate client must be present in-order to obtain the 140 Bytes keysteam. User can manually send deauth signal to the AP trying to obtain the keysteam or WAIDPS will automatically attempt to send deauth signal in order to obtain the keysteam. To increase the chances of beating SKA, user can also spoof the existing client MAC address.
Cracking of WPA Encrypted Access Point
In order to crack the WPA encrypted access point, user must first obtain a 4-way handshake between the legitimated client and access point. Similar the WEP cracking, WAIDPS will display the AP information and also allowing user to spoof MAC address before proceeding with the deauthentication of clients to obtain the handshakes.
WAIDPS will attempt to send broadcast deauthentication signal to the Access Point and attempt to detect connected clients. Once client is detected, WAIDPS will then proceed to send deauthentication signal to the specific client MAC address attempting to capture the handshake. Similar to WEP attack, user can display the list of options by pressing on [Enter] during the capturing process.
After sending deauthentication signal to the AP and clients, WAIDPS will detect the present of handshake and list out the detail individually by client MAC. Once a successful handshake is captured, the captured handshake file will be saved to “/SYWorks/Saved/” directory. WAIDPS will then proceed with the cracking of WPA passphase basing on the captured handshake detail.
If the passphase is found in the default dictionary, WAIDPS will then display the cracked passphase and also store into a database for reference.
Cracking of WPA Encrypted Access Point (Manually selecting handshake file)
If any existing handshake was captured on a specific access point, it will show “[Handshake]” directly behind the ESSID on the main auditing screen. User can then select the access point to perform a manual cracking of handshake file using other dictionary.
Customising Dictionary Location
User can specify the location of other dictionaries to be use for cracking by typing “C” – Application Configuration on the WAIDPS main menu, thereafter selecting “9” for Dictionary Detail and Setting.
Cracking of WPS Enabled Access Point
Cracking of WPS enabled access point option is only available for WPA/WPA2 encrypted network since WEP is consider to be easily cracked. Similar to the WEP/WPA cracking, user can enter the list number of the access point or MAC address of the AP (BSSID) to select the target. Options are provided for user to select whether to proceed with “WPS Bruteforce” or “WPA handshake”. Bruteforcing detail will be shown on the screen to enable user have a better analysis of the PIN tried, remain PINs and also other status of the bruteforcing process.
Once the WPS PIN is found, WAIDPS will display the WPS PIN and WPA Passphase of the cracked network and also store the detail into the database for reference.
Cracking of WPS Enabled Access Point (Manually entering PIN)
During the cracking process, user can also manually enter the WPS PIN to try by pressing on [Enter] to display the menu and then “P” to enter the PIN. This is particularly useful when the WPA passphase is changed but not the WPS PIN.
Live Monitoring of Access Point
WAIDPS also provide user with the option to perform a live monitoring of a Access Point to get the activities status of AP and wireless clients associated to the AP. It will display the detail of the detected devices and whether the devices are active or not sending any data. To monitor the specific access point, user can put a “M” infront of the listing number or “M” infront of the BSSID.
Post a Comment