Installing and Configuring Kali Linux [2018 Update]

[RWSPS] -Rootsh3ll Wireless Security and Pentesting Series- ch1pt2

In the previous post i.e Chapter 1: Part 1, we learned

  • Hardware/Software requirements of the series
  • How to install Kali Linux in a VMWare Workstation(Virtual machine), and
  • Setting up and configuring Alfa card (Wireless adapter) in Kali Linux

We will cover the remaining of Chapter 1 in this post.
[ Continue reading ... ]

Evil Twin Attack (A Step by Step Guide)

Rogue Access Point - Kali Linux

“A Fake WiFi access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.” – Wikipedia

Fake WiFi access point is often called as:

 

Using this method it is possible to retrieve the WPA/2 passphrase in clear-text within minutes.
[ Continue reading ... ]

Automated WiFi Cracking

Wifite is a Linux based WiFi cracking tool (comes pre-installed on Kali) coded in Python. It is used to automate the hacking process and aims at minimizing the user inputs by scanning and using Python for automation techniques. Wifite is capable of Hacking WEP, WPA/2 and WPS, but not alone.
[ Continue reading ... ]

Post Exploiting The Network [ch6]

rwsps-post-exploiting-the-network-sniffing-ettercap-nmap-aireplay-ng-logo

So far in the WiFi Security and Pentesting Series we have learned to

  1. Crack WEP Using aircrack-ng suite of tools
  2. Crack the WPA/2 passphrase using Aircrack-NG
  3. Speed Up WPA/2 Cracking with Hashcat
  4. Automate WiFi Cracking

Now considering that we are into a network it is important to learn a few thing that we can do to start our penetration testing within the scope of a network.
[ Continue reading ... ]

WPA2 Cracking Using HashCat [ch5pt2]

rwsps-gpu-accelerate-cracking-wpa2-passwords-with-hashcat-cloud-ch5pt2

If you remember in the previous part, we learned Speeding up WPA2 Cracking Using Pre-generated PMKs. Which certainly uses CPU as the primary part for the calculations of the PMKs. It surely gives us speed for WPA2 cracking as while using PMKs for cracking we are not performing actual calculations in real-time.
[ Continue reading ... ]

Crack WPA2-PSK Using Pre generated PMKs [ch5pt1]

rootsh3ll-speed-up-wpa-psk-cracking-with-pregenerated-pmk-cowpatty-pyrit-rwsps

If you are following the series from the very beginning you must be familiar with the Handshake we captured and used it with a Wordlist to crack the WPA2-PSK. As there is a tremendous possibility for WPA2 passphrases as they can be AlphaNumeric including special characters that too with 8-63 characters long.
[ Continue reading ... ]