This section covers popular WiFi security tools. Each tool is installed in the lab along with other supporting files/environment.
What will you learn?
Attack automation with wifite
Analyzing traffic on CLI with termshark
WiFi attacks with bettercap and MDK4
Attacking enterprise networks using EAPHammer
Plotting airodump-ng scan results with scan visualizer
References:
Wifite (https://github.com/derv82/wifite)
termshark (https://termshark.io/)
bettercap (https://github.com/bettercap/bettercap)
EAPHammer (https://github.com/s0lst1c3/eaphammer)
Airodump-ng scan visualizer (https://www.pentesteracademy.com/course?id=18)
Labs Covered:
In this lab, you will learn to use the Wifite to automatically attack a WPA2-PSKprotected WiFi network and recover its secret passphrase.
In this lab, you will learn to use the Termshark TUI (terminal UI) tool to open a PCAP file and check/analyze the captured packets.
In this lab, you will learn to use the Bettercap tool to open a PCAP file and perform WiFi recon to locate nearby WiFi networks/clients.
In this lab, you will learn to use the MDK4 tool to perform beacon flood. As the beacon flood is being performed in an emulated environment, it will need to be verified using airodump-ng.
In this lab, you will learn to use the EAPHammer tool to perform honeypot based attacks on a WPA-Enterprise network, lure a client and steal the user’s credentials.