Penetration Testing: Wireless Network Attacks Method on Kali Linux OS
DOI:
https://doi.org/10.25007/ajnu.v10n1a998Keywords:
Wireless Network, Hashcat, Vulnerability Assessment, Kali LinuxAbstract
This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash algorithm and SHA-512 (Linux). In this article, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating wireless attacks and their techniques including several methods on Linux.
Downloads
References
2. Broad J, Bindner A, Hacking with Kali – Practical Penetration Testing Techniques, Elsevier, 2014., ISBN: 978-0-12-407749-2. Retrieved from: ftp://lab.dnict.vn/1.DNICT/2.Ebooks/books/Hacking%20with%20Kali.pdf.
3. Bradley M, (2017, June 9) An Overview of Wireless Protected Access 2. Retrieved from: https://www.lifewire.com/what-is-wpa2-818352
4. Step By Step Kali Linux and Wireless Hacking Basics-WEP Hacking (2015, May 19). Retrieved from: http://www.wirelesshack.org/step-by-step-kali-linux-and-wireless-hacking-basics-wep-hacking-part-3.html
5. Borges A (2014, February 20), Cracking Wireless Networks. Retrieved from: https://alexandreborgesbrazil.files.wordpress.com/2014/02/cracking_wep_networks1.pdf
6. d'Otreppe T, Introduction to WiFi Security and Aircrack-ng, Wireshark Developer and User Conference-Sharkfest 2012, UC Berkeley, June 24 – 27. 2012. Retrieved from: https://sharkfestus.wireshark.org/sharkfest.12/presentations/MB-Introduction_to_WiFi_Security_and_Aircrack-ng.pdf
7. Sabih Z, Learn Ethical Hacking From Scratch. Retrieved from: https://www.udemy.com/learn-ethical-hackingfrom-scratch/learn/v4/content.
8. Aircrack command series, URL: https://www.aircrack-ng.org/doku.php?id=aircrack-ng#wpa
9. WPS explained, URL: https://www.wi-fi.org/discover-wi-fi/wifi-protected-setup
10. Pixie Dust Attack explained, URL: https://forums.kali.org/showthread.php?24286-WPS-Pixie-DustAttack-(Offline-WPS-Attack)
11. Sak B., Ram J. Mastering Kali Linux Wireless Pentesting, Packt, 2016, ISBN 978-1-78528-556-1, p.p. 97-99, Available from: http://it-ebooks.info/book/1461060711/
12. Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34.
13. Gueron, S., Johnson, S., & Walker, J. (2011, April). SHA-512/256. In 2011 Eighth International Conference on Information Technology: New Generations (pp. 354-358). IEEE.
14. Ramachandran V, Buchanan C, Kali Linux Wireless Penetration Testing Learn to Penetrate Wi-Fi and Wireless Networks to Secure your System from Vulnerabilities, 2nd Edition, Packt Publishing, 2015, ISBN-10: 1783280417
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Renas R. Asaad
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.