WiFi Pentesting
Basic tools:
TPLink - WL722N v2/v3
(update driver in kali --> https://www.youtube.com/watch?v=tYnjMiTTdms)
Check the version of WL722N (if you have v2/v3, continue)
└─$ lsusb
Bus 001 Device 003: ID 2357:010c TP-Link TL-WN722N v2/v3 [Realtek RTL8188EUS]Update and Upgrade
sudo apt update
sudo apt upgradeInstall additional tools
sudo apt install bcRestart kali VM
Install additional software
sudo apt install build-essential
sudo apt install libelf-dev
sudo apt install linux-headers-`uname -r`
sudo apt install dkms
sudo rmmod r8188eu.ko
git clone https://github.com/aircrack-ng/rtl8188eus
cd rtl8188eus
sudo -i
echo "blacklist r8188eu" > "/etc/modprobe.d/realtek.conf"Restart kali VM
Install driver
Alfa Network
Check the usb adapter
Update and Upgrade
Install additional tools
Restart kali VM
Install additional software
Then restart.
If it doesn't work, install the driver manually:
Install driver
Restart kali VM
Install the additional driver, make sure that https://github.com/aircrack-ng/rtl8814au.git same as your adapter's chipset.
Unplug and plug again the Alfa adapter
check with this command
iwconfig
Check the adapter
Check Adapater
Setup monitor mode
Kill process
This command stops network managers then kill interfering processes left:
Note: It is very important to kill the network managers before putting a card in monitor mode!
ref: https://www.aircrack-ng.org/doku.php?id=airmon-ng
Monitor mode
Stop monitor mode
If you wanna change to the normal mode
Monitor
Make sure you have been set monitor mode.
Deauth Attack
Open Wireshark and set the filter.
Monitor handshake
Wifite
The simple WiFi Attacking. Could detect active user on the network.
ref: https://www.youtube.com/watch?v=OdFvNLdccWQ
Wifiphisher
Installation
Steps to deliver
WPA2-E phishing
Last updated