WiFi Pentesting

Basic tools:

(update driver in kali --> https://www.youtube.com/watch?v=tYnjMiTTdms)

  1. Check the version of WL722N (if you have v2/v3, continue)

└─$ lsusb               
Bus 001 Device 003: ID 2357:010c TP-Link TL-WN722N v2/v3 [Realtek RTL8188EUS]
  1. Update and Upgrade

sudo apt update
sudo apt upgrade
  1. Install additional tools

sudo apt install bc
  1. Restart kali VM

  2. Install additional software

sudo apt install build-essential
sudo apt install libelf-dev
sudo apt install linux-headers-`uname -r`
sudo apt install dkms


sudo rmmod r8188eu.ko
git clone https://github.com/aircrack-ng/rtl8188eus
cd rtl8188eus
sudo -i
echo "blacklist r8188eu" > "/etc/modprobe.d/realtek.conf"
  1. Restart kali VM

  2. Install driver

Alfa Network

  1. Check the usb adapter

  1. Update and Upgrade

  1. Install additional tools

  2. Restart kali VM

  3. Install additional software

Then restart.

If it doesn't work, install the driver manually:

  1. Install driver

  1. Restart kali VM

  2. Install the additional driver, make sure that https://github.com/aircrack-ng/rtl8814au.git same as your adapter's chipset.

  1. Unplug and plug again the Alfa adapter

  2. check with this command iwconfig

Check the adapter

Check Adapater

Setup monitor mode

Kill process

This command stops network managers then kill interfering processes left:

Note: It is very important to kill the network managers before putting a card in monitor mode!

ref: https://www.aircrack-ng.org/doku.php?id=airmon-ng

Monitor mode

Stop monitor mode

If you wanna change to the normal mode

Monitor

Make sure you have been set monitor mode.

Deauth Attack

Open Wireshark and set the filter.

Monitor handshake

Wifite

The simple WiFi Attacking. Could detect active user on the network.

ref: https://www.youtube.com/watch?v=OdFvNLdccWQ

Wifiphisher

Installation

Steps to deliver

WPA2-E phishing

Last updated