www.it-ebooks.info Kali Linux Wireless Penetration Testing Beginner's Guide Master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran Cameron Buchanan BIRMINGHAM - MUMBAI www.it-ebooks.info Kali Linux Wireless Penetration Testing Beginner's Guide Copyright © 2015 Packt Publishing All rights reserved No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews Every effort has been made in the preparation of this book to ensure the accuracy of the information presented However, the information contained in this book is sold without warranty, either express or implied Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals However, Packt Publishing cannot guarantee the accuracy of this information First published: September 2011 Second edition: March 2015 Production reference: 1230315 Published by Packt Publishing Ltd Livery Place 35 Livery Street Birmingham B3 2PB, UK ISBN 978-1-78328-041-4 www.packtpub.com www.it-ebooks.info Credits Authors Project Coordinator Vivek Ramachandran Harshal Ved Cameron Buchanan Proofreaders Simran Bhogal Reviewer Marco Alamanni Stephen Copestake Commissioning Editor Indexer Erol Staveley Monica Ajmera Mehta Acquisition Editor Production Coordinator Sam Wood Komal Ramchandani Content Development Editor Shubhangi Dhamgaye Cover Work Komal Ramchandani Technical Editor Naveenkumar Jain Copy Editor Rashmi Sawant www.it-ebooks.info About the Authors Vivek Ramachandran has been working on Wi-Fi Security since 2003 He discovered the Caffe Latte attack and also broke WEP Cloaking, a WEP protection schema, publicly in 2007 at DEF CON In 2011, he was the first to demonstrate how malware could use Wi-Fi to create backdoors, worms, and even botnets Earlier, he was one of the programmers of the 802.1x protocol and Port Security in Cisco's 6500 Catalyst series of switches and was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants He is best known in the hacker community as the founder of SecurityTube.net, where he routinely posts videos on Wi-Fi Security, assembly language, exploitation techniques, and so on SecurityTube.net receives over 100,000 unique visitors a month Vivek's work on wireless security has been quoted in BBC Online, InfoWorld, MacWorld, The Register, IT World Canada, and so on This year, he will speak or train at a number of security conferences, including Blackhat, Defcon, Hacktivity, 44con, HITB-ML, BruCON Derbycon, Hashdays, SecurityZone, SecurityByte, and so on I would like to thank my lovely wife for all her help and support during the book-writing process I would also like to thank my parents, grandparents, and sister for believing in me and encouraging me for all these years, and last but not least, I would like to thank all the users of SecurityTube.net who have always been behind me and supporting all my work You guys rock! Cameron Buchanan is a penetration tester by trade and a writer in his spare time He has performed penetration tests around the world for a variety of clients across many industries Previously, he was a member of the RAF He enjoys doing stupid things, such as trying to make things fly, getting electrocuted, and dunking himself in freezing cold water in his spare time He is married and lives in London www.it-ebooks.info About the Reviewer Marco Alamanni has professional experience working as a Linux system administrator and information security administrator, in banks and financial institutions, in Italy and Peru He holds a BSc degree in computer science and an MSc degree in information security His interests in information technology include ethical hacking, digital forensics, malware analysis, Linux, and programming, among others He also collaborates with IT magazines, writing articles about Linux and IT security I'd like to thank my family and Packt Publishing for giving me the opportunity to review this book www.it-ebooks.info www.PacktPub.com Support files, eBooks, discount offers, and more For support files and downloads related to your book, please visit www.PacktPub.com Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and, as a print book customer, you are entitled to a discount on the eBook copy Get in touch with us at service@packtpub.com for more details At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks TM https://www2.packtpub.com/books/subscription/packtlib Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library Here, you can search, access, and read Packt's entire library of books Why subscribe? Fully searchable across every book published by Packt Copy and paste, print, and bookmark content On demand and accessible via a web browser Free access for Packt account holders If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view entirely free books Simply use your login credentials for immediate access www.it-ebooks.info Disclaimer The content within this book is for educational purposes only It is designed to help users test their own system against information security threats and protect their IT infrastructure from similar attacks Packt Publishing and the author of this book take no responsibility for actions resulting from the inappropriate usage of learning material contained within this book www.it-ebooks.info www.it-ebooks.info Table of Contents Preface v Chapter 1: Wireless Lab Setup Hardware requirements Software requirements Installing Kali Time for action – installing Kali Setting up the access point Time for action – configuring the access point Setting up the wireless card Time for action – configuring your wireless card Connecting to the access point Time for action – configuring your wireless card Summary 12 Chapter 2: WLAN and its Inherent Insecurities Revisiting WLAN frames Time for action – creating a monitor mode interface Time for action – sniffing wireless packets Time for action – viewing management, control, and data frames Time for action – sniffing data packets for our network Time for action – packet injection Important note on WLAN sniffing and injection Time for action – experimenting with your adapter The role of regulatory domains in wireless Time for action – experimenting with your adapter Summary [i] www.it-ebooks.info 13 14 16 19 22 26 28 29 29 31 31 36 .. .Kali Linux Wireless Penetration Testing Beginner's Guide Master wireless testing techniques to survey and attack wireless networks with Kali Linux Vivek Ramachandran... securing wireless networks in a robust and fool proof way Kali Linux Wireless Penetration Testing Beginner's Guide is aimed at helping the reader understand the insecurities associated with wireless. .. penetration testing? ??Planning, Discovery, Attack and Reporting, and apply it to wireless penetration testing We will also understand how to propose recommendations and best practices after a wireless