Hacking
A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Copyright 2019 Peter Bradley - All rights reserved.
The contents of this book may not be reproduced, duplicated or transmitted without direct written permission from the author.
Under no circumstances will any legal responsibility or blame be held against the publisher for any reparation, damages, or monetary loss due to the information herein, either directly or indirectly.
Legal Notice:
You cannot amend, distribute, sell, use, quote or paraphrase any part or the content within this book without the consent of the author.
Disclaimer Notice:
Please note the information contained within this document is for educational and entertainment purposes only. No warranties of any kind are expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice. Please consult a licensed professional before attempting any techniques outlined in this book.
By reading this document, the reader agrees that under no circumstances are the author responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, errors, omissions, or inaccuracies.
Table of Contents
Introduction
Today we live in a digital, wireless world, a connected world and, while this has a ton of benefits, it has its downsides too. Everywhere you go, there are Wi-Fi hotspots and Wi-Fi networks, all making it so easy to connect and do our work or have some fun. Unfortunately, its also easy for hackers. How often have you read or heard stories about banks, major companies and government institutions being hacked into, all because their network wasnt fully secured? You would think that, as time went on, we would become better at defending ourselves and our data but, instead, it seems that the opposite has happened the attacks are getting more and more frequent and, frighteningly, far more sophisticated. Why? For two reasons- many people still dont truly understand how to keep their networks secure and the hackers are becoming cleverer.
Thats why I decided to write this book. Your Wi-Fi network is the main port of attack on your system and the best way to understand how to secure it is to understand how the hackers get in. You do that by learning penetration testing. I want you to understand what the wireless network insecurities are and how to carry out your own penetration tests on your own systems so that you can find and plug them.
This is a highly practical book and, to that end, you will need several things:
Kali Linux the most popular platform in the world for penetration testing, with pretty much every tool you need for both security and hacking.
Two laptops, both with Wi-fi cards built-in.
A USB Wi-Fi adaptor
Kali Linux
Other software and hardware, all detailed in the very first chapter.
As this is the second in a book series, you should already be aware of Kali Linux and have a basic understanding of how a wireless network works, including the 802.11 protocol. We will touch on this though, as we go through the setup of your testing lab.
Chapter 1: Setting up Your Wireless Lab
Wireless penetration, hacking your own Wi-Fi network, is not something you can do in five minutes. The first thing we are going to do is build ourselves a wireless lab this is the preparation you need to do before you can dive head-first into real-world testing. This is an almost entirely practical book because that is exactly what wireless penetration testing is. Our lab will help us to try all manner of experiments in a safe environment so get ready to start.
Hardware Requirements
To set up the wireless lab you are going to need the following hardware:
Two laptops, both with built-in Wi-Fi cards. One will be used as the penetration tester and the other as the victim. Most laptops are perfectly fine for this but try to use those that have at least 3 GB RAM much of what you are going to do is quite memory-intensive
A wireless adaptor this is optional and will depend on what your built-in Wi-Fi cards are. If they do NOT have support for packet sniffing and packet injection, youll need an adaptor that does.
An access point you will need an access8 point with support for the WEP, WPA and WPA2 encryption standards. Ill be using a TP-Link TL-WR841N router.
Internet connection you will need this for research, software downloads and for some of the tests.
Hi there! If you found the topic or information useful, it would be a great help if you can leave a quick review on Amazon . Thanks a lot!
Software Requirements
You are going to need this software for use throughout the guide:
Kali Linux download from http://kali.org
Windows XP through 10, whatever you are using, installed on one laptop which will be the victim
Note
We are using Windows for this, but any of the techniques we will be looking at can be used on any device that is Wi-Fi capable, including tablets and smartphones.
Lets Install Kali
The first step is to get Kali up and running and well be doing that on the second laptop, the penetration tester machine. Its easy enough to do; well boot Kali as a live DVD and install it on the laptop hard drive.
- Get yourself a bootable DVD
- Download Kali and burn it to the DVD
- Shut your laptop down and then boot it using the DVD
- From the boot menu, click on Install
This is a pretty straightforward GUI installer so choose the right options for the system on each screen and get the installation started. When prompted, reboot your laptop and take the DVD out.
You will see a login screen; type root as the user name and whatever password you set when you went through the earlier screens. You are now logged into Kali.
Set Up the Access Point
The next step is to set up our access point. Use whatever access point you want; as I said, I'm using the TP-Link TLWR841N router, but the operation and use principles are pretty much the same for all of them.
Lets start by setting it to use OAuth, or Open Authentication and set the SSID as Wireless Lab.
- Turn on your access point and connect it to your laptop with an ethernet cable.
- Open your browser and type in the access point IP address. The default for TP-Link routers is 192.168.1.1 but check the setup guide for yours. If you cant find the IP address, open your command window and type in route n look for the gateway IP address and type this into the browser and the access point configuration portal will open.
- Login and have a look through the options; look for those for SSID configuration
- Change the SSID to read Wireless Lab and if necessary, reboot the access point.
- Look for the Wireless Security settings and change to Disable Security, thus setting it to Open Authentication.
- Save all the changes and reboot the access point it's now running with an SSID of Wireless Lab.
It is important to realize that, by configuring the access point to OAuth, we have set it as the least secure. For now, do NOT connect it to the internet otherwise if there is anyone within radio frequency (RF) range, they can access the internet via your access point.
The Wireless Card
Next is the wireless adaptor and this is a lot easier to do. The wireless card is supported out of the box by Kali and has all the drivers you need for packet sniffing and injection.
The wireless adaptor will be used with the penetration tester laptop:
- Connect the card in a USB port on the laptop and boot it up. Login and open a command window. Type in iwconfig in the console and you should see wlan0 as the interface for the adaptor.
Next page