Wireless Hacking 101
Karina Astudillo
Translated by Roger
Wireless Hacking 101
Written By Karina Astudillo
Copyright 2017 Karina Astudillo B.
All rights reserved
Distributed by Babelcube, Inc.
www.babelcube.com
Translated by Roger
Cover Design 2017 Bolvar Vite
Babelcube Books and Babelcube are trademarks of Babelcube Inc.
WIRELESS HACKING 101
How to hack WIFI networks easily!
By:
Karina Astudillo B.
https://www.KarinaAstudillo.com
WIRELESS HACKING 101
How to hack WIFI networks easily!
Karina Astudillo B.
https://www.KarinaAstudillo.com
Note: All rights reserved. This publication may not be reproduced in whole or in part or recorded or transmitted by an information retrieval system or any other medium, whether electronic, mechanical, photochemical, magnetic, electronic, by photocopying or by any other means without the prior written permission of the publisher or the rights-holder, except in the case of short quotations included in critical articles or reviews.
All registered trademarks are the property of their respective owners. Instead of placing a trademark after each incidence of a registered trade name, we use names in editorial form only for the benefit of the owner of the trademark, with no intention of infringing the registered trademark. Whenever these designations appear in this book they are capitalized and/or italicized.
The information published in this book is based on published articles and books and on the experience of its author. Its sole purpose is to educate the readers in conducting professional penetration or ethical hacking tests. We accept no liability for effects, results or actions which other people experience or gain from what is discussed here or from the results and information provided in this book or its links.
In the preparation of this book, every effort has been made to guarantee the accuracy of the information presented. However, the information contained in this book is sold without guarantee, either express or implicit. Neither the author nor the publisher, its concessionaires or distributors, will be liable for any damage caused, or for damage presumed to have been caused directly or indirectly by using the information supplied in this book.
Dedication
To God and my family for being my pillars of support and my sources of inspiration.
To my pal, business associate, and my friend, Christian Mendoza, for constantly reminding me what fun the world of cybersecurity is and for encouraging me to involve myself in new projects.
Foreword
Cybersecurity is a topic which went from being practically ignored by most of the population until a couple of decades ago to grabbing the headlines in the leading newspapers and to be the subject of news programs which currently have a wide international audience
But, what gave rise to this change? You do not have to be an expert to reach the conclusion that it is due to the increasing number of attacks made on the Internet for stealing personal information, penetrating residential or corporate networks, extracting confidential information, committing electronic fraud, stealing the identity of third parties, etcetera. But more than anything, it is because we are becoming increasingly dependent on technology.
I still consider myself a young person. What is more, I recall with a certain amount of nostalgia a time when I did not use cell phones and no one would die if they could not contact me. This was a time when, if you wanted to talk to a friend, you went to your friend's house to visit him or her, and the chat was through the IRC channel, which was generally used for discussion groups, not for individual chats with friends because the conventional telephone and visits in person served that purpose.
Today our cell phones are "smart" and the Internet of Things (IoT) is so prolific that now we even have teddy bears connected to the WIFI.
This dependence on technology has created a niche in the market for those who specialize in cybersecurity and in another relatively new area: offensive security.
So, I tell you: know yourself and know your enemy, you can win a hundred battles without a single loss". Sun Tzu (2nd Century A.D.[i]).
Offensive security techniques- also called penetration or ethical hacking tests - make it possible to determine whether our networks are safe from attacks from cyber criminals by subjecting computer systems to the same tests that a cracker would do[ii], but without compromising the availability or causing damage to the information.
For this reason, the penetration tests have been converted to a service which is in high demand from organizations worldwide, and ethical hacking would not be complete if it did not include in its portfolio the option to audit the security of the wireless networks of the client.
In this book, we will be reviewing concepts and techniques for carrying out wireless hacking in an increasingly professional manner and we will also be reviewing recommendations for remediation that will help us improve the security of your home or corporate wireless networks.
The book starts from scratch and is aimed at those who want an initial insight into the interesting subject of wireless hacking.
Subjects covered:
- Introduction to WIFI Hacking
- What Wardriving involves
- Methodology of a WIFI Hack
- Wireless mapping
- Attacks on WIFI networks and clients
- How to overcome control with a MAC
- Attacks on the WEP, WPA, WPA2 protocols
- Attacks on WPS
- Creation of rogue APs
- MITM attacks on wireless clients and data capture
- Deceiving wireless clients into abusing SSL encryption
- Hijacking wireless client sessions
- Defense mechanisms
Subjects NOT covered:
- Windows Basics
- Linux Basics
- Concepts of networks and TCP/IP
- How to conduct the different phases of an ethical non-wireless hack
- How to use vulnerability scanning and analysis tools
- How to use Metasploit and other pentesting frameworks
Disclaimer
In the book, we will be developing workshops to enable us to check the security of our wireless networks and - in many cases - defeat the protection mechanisms.
We supply the information with the intention of enabling the reader to learn how to carry out penetration tests on wireless networks, but always with the proper authorization, that is to say, "ethical" hacking.
Checking that the AP of our neighbor is vulnerable does not give us the right to connect to it without permission: neither the author nor the publisher accepts liability for abuse of the information contained in the workshops or for cases where the reader decides to go over to the dark side of the force.
Table of contents
Chapter 1: Introduction to WIFI Hacking
Next page