WMSS Documentation Full
WMSS Documentation Full
WMSS Documentation Full
1. Introduction..............................................................................................................................4
4.1. Jamming..........................................................................................................................12
4.1.1. Introduction..............................................................................................................12
References......................................................................................................................................17
1. Active Network Scanning in Wireless Local Area Network (Witchen Hendry TP030952). 18
1.1. Introduction.....................................................................................................................18
1.2. Hypothesis.......................................................................................................................18
1.3. Aim..................................................................................................................................19
1.11. Evaluation....................................................................................................................31
1.13. Conclusion...................................................................................................................32
1.14. References...................................................................................................................33
2. Cracking home router Wi-Fi password with Fluxion (Fawwas Hamdi TP034298)..............34
2.1. Introduction.....................................................................................................................34
2.2. Hypothesis.......................................................................................................................35
2.3. Aim..................................................................................................................................35
2.4. Objective.........................................................................................................................35
2.5. Tools................................................................................................................................36
2.5.1. Hardware..................................................................................................................36
2.5.2. Software...................................................................................................................36
2.7. Demonstration.................................................................................................................39
2.8. Evaluation.......................................................................................................................48
2.10. References...................................................................................................................53
3.1. Introduction.....................................................................................................................54
3.4. Hypothesis.......................................................................................................................57
3.5. Tools................................................................................................................................57
3.7. Demonstration.................................................................................................................58
3.9. References.......................................................................................................................65
4. Cracking home router Wi-Fi password with Dictionary Attack (Yanto TP032242).............66
4.1. Introduction.....................................................................................................................66
4.2. Hypothesis.......................................................................................................................66
4.3. Aim..................................................................................................................................67
4.4. Objectives........................................................................................................................67
4.10. Evaluation....................................................................................................................74
4.12. References...................................................................................................................75
Homedale (Free)
Homedale is a free wireless network analyzer software which provides details like detected
Access Point lists, signal graph and frequency usage. Homedale functionality is almost the same
with Acrylic Wi-Fi, but it has one more feature which is Suggested Channel feature. It also has a
more readable frequency usage chart than the Acrylic.
The above figures show Acrylic Wi-Fi survey results, it shows that there are several access
points found in the 6th floor labs. It also can be seen that several access points having the same
SSID name. In here, the analyst able to gather several SSIDs on the 6 th floor. There are 4 most
found access point which also used as the main access point in APU:
- Visitor@APU
- Wireless@APU
- Staff@APU
- BYOD@APU
The Visitor@APU access points is used for any guest coming to APU, this can be seen that the
security is using open type authentication. Wireless@APU also have the same open
authentication, this is because the real authentication is done after the client connected to the
access point which use student ID and their password. Then for Staff@APU and BYOD@APU,
they use WPA2 authentication mode which requires password upon connecting.
From the above figure, it also can be seen that most of the channels used for data transmission
are channel 2, 6, and 13. This is not the most effective channel allocation, as channel 2 and 6 are
still overlapping.
Based on the above figure from Cisco [CITATION Cis15 \n \l 1033 ], the most effective
channels are 1, 6, and 11. In United States, channel 13 and 14 are not permitted for use. But, in
Asian countries, the channel 13 and 14 is permitted. So, the implementation of APU wireless for
channel 13 is acceptable. While channel 2 access points are recommended to be moved to
channel 1 to prevent interference.
Homedale (Free)
Homedale results also have the same feature with Acrylic Wi-Fi, but it has one more feature
which is Suggested Channel feature. In the above figure, Homedale suggests to use channel
number 10, this is also accepted if the placement of channel become 1, 6, 9/10, 13. Hence there
will be 4 channels usage to prevent single highly used channel. But there still interference
In the implementation of RAP, it can be done by using two kinds of methods that connect the
Access Point directly to the ethernet port on the wired network infrastructure and the other is by
connecting the Wireless device to the Access Point in the scope[ CITATION Kim \l 1033 ].
Based on who is doing RAP implementation then there are generally four types of RAP types as
follows:
For a black hat hacker, network scanning is a very useful technique to gain information about the
network and victim machine. While white hacker need to do network scanning to find possible
vulnerabilities and fix the hole before it is exploited by the wrong person. By doing network
scanning, information like alive host in a local network can be gained. Then by knowing alive
host, it can further scan for open ports. This open ports then can be used to find which service is
running in that port. If that service is vulnerable to any attacks. Then the attacker can directly
send the payload to that service. This will enable the attacker to control the victim machine
[ CITATION Raf15 \l 1033 ].
1.2. Hypothesis
Nowadays, the amount of wireless device is uncountable. it is embedded everywhere like mobile
devices, laptops, smart watch, smart car and even other small device as an Internet of Things
(IOT) appliances. This made wireless hacking is one of the most common attack vector found in
the hacking world. This is also supported by an article from Chickowski [CITATION Chi15 \n \l
1033 ] who state that exploitation of Internet of Things is the third most dangerous attack. These
attacks are possible because the attacker able to scan and found all the alive machine in the
network as stated in the introduction part. This scanning process can be easy, fast and automated
WIRELESS AND MOBILE SECURITY (CT094-3-3-WMSS) 20
by using powerful tool like Nmap. In this paper, the researcher hypothesizes that an attacker can
gain information about the victim network and machine easily by doing network scan, and this
will lead to exploitation. Then the researcher also hypothesizes that if the victim machine able to
defend itself from network scanning and able to become undetectable. The possibility of being
attacked will be lower and the overall number of wireless local area network attacks can be
reduced.
1.3. Aim
This paper will show how an attacker able to scan vulnerable machine in a wireless local area
network by using network scanning technique and ways to prevent it.
1.4. Objectives
- To perform alive host detection on home wireless local area network.
- To perform open port detection for each host.
- To perform vulnerability scanning on each port.
- To analyze the network scanning technique and recommend ways to mitigate that attack.
Figure 11. Nmap Command Options (Target Specification, Host Discovery, Scan Techniques).
Figure 12. Nmap Command Options (Port Specifications, Service Detection, Script Scan, OS Detection).
The above figures show that Windows able to detect 4 hosts successfully because it is in the
local area network, while Kali only detect 1 host which are the host itself. This is due to the
virtualization and the NAT only allow access to the internet but not to the other machine in that
local area network.
The above scanning shows the result of open port with its service, it also has additional
information which is host script information. It shows a more detailed information like Microsoft
SQL Server, NetBIOS name, and SMB security.
1.11. Evaluation
The above demonstration shows that with Nmap, the tester able to scan numerous hosts with its
numerous ports vulnerability in one single command. Even though the result shows that there is
no vulnerable HTTP server in the local area network. It meets the aims and objectives of the
testing. It also proves the hypothesis which show how an attacker able to exploit huge amount of
vulnerable device automatically. As it is caused by their ability in scanning huge amount of
vulnerable device in an easy way.
In this network scanning, the tester is unable to use Nmap in Kali Linux. This is caused by Kali
Linux that run as a virtual environment, this made Nmap unable to reach other machine except
its own host in that local area network.
The above scan demonstration is a success as the Windows operating system is the host
operating system and directly connected to the local area network.
WIRELESS AND MOBILE SECURITY (CT094-3-3-WMSS) 34
1.12. Suggested Solutions and Recommendation
Based on the above Nmap scanning ability, the only way to fully prevent the scanning process is
to block all incoming packets, but this is not a good solution as if the machine is connected to the
internet, it will have opened port. The only best way is to have an Intrusion Detection System
(IDS) or Intrusion Prevention System (IPS) installed. Both tools can detect whether there is
malicious activity like several ports probing activity that originating from the same source of IP
address. Then it is also recommended to set the firewall rule properly so there is no untrusted IP
address trying to access an open port maliciously. While to defend from other network scanners,
it is good to block the ICMP echo request. This is because most of the scanner will use ICMP as
the first move to detect alive hosts.
While the above solution is for defending point of view, Nmap also can be used for penetration
testing. This is to test whether the machine is vulnerable or not, if Nmap can detect any
vulnerability in the existing machine. Then the administrator must update that vulnerable service
as soon as possible to prevent any exploitation.
1.13. Conclusion
To conclude, this active network scanning is useful for checking the vulnerability of a machine.
Administrator able to check whether their local area network is secured or not. If there is any
vulnerability found, the system administrator needs to update the system directly so it will not be
exploited by an attacker. The above testing also show that Nmap is a very powerful tool for
network scanning. It can be used to scan many devices in one single command, while Nmap can
be used for good purpose, it also can be used by wrong person to do malicious things. As a
system security administrator, it is a must for them to learn on how to use Nmap and leverage its
capabilities to find system vulnerabilities and secure it directly.
2.3. Aim
To use Fluxion to conduct the vulnerability testing on the router with the intent to gain the
password of the Wi-Fi and propose a solution to overcome the vulnerability.
2.4. Objective
There are several objectives that the researcher wants to achieve:
1. Figure out how Fluxion able to exploit the vulnerability on the router
2. Obtain the Wi-Fi password using Fluxion with Fake AP
3. To figure out how to prevent the existing problem that arise from the vulnerability testing
process.
1. Asus V551L
6th Gen Intel Core i7-4500 processor
8GB RAM
OS Windows 10
2. TP-LINK TL-WN722N Wi-Fi adapter
Monitor Mode supported
IEEE 802.11n
Suitable for Kali Linux
3. TP-LINK Archer C5
IEEE 802.11 ac/n/g/b/a
Dual Band 2.4GHz/5GHz
2 Antennas
Password: sulsel2017
2.5.2. Software
Virtual machine (VM) is an environment, usually a program or operating system, which is not
physically present but is run in another environment. In this context, the VM is called "guest"
while the environment that runs it is called "host". The basic idea of a virtual machine is to
harvest hardware from one computer (CPU, memory, disk, etc.) to multiple execution
environments, thus creating the illusion that each environment runs its own (separate)
computer[ CITATION vmw17 \l 14345 ]. In this vulnerability testing we will be using VMware
Workstation 12 Player because it is very easy to use and free.
Kali Linux is an open source project that is maintained and funded by Offensive Security, a
provider of world-class information security training and penetration testing services. That all the
2.7. Demonstration
Figure 22 Fluxion
Figure 1 showing that after the ./fluxion command is entered the language selection will be
shown. Select the preferred language to continue.
The network card will be showing after the language selection. If there is no network card
detected fluxion will be terminated.
Figure 3 shown that channel must be selected to search for the targeted Wi-Fi. There are two
option which is All channels specific channels. Select all channels to capture all the Wi-Fi in the
available channels.
Figure 4 showing that all of the Wi-Fi will be shown on the list because of the selection of all
channels.
Figure 5 showing that our target is already scanned, select 80 to continue the process.
The attack option will be listed out after the selection of the target, since the attack will be using
a FakeAP, select number 1 to continue the process.
Figure 7 is showing that where to store the handshake location after being captured.
Select Deauth all (mdk3) to disconnect all of the user inside the network, this mdk3 will make
the user to connect the FakeAP if the victim did not aware for attacking process.
The capturing process is now running, and if the handshake is already captured the handshake
corner will be filled with the handshake value.
Since the attack is using FakeAP the Web interface is needed to make the FakeAP web interface,
so that the victim will able to type the real password to the web interface.
In the victims machine the FakeAP will be detected, and if the victim is not aware of this attack
the victim will chose the FakeAP.
This is the web interface for the FakeAP, here the victim will directly enter the password if they
want to connect to the network.
The handshake that already acquired will be compared to the password that victim entered at the
web interface of FakeAP. If the handshake is match with the password, the password will be
shown like in figure 15.
Perform testing of wireless network systems periodically from vulnerability to various types of
attacks to ensure the network able and effective to minimize attacks and anticipate existence an
illegal user or a wild access point (rogue AP).
Access Point will send a code that tells its whereabouts. The code commonly known as the
Extended Service Set Identifier (ESSID or SSID) is commonly used to call the wireless network.
The function of ESSID is to facilitate the client to know the existence of Access Point. By
default, the SSID of WAP will be broadcasted. This matter will allow users to find the network,
because the SSID will appear in the list of available networks available on the wireless client.
SSID is also a weak point that is often used by the intruders. With ESSID emitted, the intruders
can find out the existence of Access Point for subsequent attacks. If the SSID is turned off, the
user must first know the SSID to connect to the network. If the wireless network is Point-to-
Point or private, you should turn off SSID broadcasting. As a result, each client must be inserted
the SSID manually. Without entering the proper ESSID, the client will not be able to connect to
Access Point.
To protect the internal network cable from the threats coming from the wireless network, need a
wireless DMZ that isolate from the LAN. Meaning is to install a firewall between wireless
network and LAN. If a wireless client requires access to the internal network, it must
authenticate first with a RAS (Remote Access Service) server or using a VPN (Virtual Private
Network).
An Access Point usually has a certain range. On some models usually use a BNC type connector
for the antenna. Access Point which uses this connector is relatively more flexible because you
can replace antenna as needed. A good antenna can provide more coverage far and more focused.
5. Security Awareness
The attacker will not be able to get a password from the network that being hacked, if the user
understands about social engineering. It is very suspicious when you want to re-enter the
password on the fake network, where the victim will be redirected to re-enter through the
browser. It is very important for the user to learn about data security and increase their security
awareness. The last line of defense is the user if the user can not identify the attack characteristic,
then their data is at risk.
3.5. Tools
Hardware
Asus A46C
- Intel® CoreTM i5-3317U
- 4GB RAM, 500GB HDD
- NVIDIA® GeForce GT 635M (2GB VRAM)
Ralink RT2870
- 802.11abgn Long-Range USB Adapter;
- Dual-Band 2.4GHz / 5GHz;
- Speed up to 150Mbps
TP-Link Router – WR886N
-Dual-Band 2.4GHz/5GHz
-Speed up to 450Mbps
3.7. Demonstration
Now we can get to using Reaver. Be sure the terminal window running the “wash” command is
not actively using the wireless USB adapter by pressing CTRL+C inside of it. You can copy and
paste the BSSID.
7. Open new terminal, in this new terminal window run the following command.
reaver -i mon0 -b (Target BSSID) –vv
Aside from it's simple and practical benefit, WIFI networks have more weaknesses than wired
networks. Many wireless service providers such as commercial hotspots, ISPs, Internet cafes,
campuses and offices have begun to utilize WIFI on their respective networks, but very few are
concerned about the security of data communications on the wireless network. This makes the
hackers become interested to explore his ability to perform various illegal activities such as
cracking the WIFI password.
4.2. Hypothesis
Based on occupytheweb [CITATION occ16 \n \l 1033 ], WPA2-PSK system has a weakness
that made the user able to grab the encrypted password when the 4-way handshake is occurring.
This 4-way handshake is done when a client is trying to authenticate their self to the access point.
When the encrypted password is captured, the most common way to crack the password are
either brute force or dictionary attack. In here, it is hypothesized that attacker is always able to
gain the password if the used password is short in combination or using general password. The
stronger the dictionary of the attacker, the possibility of the success attack is higher.
4.4. Objectives
To capture the 4-way handshake of the client and the access point
To crack the captured password by using dictionary attack
4. Check whether the monitor mode is activated by ifconfig command. Below figure shows
that wlan0 has become wlan0mon which mean the wireless card is changed to monitor
mode now.
7. Open new tab and de-authenticate the client so it will try to make new handshake. De-
auth by issuing command aireplay-ng –deauth 100 -a 70:62:B9:E6:30:6A wlan0mon