- WiFi Exploitation Framework (GitHub)
For other wireless technologies, see Bluetooth, Long-term evolution (LTE), and Zigbee.
Before Starting
Setup Wireless in Kali Linux
A USB Wireless adapter is required to inject packets. It does not work within a virtual machine.
Check for supported chipset: AWUS036NH, AWUS036NEH, AWUS051NH v2, AWUS052NH, AWUS036ACM, Tube-UN, UBDo-25, UBDo-n Mac OS X 10.13 driver.
Check if the adapter is recognized by Kali (usually wlan1)
Tested with Alfa AWUS036NEH (worked)
ifconfig
iwconfig
Turn the wireless card into monitoring mode
List networks / hidden networks
- airodump-ng
- Connect to a hidden Wifi network
KRACK Attack
- KRACK Attack – crack WPA/WPA2
Capture the 4-way handshake
- Wifite
- besside-ng
- aireplay-ng – deauthenticate clients to capture handshake
Crack Wifi passwords
Decrypt WEP/WPA/WAPA2 capture files
Configure fake access points
- airbase-ng
- Wifi Pineapple – can force everyone to connect to the device
Extract Wifi Password
From a compromised computer, find wifi name and then extract the password in clear text. It can also be done via the GUI.
netsh wlan show profiles
netsh wlan show profiles name="wifi name" key=clear