1. The tortuous path of WIFI security

0 25
1. The tortuous path of WIFI securityThe current mainstream way of Wi-Fi hacking...

1. The tortuous path of WIFI security


The current mainstream way of Wi-Fi hacking is generally divided into four types:

1. Develop personal charm and knock on the door to ask (this handsome man knows that his personal charm is too strong, afraid that the girl on the floor will fall in love with him, so I decided to give up)

2. Download the WIFI universal key, see if anyone has uploaded it to the server.

3. Run handshake packet

4. Run PIN code

Based on difficulty and priority, I downloaded several universal WIFI keys, but failed. It's impossible to go to the door to ask, it's impossible in a lifetime, and the remaining running PIN code feels inefficient, so I decided to run handshake packets.

1.1 Run handshake packets

Running handshake packets first choose Kali, using Windows to set up the environment in the case of network disconnection is really explosive, after contributing 20G traffic to Windows automatic updates, I decided to give up.

Open Kali, find the wireless network card that has been dusty for a long time, and start working in the cold.

Wake up the wireless network card

Wake up the wireless network card

ifconfig wlan0 up

Turn on listening mode

airmon-ng start wlan0

Scan frequency band

airodump-ng wlan0mon

Try to find nodes with active users under WIFI (here expand, if there are no users under WIFI at this time, can it be determined that there is no one in the house, multiple observations can come up with the regularity of the passage under WIFI, which is conducive to 'Guerrilla')

airodump-ng -c 频段 --bssid MAC地址 -w /dev/null

1610000770_5ff6a9821eeec54e5c1e9.png!small

Find the WIFI with active users, carry out deauthentication attacks on active users, let them reconnect, so that handshake packets can be captured.

airodump-ng -c 频段 --bssid MAC地址 -w a.pac # Continuous packet captureaireplay-ng -0 10 -a wifimac -c 用户mac wlan0mon # Cancel authentication attack

When the command line appears WPA handshake:XXXXXX, it means that the handshake packet has been successfully captured, and the packet capture can be stopped, and the pac file can be exported.

1.2 Crack the password


Windows can use EWSA, with graphical operations, but it is a bit slow, so we choose hashcat here, first converting the cap package to the hccapx package that hashcat can recognize through the official website.

Website: https://hashcat.net/cap2hccapx/

hashcat runs, first run pure numbers, because the WIFI password must be at least 8 digits, so it is generally very difficult to run. Brute force cracking generally recommends starting with numbers, from 8 digits to 11 digits

hashcat.exe -m 2500 -a3 a.hccapx ?d?d?d?d?d?d?d?d

Running the full character generally can say goodbye to broken WIFI

1610000823_5ff6a9b71b4898792cd0b.png!small

After persistent efforts and running all night, I finally found out that the password is the phone number.

2. Wireless relay was discovered


Since the password has been leaked, of course, I will use my Phicomm K2 wireless relay to surf the internet happily. After a pleasant night, I found that my MAC was blacklisted early in the morning!!! The user downstairs even manages his own WIFI. Adhering to the principle of not抢权限, I was offline all day, and then at midnight, I picked up my computer to continue trying to connect to that WiFi, and found that the password had not changed, and I logged into the gateway through the password. I found that my device was indeed blacklisted.

1610000838_5ff6a9c656b763d418bc2.png!small

1610000849_5ff6a9d18fdf05fd67d91.png!small

They have changed the device name to Xiaomi Smart Device and still blacklisted me, it seems that the person above is a master. Through investigation, it was found that a certain 60 router has a new device reminder feature, and it is possible that an intelligent speaker has been connected, which will report by voice when connected. Since there is a reminder feature, it is very likely that my computer will also be blacklisted the next day. Just when I was about to give up, I found that this router has relay function and has SSH login function.

3. Relay relay relay


Since I can't connect to the opposite hot spot, why not let the opposite connect to us? Let's get to work, after a series of attempts, it was found that the opposite router does not alarm when connecting to my router. The topology is as follows.

1610000865_5ff6a9e1d8e7d220de05d.png!small

Then, through router configuration, turn off the internal network isolation, so that I can be in the same internal network as the opposite router. This way, I can connect to the opposite SSH and surf the internet through SSH proxy. (The opposite router has two ways to access the internet after wireless relay, one is the WAN port, and the other is the relay port. The opposite router should choose the WAN port for internet access; if you choose the wrong one, the internet connection will be disconnected

1610000881_5ff6a9f1caf33c828d56b.png!small

SSH proxy configuration

ssh -D 1080 -q -C -N user@ip

This way, I can open a SOCKS5 proxy on my local PC's port 1080, and then turn off the PC firewall settings, allowing the router to connect to the PC's port 1080.

Set up proxy internet access in the router configuration, set it to the IP and port of the PC. This way, you can enjoy the internet.啦啦啦啦啦啦啦啦

At the end: Unfortunately, the router itself does not have SSH functionality, so the PC is not needed. Originally, I wanted to compile one and upload it for use, but alas, the eggshell annual payment refugee has been swept out by the landlord, waaaaa!!!!

你可能想看:
最后修改时间:
admin
上一篇 2025年03月25日 09:31
下一篇 2025年03月25日 09:54

评论已关闭