- BackTrack 5 Wireless Penetration Testing Beginner's Guide
- Vivek Ramachandran
- 579字
- 2021-04-02 18:48:46
Time for action – sniffing data packets for our network
In this exercise, we will learn how to sniff Data packets for a given wireless network. For the sake of simplicity, we will look at packets without any encryption.
Follow these instructions to get started:
- Switch on the access point we had named
Wireless Lab
. Let it remain configured to use no encryption. - We will first need to find the channel on which the
Wireless Lab
access point is running on. To do this, open a terminal and runairodump-ng --bssid 00:21:91:D2:8E:25 mon0
where00:21:91:D2:8E:25
is the MAC address of our access point. Let the program run, and shortly you should see your access point shown on the screen along with the channel it is running on: - We can see from the preceding screenshot that our access point
Wireless Lab
is running on Channel 11. Note that this may be different for your access point. - In order to sniff data packets going to and fro from this access point, we need to lock our wireless card on the same channel that is channel, 11. To do this run the command
iwconfig mon0 channel 11
and then runiwconfig mon0
to verify the same. You should see the valueFrequency: 2.462 GHz
in the output. This corresponds to Channel 11: - Now fire up Wireshark and start sniffing on the
mon0
interface. After Wireshark has started sniffing the packets, apply a filter for thebssid
of our access point as shown next using wlan.bssid == 00:21:91:D2:8E:25 in the filter area. Use the appropriate MAC address for your access point: - In order to see the data packets for our access point, add the following to the filter (wlan.bssid == 00:21:91:d2:8e:25) && (wlan.fc.type_subtype == 0x20). Open your browser on the client laptop and type in the management interface URL of the access point. In my case, as we saw in Chapter 1, it is
http://192.168.0.1
. This will generate data packets that Wireshark will capture: - As you can see, packet sniffing allows us to analyze unencrypted data packets very easily. This is the reason why we need to use encryption in wireless.
What just happened?
We have just sniffed data packets over the air with Wireshark using various filters. As our access point is not using any encryption, we are able to see all the data in plain text. This is a major security issue as anyone within RF range of the access point can see all the packets if he uses a sniffer like Wireshark.
Have a go hero – analyzing data packets
Use Wireshark to analyze the data packets further. You would notice that a DHCP request is made by the client and if a DHCP server is available, it responds with an address. Then you would find ARP packets and other protocol packets on the air. This is a nice and simple way to do passive host discovery on the wireless network. It is important to be able to see a packet trace and reconstruct how applications on the wireless host are communicating with the rest of the network. One of the interesting features Wireshark provides is to "Follow a Stream". This allows you to view multiple packets together, which are part of a TCP exchange, in the same connection.
Also, try logging into gmail.com or any other popular website and analyze the data traffic generated.
We will now see a demonstration of how to inject packets into a wireless network.
- 四時(shí)風(fēng)月繪:國風(fēng)水墨CG插畫繪畫技法
- Hi!扁平化Photoshop扁平化用戶界面設(shè)計(jì)教程
- 從零開始:Flash CS6中文版基礎(chǔ)培訓(xùn)教程
- Illustrator CS6核心應(yīng)用案例教程(全彩慕課版)
- Python Text Processing with NLTK 2.0 Cookbook: LITE
- 平面設(shè)計(jì)綜合教程:Photoshop+Illustrator+CorelDRAW +InDesign(微課版)
- SOLIDWORKS 2021中文版基礎(chǔ)入門一本通
- CAD/CAM軟件應(yīng)用技術(shù)
- 板繪教室:SAI零基礎(chǔ)日系動(dòng)漫插畫入門教程
- UI功夫:PC和APP界面設(shè)計(jì)全流程圖解
- 中文版3ds Max/VRay效果圖制作完全自學(xué)教程(實(shí)例培訓(xùn)教材版)
- ASP.NET Core 3從入門到實(shí)戰(zhàn)
- Altium Designer 21 PCB設(shè)計(jì)官方指南(高級(jí)實(shí)戰(zhàn))
- 從零開始:Indesign CC 2019設(shè)計(jì)基礎(chǔ)+商業(yè)設(shè)計(jì)實(shí)戰(zhàn)
- 中文版InDesign CC平面排版設(shè)計(jì)從入門到精通