Hacking A Home Wireless Network
2 min readNov 7, 2024
- Read full article at: https://jenkins96.github.io/2024-11-07-Hacking-A-Home-Wireless-Network/
- The scope of this guide is to crack the password of a Wireless Network that is using WPA or WPA2-PSK mode.
Wireless Networks Recap
- The scope of this guide is to hack a Wi-Fi Network that is using WPA2-PSK.
- Security protocols to protect Wireless Networks (not exhaustive list…):
- Wi-Fi Protected Access (WPA): uses Temporal Key Integrity Protocol (TKIM) with RC4.
- Wi-Fi Protected Access 2(WPA2): uses AES CCMP
- Wi-Fi Protected Access 3 (WPA3): major change is that it uses the Simultaneous Authentication of Equals Handshake (aka Dragonfly) for key exchange.
- We are interested in WPA and WPA2 because both uses the 4-way handshake to exchange keys and this is where we go in and crack the password.
- WPA2 comes in two modes:
- WPA2-PSK (Personal)
- WPA2-MGT (Enterprise)
- Our focus is with WPA-PSK. Enterprise works in a different manner.
- “PSK” stands for Pre-Shared Key.
Open System Authentication (OSA)
- Ever wonder how devices are able to connect to a Wireless Network?
- Well, the standard 802.11 defines two authentication methods to join a Wireless Network.
- Open System Authentication.
- Shared Key Authentication.
- When you go to a coffee shop and join its Wireless Network, Open System Authentication is most probably the authentication method being used.
- You connect without the need to provide any type of password. Provided there are no captive portals, you simply connect and can browse the Internet.
- So, OSA offers open authentication to a Wireless Network.
- If the Wireless Network requires WPA2 encryption, this will happen after the OSA.
- OSA follows the following process:
- Client sends “Authentication Request”.
- Access Point (AP) replies with “Authentication Response”.
- Client sends “Association Request”.
- AP replies with “Association Response”.
- Read full article at: https://jenkins96.github.io/2024-11-07-Hacking-A-Home-Wireless-Network/