Hacking A Home Wireless Network

Adrian Jenkins
2 min readNov 7, 2024

--

Wireless Networks Recap

  • The scope of this guide is to hack a Wi-Fi Network that is using WPA2-PSK.
  • Security protocols to protect Wireless Networks (not exhaustive list…):
  • Wi-Fi Protected Access (WPA): uses Temporal Key Integrity Protocol (TKIM) with RC4.
  • Wi-Fi Protected Access 2(WPA2): uses AES CCMP
  • Wi-Fi Protected Access 3 (WPA3): major change is that it uses the Simultaneous Authentication of Equals Handshake (aka Dragonfly) for key exchange.
  • We are interested in WPA and WPA2 because both uses the 4-way handshake to exchange keys and this is where we go in and crack the password.
  • WPA2 comes in two modes:
  • WPA2-PSK (Personal)
  • WPA2-MGT (Enterprise)
  • Our focus is with WPA-PSK. Enterprise works in a different manner.
  • “PSK” stands for Pre-Shared Key.

Open System Authentication (OSA)

  • Ever wonder how devices are able to connect to a Wireless Network?
  • Well, the standard 802.11 defines two authentication methods to join a Wireless Network.
  • Open System Authentication.
  • Shared Key Authentication.
  • When you go to a coffee shop and join its Wireless Network, Open System Authentication is most probably the authentication method being used.
  • You connect without the need to provide any type of password. Provided there are no captive portals, you simply connect and can browse the Internet.
  • So, OSA offers open authentication to a Wireless Network.
  • If the Wireless Network requires WPA2 encryption, this will happen after the OSA.
  • OSA follows the following process:
  1. Client sends “Authentication Request”.
  2. Access Point (AP) replies with “Authentication Response”.
  3. Client sends “Association Request”.
  4. AP replies with “Association Response”.

--

--

No responses yet