Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Practice the following commands GETMAC / V netsh wlan show profiles netsh wlan show profiles name = SSIDNAME key = clear / / reveals the

Practice the following commands
GETMAC/V
netsh wlan show profiles
netsh wlan show profiles name=SSIDNAME key=clear // reveals the key
netsh wlan set profileparameter name=SSIDName connectionkmode=manual //
removes the automatica
Part 5: Escaping MAC Filtering [15 points]
Implement the following scenario, on your AP
a. Turn on MAC white listing
See below example, this will depend on your AP type
b. In your settings, assume you have some phone, and it is whitelisted
c. Test that whitelisting is working by trying to connect from your laptop, it
should not be able to connect as it is not whitelisted
d. Use the following command to spoof the MAC of your phone so it can
connect
sudo aireplay-ng --fakeauth 10-a SSIDMAC -h SPOOFEDMAC wlan0 e. Verify that has been connected by listing the associate devices
Part 6: Cracking WEP Security [15 points]
A video will be posted on this.
Part 7: Cracking WPA Security [Bonus 20 points]
A video will be posted on this.look for management frames for that AP
search by filter (wlan.fc.type_subtype ==0 x0008) && (wlan.bssid == its MAC address)
this will get the beacon frames
go back to our class slides, and look for each type of frame by its subtype, make sure to
take screenshots, show the access point and/or the station information
Part 3: WiFi Important Commands and Revealing Hidden SSID [20 points]
Practice the following commands
#ifconfig wlan0 down (shuts down the WiFi)
#ifconfig wlan0 up (brings it back up)
#iwconfig wlan0 channel 11
(sets it to that channel and its corresponding frequency)
#ifconfig wlan0 txpower 30(change the power, depending the card)
Implement the following scenario, on your AP, enable SSID hiding
a. Turn on packet sniffing
b. Allow some device to connect to the AP while you are sniffing the packets
c. Stop packet sniffing
d. Open using wireshark, look for the probe response for that authentication,
it should show the SSID name
Notice, instead of waiting for them to authenticate, you can force them to disconnect
and reconnect by using the following packet injection command
#aireplay-ng --deauth 4 wlan0-a SSIDMAC
windows
netsh wlan show profiles
netsh wlan show profiles name=Main11 key=clear // reveals the key
netsh wlan set profileparameter name=SSIDName connectionkmode=manual //
removes the automatica
#macchanger -r eth0// gives your card a fake mac for some time until you
reboot or shut down the card again
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Successful Keyword Searching Initiating Research On Popular Topics Using Electronic Databases

Authors: Randall MacDonald, Susan MacDonald

1st Edition

0313306761, 978-0313306761

More Books

Students also viewed these Databases questions