Skip to content

In this project I will be demonstrating a Network Attack with my home wifi; the intruder will find my network, gain access, scan my local devices, and start tapping the outbound traffic of a target device through ARP Poisoning.

Notifications You must be signed in to change notification settings

Danielmolina5/-WiFi-Network-Attack-Intrusion-Reconnaissance-Monitoring

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

-WiFi-Network-Attack-Intrusion-Reconnaissance-Monitoring

Project Overview In this project I will be demonstrating a Network Attack with my home wifi; the intruder will find my network, gain access, scan my local devices, and start tapping the outbound traffic of a target device through ARP Poisoning.

  1. Setup For this project I will be using Parrot OS combined with a network adapter and the tools below.

airodump-ng aireplay-ng hashcat nmap ettercap wireshark

  1. Reconnaissance

Set the adapter in monitor mode and use airodump-ng to monitor networks within range. Target a network and get their BSSID and operating channel. Use airodump to associate clients with a given access point, get the client MAC address, and set a dumpfile to start collecting their network traffic/comms.

Screenshot 2024-09-09 at 11 13 55 AM Screenshot 2024-09-09 at 11 14 41 AM
  1. De-authentication Attack use aireplay-ng to target a client, and send deauthentication packets to disassociate them with the AP, knocking them off the network.
Screenshot 2024-09-09 at 11 16 34 AM
  1. Capture EAPOL Handshake As the device reconnects to their trusted network, airodump will capture the WPA handshake between the client and the AP; you can verify all parts of the EAPOL message in Wireshark.
Screenshot 2024-09-09 at 11 17 27 AM Screenshot 2024-09-09 at 11 17 51 AM
  1. Hashcat Password Attack Convert the file to be used with hashcat, and use a dictionary attack with a well known wordlist 'rockyou', combined with a rule list 'best64'. Weak or previously breached passwords will be cracked, and written out with the associated hash.
Screenshot 2024-09-09 at 11 19 30 AM Screenshot 2024-09-09 at 11 19 51 AM
  1. Reconnaissance Access the network with the cracked password, run ifconfig to get local IP, use nmap to scan the network. nmap can be used to scan for vulnerabilities, scan hosts, and choose a weak target.
Screenshot 2024-09-09 at 11 22 19 AM
  1. Arp Poisoning, MiTM Use ettercap to create a man-in-the-middle attack, I am now sitting inbetween the router and the client, secretly forwarding & capturing the traffic.
Screenshot 2024-09-09 at 11 24 16 AM
  1. Packet Analysis Wireshark can be used for detailed packet capture and packet analysis. online tools can be used to analyze .pcap for ease of use.
Screenshot 2024-09-09 at 11 25 43 AM Screenshot 2024-09-09 at 11 26 28 AM Screenshot 2024-09-09 at 11 26 46 AM

About

In this project I will be demonstrating a Network Attack with my home wifi; the intruder will find my network, gain access, scan my local devices, and start tapping the outbound traffic of a target device through ARP Poisoning.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published