top of page

Wi-fi Hacking

Understanding and securing Wi-Fi networks has become a crucial aspect of cybersecurity. Whether you are an aspiring ethical hacker, a network administrator, or a tech enthusiast, gaining a solid foundation in Wi-Fi penetration testing is essential for safeguarding your digital environment.

Wi-fi Hacking Medium Level -
WEP ATTACKS

Module 1 - Initialisation Vector with Wireshark

VirtualLabsLogo1.png

In this section, we will explore how the Integrity Check Value (ICV) and Initialization Vector (IV) can be acquired using the Aircrack suite. We do so by listening to communications between the target access point and connected stations. The traffic will be output to a capture file, which we can open with Wireshark.

Let's begin by listing the available wireless interfaces on our attack host.

Module 2 - ARP Request Replay Attack

VirtualLabsLogo1.png

The classic ARP Request Replay Attack is a highly effective and reliable method for generating new initialization vectors (IVs).

Monitor mode

Performing the Attack

Module 3 - Fragmentation Attack

VirtualLabsLogo1.png

For an ARP request replay attack, capturing a valid ARP request (broadcast request) in the network is essential.

Monitor mode

Performing the attack

Module 4 - Korek Chop Chop Attack

VirtualLabsLogo1.png

Not all access points (APs) are equal. During an assessment, we may find some are more vulnerable to fragmentation than others.

Monitor mode

Performing the attack

Module 5 - Cafe Latte Attack

VirtualLabsLogo1.png

Cafe Latte attack exploits how WEP clients handle reauthentication requests, enabling attackers to generate traffic and capture enough IVs to crack the WEP key without requiring traffic from the AP.

Monitor mode

Performing the attack

Module 6 - Attacking WEP Access Points Without Clients

VirtualLabsLogo1.png

Suppose our target network does not have any wireless clients connected and there are no ARP requests coming from any Ethernet-connected stations. In this scenario, we can perform a special Fragmentation or KoreK chop chop attack in combination with fake authentication.

Performing the attack

Module 7 - WEP Cracking

VirtualLabsLogo1.png

We’ll explore how to perform a mostly-offline dictionary attack with Python, requiring minimal captured data.

Aircrack-ng Benchmark

Korek WEP Cracking

Bruteforce WEP cracking

Legal Disclaimer

Designer.jpeg

Disclaimer

All the techniques provided in the tutorials on www.lyonnfiurex.com are solely for educational purposes. All techniques taught here are only meant to be used in a closed laboratory environment or with consent from a second or third party. If you are using any of those techniques for illegal purposes, Lyon & Fiurex LLC Group can’t be held responsible for possible lawful consequences.

Any actions or activities related to the material within www.lyonnfiurex.com are solely your responsibility. If you misuse this information for illegal activities, criminal charges may be brought against your person.

The content on www.lyonnfiurex.com can be potentially damaging and or dangerous if misused. DO NOT, NEVER try any of the techniques you learned on www.lyonnfiurex.com without consent of the second/third party.

Lyon & Fiurex LLC Group is not accountable for the use of the information provided in our courses, which are solely for educational purposes.

Next level...

Wi-fi Medium Level

bottom of page