top of page

Wi-fi Hacking

Understanding and securing Wi-Fi networks has become a crucial aspect of cybersecurity. Whether you are an aspiring ethical hacker, a network administrator, or a tech enthusiast, gaining a solid foundation in Wi-Fi penetration testing is essential for safeguarding your digital environment.

Wi-fi Hacking Medium Level -
EVIL TWIN ATTACKS

Module 1 - WPS Reconnaissance

VirtualLabsLogo1.png

In order to analyze a target network, we need to view its WPS information.

Scanning WPS Networks with Airodump-ng

Scanning WPS Networks with Wash

Module 2 - Online PIN Brute-Forcing Using Reaver

VirtualLabsLogo1.png

Reaver is an excellent tool for conducting online password cracking attempts.

Brute-forcing WPS PIN

Bruteforcing using half known WPS PIN

Testing for Null PIN

Retrieving WPA-PSK using Reaver with a Known PIN

Module 3 - Secured Access Points

VirtualLabsLogo1.png

Traditionally, online brute-forcing attempts have been utilized in retrieving the WPS PIN and WPA-PSK. However, in recent years, manufacturers have become wiser to these attacks. As such, locking has been utilized to prevent these traditional bruteforcing techniques. The most recent vendors only allow up to 3 incorrect attempts. After each incorrect attempt, the AP will lock for 60 seconds. After 10 incorrect attempts, the AP will lock for 365 days.

Module 4 - Using Multiple Pre-defined PINs

VirtualLabsLogo1.png

While it is possible to bruteforce the WPS PIN using Reaver, we can also use a custom wordlist of potential PINs.

Using Python WPSPin to Generate Default PINs

Performing Vendor Lookup

Module 5 - PIN Generation Tools

VirtualLabsLogo1.png

When crafting an online brute-forcing attempt, it can be cumbersome to guess all 11,000 possible PINs especially considering most access points are utilizing default PINs.

Using the Vodafone EasyBox Default WPS Pin Algorithm

Using WPS-PIN to Generate Default PIN

Using Naranja MekaniK (nmk) to generate WPS PIN

Module 6 - Pixie Dust Attack

VirtualLabsLogo1.png

The Pixie Dust Attack is a well-known method for exploiting vulnerabilities in the WPS (Wi-Fi Protected Setup) protocol, used to retrieve the WPA/WPA2 pre-shared key (PSK) from a target wireless network.

Using Reaver

Using Oneshot

Module 7 - Push Button Configuration

VirtualLabsLogo1.png

Push Button Configuration (PBC) is a simple and user-friendly method for connecting devices to a wireless network using Wi-Fi Protected Setup (WPS).

Enumeration

Using wpa_cli

Using Oneshot

Legal Disclaimer

Designer.jpeg

Disclaimer

All the techniques provided in the tutorials on www.lyonnfiurex.com are solely for educational purposes. All techniques taught here are only meant to be used in a closed laboratory environment or with consent from a second or third party. If you are using any of those techniques for illegal purposes, Lyon & Fiurex LLC Group can’t be held responsible for possible lawful consequences.

Any actions or activities related to the material within www.lyonnfiurex.com are solely your responsibility. If you misuse this information for illegal activities, criminal charges may be brought against your person.

The content on www.lyonnfiurex.com can be potentially damaging and or dangerous if misused. DO NOT, NEVER try any of the techniques you learned on www.lyonnfiurex.com without consent of the second/third party.

Lyon & Fiurex LLC Group is not accountable for the use of the information provided in our courses, which are solely for educational purposes.

Next level...

Wi-fi Medium Level

bottom of page