Wireless network hacking: Difference between revisions

From OLPC
Jump to navigation Jump to search
No edit summary
No edit summary
Line 15: Line 15:


== Collect Network data ==
== Collect Network data ==
See this:
See these for more info:
http://wiki.laptop.org/go/Wireless_Driver_README

http://wiki.laptop.org/go/88W8388
http://wiki.laptop.org/go/Wireless


== Cracking a WEP key ==
== Cracking a WEP key ==

Revision as of 01:15, 24 February 2008

  Please copy/paste "{{Translationlist | xx | origlang=en | translated={{{translated}}}}}" (where xx is ISO 639 language code for your translation) to Wireless network hacking/translations HowTo [ID# 111454]  +/-  

These techniques describe how to test wireless networks for security holes. It is very important to check if your network is vulnerable.

[[WARNING! The instructions in here are more of a hacker wish list than realistic. The instructions herein will seriosly bloat your system if not careful. In fact there are no indications that the XO WiFi chipset allows for RFMON capability. Could someone check this??]]

Check if the network has some form of security

If you can connect to the access point without any trouble, the network is not secured. Check the instructions at #Security your network.

Install security related software

First, you need to install some tools. Execute the following command in the terminal application:

 sudo yum install wireshark kismet aircrack-ng nessus bind-utils traceroute

Collect Network data

See these for more info: http://wiki.laptop.org/go/Wireless_Driver_README http://wiki.laptop.org/go/88W8388 http://wiki.laptop.org/go/Wireless

Cracking a WEP key

Follow the instructions at this page: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks


TODO: We should write a short distillation of that wiki here.

Cracking a WPA key

Execute the following command in the terminal application while there is a client succesfully connected to the wireless access point:

 aireplay -0 5 -a <AP MAC> -c <Client MAC> ath0

Cracking mesh networks

TODO

Securing your network

TODO