After we had figured out where we would start digging for information, we spent few days reading the online coursebooks at safaribooksonline.com.
In addition to “The Art of Hacking”, we also stumbled upon Kali Linux Wireless Penetration Testing Beginner’s Guide – Third Edition, a guide made by Cameron Buchanan and Vivek Ramachandran, both of them being experts at their trade and making significant breakthroughs in the Wi-Fi security area. After reading the guide itself during my idle hours, I noticed that this had answers for most of our questions. It explained thoroughly what kind of components you would need for breaking through Wi-Fi security, how WEP/WPA2 Encryption works and most importantly – what are the main weak points in those two and how to abuse them. The guide contained also guides on packet sniffing and injection, so we started following this guide step by step.
Going into deeper detail, I will try to explain later in the posts to come for what i have learned. So let’s start with the basic requirements necessary to even think about cracking something.
Firstly, we would need components. Two laptops with internal Wi-Fi cards or one wireless adapter if the laptop’s internal Wi-Fi card doesn’t support packet injection and sniffing. Whatever laptop has the wireless adapter attached has to have Kali up and running, for Kali does have support for packet injection and packet sniffing. The authors noted that best choice for this wireless adapter would be the Alfa AWUS036H card made by Alfa Networks. Reason for that is because Kali supports this adapter out of the box – you just need to plug it into your laptop. We ran into an issue with Alfa AWUS036H adapter – it wasn’t on sale anywhere in Finland. So naturally we started to look for an alternative. In the end we bough a TP-Link TL-WN722N v2 adapter, which was a mistake. (NOTE: DO NOT buy this one, it won’t work with packet injection and sniffing. I will explain in detail later in the wireshark chapter, why it didn’t work.)
Furthermore, including the adapter we would need to buy an access point that support WEP/WPA/WPA2 encryption standards. Basically any modern day router would work, but we ended up with buying a TP-LINK TL-WR841N Wireless router as our lab equipment, purely because it was the router used in Vivek’s and Cameron’s guide, so following up with their guide would be easier. And naturally, we would also need a stable internet connection.
So here’s a list of all the components that we got:
- Two Laptops that we had prior to this project: HP Omen and Lenovo 320 Ideapad
- TP-Link TL-WN722N v2 Wireless Adapter (NOTE: Doesn’t work with this exercise, explained in later chapters why it didn’t work)
- Alfa AWUS036H
- One TP-LINK TL-WR841N Wireless Router