02 ~ Detection - SYWorks/wireless-ids GitHub Wiki
- If a possible WEP attacks detected, it will show the Wireless client / Access Point MAC Address (AP Name) and also any authentication/association request made.
- Korek Chopchop method is a method used by Aircrack-NG suite to attack on a WEP encrypted network.
- Basing on the unique signature in the packets, WIDS is able to detect such attacking method.
- Fragmentation PRGA method is another method used by Aircrack-NG suite to attack on a WEP encrypted network.
- Basing on these unique signature in the packets, WIDS is able to detect such attacking method.
- If a possible WPA attacks detected, it will show the Wireless client / Access Point MAC Address (AP Name) that the number of deauthentication packets were detected.
- If handshakes were also detected, it will display the number of handshake packets found.
- The Aireplay-NG WPA Migration Mode also use an unique method by sending request to Access Point using fake MAC address trying to authenticate with AP. These flooding is also being pickup by WIDS.
- Whenever a communication between a Wireless client and Access Point using EAP, their MAC Addresses will be displayed with the number of EAP packets were detected.
- It consistent communication of such request, it is likely that a WPS Bruteforce is in progress.
- The script also detect any changes when a wireless client which is initially connected to a access point subsequently switch connection to another access point, which could have the possibility connection to a Rogue AP (User should also note the AP name)
- WIDS also analyse the access point name for frequent changes which could be the possibility of 'Rogue AP' responding to probe by wireless devices.
- With the similar AP names detected, WIDS will display these APs with similar names which could have the possibility of Evil Twins.
- Not all similar AP names are evil twins as some routers can have two or more similar name set by users.
- It is the user discretion to decide whether is it a evil twins.
- When a high number of QOS Data packet is sent to a WPA/TKIP encrypted network, there could be a possibility of attack by TKIPTUN-NG .
- WIDS is able to detect possible attack using MDK3 Michael shutdown exploitation (TKIP) options
- With too much authentication request from wireless clients, WIDS will display if there is a possibility of Authentication DoS by authentication flood by MDK3
- WIDS will also display possible Beacon flooding attacking by MDK3
- WIDS also detect possible WPA Downgrade Test attack option by MDK3
- WIDS also allow to display detected wireless devices that probing for any SSID or not participating in any connection of network.
Support & Like My Page SYWorks