Wi‐Fi Attack Techniques - ikenpachi/Wireless-Attacks-Docs-Red-Team GitHub Wiki
Wi-Fi Attack Techniques
Wireless networks are susceptible to various attacks that exploit vulnerabilities in encryption, authentication, and network protocols. Below is a detailed breakdown of the most common attack techniques used in wireless penetration testing.
1. ChopChop Attack
Type: WEP Encryption Attack
Description:
- The attacker captures an encrypted data packet and attempts to decrypt it without knowing the WEP key.
- By manipulating packet fragments, the attacker reconstructs the plaintext data and ultimately recovers the WEP key.
- This attack is effective against networks using WEP encryption, which is outdated and vulnerable.
Tool Used: Aircrack-ng
2. Fragmentation Attack
Type: WEP Key Recovery Attack
Description:
- Breaks WEP encryption by injecting small packets into the network.
- Each small packet helps the attacker reconstruct the full encryption key.
- WEP’s weak IV (Initialization Vector) implementation makes this attack highly effective.
Tool Used: Aircrack-ng
3. Pixie-Dust Attack
Type: WPS Exploit
Description:
- Targets routers with WPS (Wi-Fi Protected Setup) enabled.
- Exploits vulnerabilities in the E-S1 and E-S2 nonces used in the WPS PIN validation process.
- The attacker can recover the WPA/WPA2 password offline without brute-forcing the entire key space.
- Works effectively on routers with poorly implemented WPS PIN authentication.
Tool Used: Reaver, Bully
4. Deauthentication Attack
Type: Denial of Service (DoS)
Description:
- The attacker sends fake deauthentication frames to a victim, forcing their device to disconnect from the network.
- This attack can be used to capture WPA2 handshakes or disrupt a network's connectivity.
- Commonly used for forcing users to connect to an Evil Twin access point.
Tool Used: Aireplay-ng, Bettercap
5. Evil Twin Attack
Type: Rogue Access Point Attack
Description:
- The attacker creates a fake access point with the same SSID as a legitimate Wi-Fi network.
- Victims unknowingly connect to the attacker-controlled network, allowing data interception.
- This technique is often used for credential theft and Man-in-the-Middle (MITM) attacks.
Tool Used: Airbase-ng, Bettercap
6. PMKID Attack
Type: WPA2 Key Extraction Attack
Description:
- Instead of capturing a four-way handshake, this attack targets the PMKID hash generated during WPA2 authentication.
- The attacker captures this hash and performs offline brute-force or dictionary attacks to retrieve the Wi-Fi password.
- This method is faster than traditional handshake attacks because it doesn’t require a client to connect to the network.
Tool Used: Hashcat, hcxdumptool, hcxtools
7. WPA/WPA2 Handshake Cracking
Type: Dictionary/Brute-force Attack
Description:
- The attacker captures a WPA/WPA2 handshake when a device connects to a Wi-Fi network.
- The captured handshake is then subjected to a dictionary or brute-force attack to find the correct password.
- Highly dependent on the strength of the password—long, complex passwords are resistant to this attack.
Tool Used: Aircrack-ng, Hashcat
8. KARMA Attack
Type: Automatic Client Connection Exploit
Description:
- Many devices are configured to automatically reconnect to known networks.
- The attacker sets up an open access point with common SSIDs (e.g., "Starbucks Wi-Fi").
- Devices automatically connect, allowing the attacker to intercept and manipulate network traffic.
Tool Used: Bettercap
9. Rogue DHCP Attack
Type: Network Manipulation Attack
Description:
- The attacker sets up a rogue DHCP server on the network to assign fake IP configurations to clients.
- Victims unknowingly use the attacker's gateway, enabling MITM attacks and DNS hijacking.
Tool Used: Bettercap, Yersinia
10. WPS PIN Brute-force Attack
Type: WPS Exploit
Description:
- Many routers support WPS PIN authentication, which can be brute-forced using an 8-digit numerical PIN.
- Once the PIN is cracked, the WPA2 password can be retrieved instantly.
- Some routers have lockout mechanisms, but many remain vulnerable.
Tool Used: Reaver, Bully