-=Wardriving 2009=- -by:DNR

DON'T post new tutorials here! Please use the "Pending Submissions" board so the staff can review them first.
Locked
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

-=Wardriving 2009=- -by:DNR

Post by DNR »

WarDriving with DNR - 2009 editionImage
DNR (Writer for suck-o.com)
Digital Mercenary
Image
Image
Joined: Feb 25, 2006
Posts: 3584
Location: Michigan USA

Image
The wardriver's kit has a cellphone or USB broadband modem for Internet connection while the wnic has an external antenna for detecting networks.

The older wardriving tutorials over the previous years are gone as they linked off site. Some tutorials had password lists, others had tuts on specific tools - This tutorial will now combine all works into one. This tutorial will be different as compiled docs and tools will be kept for archive on suck-o.net.

DNR's Complete Tutorial of Wardriving

Wardriving is the transformation of Wardialing. Wardialing was getting your computer to dial phonebooks of phone numbers to find a BBS or remote computer with Internet access. Wardriving is the same thing - you drive to find a open line to access the internet. Tone Loc would dial phone numbers all day and all night, saving a list of phone numbers that responded like a modem.

Wardialing became illegal - phone companies didn't like dialers to sniff around their equipment, especially not for free access to make a free phone call or get free internet. Wardriving is illegal directly because of the Federal laws in USA that prohibit "unauthorized access to a computer or network". It is a five year felony. Local police departments before were clueless about wardrivers perhaps up until the last year or so - now you can google for news on wardrivers being arrested by local PD. They now understand what that 'person with a laptop sitting in his car for hours' is doing.

Wardriving fits the underground culture of hackers - whether it is just a geek that wants to get online to download a big movie file, evade RIAA by uploading and downloading music or videos, or check email anywhere. The geek might want to wardrivel to bypass download restrictions used by ISPs (.25 cents USD per MB over 500mb). Wardriving can be used for criminal purpose - tracing the IP of the attacker using a open unsecured wifi AP leads to a innocent victim. It is one of the last frontiers of the Internet that allows anonymity.
Image

WarChalking
The underground wifi network uses signs to mark wifi hotspots. It depends how active wardriving is in your neighborhood and some might have their own variations of signs. You don't have to leave a sign either - lists like these have been around long enough to be circulated to local police departments and they consider it gang activity.
ImageImage

Wardriving systems

Wardriving requires a mobile computer although a desktop can be fitted with a wnic (wireless network interface card) it lacks mobility.
Image

You can get creative and build a warcart or warvan (a van with a PC built in). The warcart idea is just a old PC platform modded specifically for wardriving, the idea can be modded to a backpack, a bicycle rack, or on a motorcycle.
Image


Wifi is just an extension of the network
The wifi card is a simple network interface that translates RF (radio Frequency) into digital bits the computer can understand. As you drive around, your laptop's wnic will detect RF signals from other devices, usually a AP (access point). The AP is the cabled network's device that extends the network into radio frequency communications. Just like a two way radio - your computer is using 2.4ghz (or 5ghz) as a frequency, it has channels and it can be encrypted. Rules for how wifi works is based on 802.11 standards that manufacturers follow as well as TCP/IP rules because it has to work on a network structure that was already in place - the 'internet'. WNICs are working on the network level of the OSI layers, so you do not have to re-think how networks work.

Wardriving - Peripherals

I use a windows laptop with a internal wifi card and I use a USB broadband modem for internet access. The diagram above shows the power and communications setup for a wardriver. You can use ports on your laptop to connect - the RJ-45 port can be plugged into your own wifi AP, you can use the USB port for a wifi card external to the one you already have in the laptop. The USB port can also have a combo wifi adaptor and Broadband modem that uses Cellular technology. The cellular tech requires a service with a ISP, this is standard with many cellco bundle packages they offer their customers.
The Belkin External USB wifi device.
Image

Having a internet connection while you wardrive for a wifi connection is helpful for searching for default technical information when you find a wifi router. I keep most of my hacking tools online and pull them onto my laptop only when I need them. You can use your internet connection to provide internet traffic for computers that have been re-routed from the legitimate wifi AP to your wifi AP/wnic. When the customer accesses a legitimate site, your computer acts as the gateway and sniffs for passwords or banking info.

The power is simply a AC/DC converter for $35USD, it is a must as wardriving requires more time than a regular PC battery can provide.
I use a Powerline DC to AC converter 140watts continious 200watts peak. Output is of course 120vac at 60hz. This is important as you can see on your laptop recharge cable the input requirement of 50-60hz too.
a DC to AC Inverter
Image
The input requirement is 10vdc to 16vdc. This is not the best as car batteries discharge quickly with that kind of vdc consumption - it is also possible to burnout an alternator on smaller cars as this will exceed the power output of the alternator - and not charge your car battery too!

For the Laptop - I used two - a Compaq built in 1996 and a Dell Inspiron built in 2009. Both will have Windows on it for this tutorial as it is a common OS. Windows has a inherent defect in its code that prevents network cards (cable or wifi) from using most exploits to run in promiscious mode. This mode is very important as it means the wnic or nic can recieve packets not addressed to itself, but to other people's machines. You can use Windows OS to wardrive, it is possible for some adapters to run promiscious mode, but you don't need it to sucessfully wardrive!

Getting the Signal
The RF signal from a wifi AP has two distinct ranges to consider - the transmitting power of your wnic and the transmitting power of a AP - just because you can detect a wifi AP signal, it does not mean you are close enough for your wnic to transmit to it. While 'transmit power' referred to your wireless card, on the return trip 'transmit power' refers to the access point. Likewise, 'receiver sensitivity would refer to your card as opposed to the access point, and so on. Just because you can receive a signal from an AP does not mean you can send to it, as APs usually have a lot more range than a wireless adaptor.
Laptops internal wifi cards are between 30mw to 200mw, claimed ranges of 300 feet for wifi signals don't work out very well in real life. It is not just building material or AP placement - it can also be too much signal noise in the area. Internal laptop wifi cards do not have external ports to connect an antenna.
You can use high-gain antennas on wnics or USB wifi modems - this will increase your stand-off distance from the AP to avoid detection. Skip the homemade cantennas and just buy one from HawkingTech for $35USD. The antenna has to be matched for the wnic and radio frequency -so don't just buy any old CB antenna. The high-gain antenna can be used by a desktop platform, you can use a dish type to aim it at certain areas on your block or you can just mount an antenna on a board and stick it near a window. Just remember that your desktop wifi platform can be triangulated by others and located due to its lack of mobility.

Image
The Hawkingtech dish plugs into a USB port

Image
The USB wifi/broadband modem can take an external antenna - below
Image

Wifi Signal Primer
There are five basic components which effect signal propagation:

*Transmit power
*Transmit antenna gain
*Frequency and distance (path loss)
*Receiving antenna gain
*Receiver sensitivity

Wireless communication is a two way process, you have to include the same five factors in reverse. A Wifi AP will have more power than a laptop wnic.

Environmental conditions have a serious affect on propagation too.
During the early morning or very late at night propagation is at its best and attenuation is at it's lowest; damp and humid conditions help the signal propagate even further. Attenuation can be reduced by up to 45% on a damp cold morning/night. If it is a dry hot day and you are in a busy area then anything up to +60% attenuation is possible.

Buildings, and building material types, effect your wifi signals. Cement, metal, and electrical panels can reduce the signal strength. The physical layout of the property can make it hard to drive a vehicle close to the part of the building where the wifi AP is located.

Attenuation by building materials
Brick 3.5" 6 dB
Concrete Wall 18" 18 dB
Cubical Wall (Fabric) 2.25" 18 dB
Exterior Concrete Wall 27" 53 dB
Glass Divider 0.5" 12 dB
Interior Hollow Wall 4" 5 dB
Interior Hollow Wall 6" 9 dB
Interior Solid Wall 5" 14 dB


Also, signal noise in the same or close frequency range can cut down the signal strength of either the laptop or wifi AP.

Wardriving is about Mobility
Wardriving can be used in creative ways - you can walk around with a keychain device to detect wifi signals, you can ride a bicycle or ride a bus with a laptop running in a backpack, you can drive a personal vehicle around with the laptop on the passenger seat or a buddy working the console there. A backpack can hold a system with its own battery power.

Image
A rogue wifi AP can be left in a busy area to collect sniffed data

Get a SSID
How fast you are traveling is going to be dictated by your wardriving setup, your laptop needs to detect the signal (set quicker refresh times on the wifi locator) and run its application to log as much information as possible about the signal. The RF signal is identified by SSID (SSID is an acronym for Service Set Identifier. The SSID is a sequence of up to 32 letters or numbers that is the ID, or name, of a wireless Access Point(AP)) Many default wifi AP setups use the wifi make/model as the default SSID. This is a good sign the wifi AP might be in default settings. The name can be the router brand, The SSID could be a 'clever sysadmin' trick to hide its purpose on a corporate network "orange<numbers>" were the colors of the checkout lanes at HomeDepot wifi cash registers.
Investigating the SSID can be triangulating the signal to a building to determine its purpose. You can map manually on a map where the signal is, its info, and even post it online to share. So far you have not done anything illegal because you have not attached to any wifi devices you found. Just because you have located a SSID, you have not associated with the AP yet.

Netstumbler view
Image
Vista Network and Sharing view
Image
Last edited by DNR on 07 Oct 2009, 22:17, edited 13 times in total.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Wardriving Tutorial Part 2

Post by DNR »

So far all you have done is picked up RF signals out in the public airwaves and logged them to your computer. This is not a crime. The next thing - Attaching to the network is.

A Wireless Access Point (AP) is the central bridge device used in an Infrastructure (as opposed to Ad Hoc) wireless network. (See Wi-Fi Network Types) Traffic from the wireless side of the bridge is sent to the Ethernet (wired) side of the bridge, and vice versa. The wireless access point controls all traffic with wireless client radios.

Note: A wireless router, which is often less expensive than a wireless access point, can be configured to work as just a wireless access point -- see Wi-Fi How To Use a wireless router as a wireless access point.

Wireless Router
A wireless router typically consists of three parts:

1.Ethernet router, including:
DHCP client and server
NAT(PAT)
Firewall
2. Owner Interface (usually web interface)
3.Wireless access point hardware (radio)
Some boxes also include either: DSL modem orCable modem.

MAC Address
MAC stands for Media Access Control and the MAC address is a computer's true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number ( 1AB4C234AB1F).

IPs are translated to MAC address by a protocol called ARP (Address Resolution Protocol). A computer with and IP of 192.168.1.1 wants to send information to another computer on the LAN that has an IP of 192.168.1.50 . The computer with 192.168.1.1 will send out a broadcast to all stations on the LAN asking who has the IP 192.168.1.50? Then the box that has 192.168.1.50 will respond to 192.168.1.1 with it's MAC address which is cached in 192.168.1.1's ARP table.

Spoofing MAC is important for the wardriver,
1. To hide your real machine's ID
2. To sniff traffic meant for the real computer with that MAC
3. To bypass router security that is set to only allow certain machine's MACs
4. To take over communication between machines that have already authenicated with each other to by pass a login.


Wardriving - get attached
Your laptop and wifi AP need to do their handshake to authenticate to each other. The usual TCP/IP rules apply here, one computer says "Hi I am Wardriver with MAC de.43.sf.3.f.e" the other computer says "Ok, I am Wifi router MAC ew.3d.fE.54, Welcome" the one says "Thanks!" All this can happen to computers and phones that are set to locate any wifi signal and attach - this is bad if you set up a rogue AP. This takes about less than a minute, but you have to maintain signal strength by staying near the AP.


PnP of Wifi
The wifi AP was meant to be PnP friendly - Plug and Play. It allows wifi device to locate it by its broadcast (SSID) and it has automatic login capabilities. A poorly configured laptop can attach to a unsecured wifi AP only because it has the best signal strength - not because it is allowed to. This can be used as an excuse for using someone else's wifi AP - your neighbor's wifi AP could be closer to your TV room than yours is downstairs. The same can happen for your neighbor using your wifi AP.
There are also some wifi AP that were meant to be provided for paying customers of a hotel, cafe, or bookstore - sitting outside and surping their wifi would not be kosher. Some wifi AP are setup for corporate or business use, but it was poorly configured because the sysadmin didn't want to configure all the machines that will access it. So again - just because you can attach to a AP, you are still responsible for determining if the laws are being broken!

Association and Authenication
All the APs transmit Beacon frames a few times each second that contain the SSID, time, capabilities, supported rates, and channel. wifi users can chose to associate with an AP based on the signal strength of each AP.
The association is a two-step process. A wifi user that is unauthenticated and unassociated listens for Beacon frames. The wifi user selects a AP to join. The wifi user and the AP mutually authenticate themselves by exchanging Authentication management frames. The client is now authenticated, but unassociated. In the second step, the station sends an Association Request frame, to which the AP responds with an Association Response frame that includes an Association ID to the station. The station is now authenticated and associated.

Authentication is the process of proving identity of a station to another station or AP. In the open system authentication, all stations are authenticated without any checking. In the closed network architecture, the stations must know the SSID of the AP in order to connect to the AP. The shared key authentication uses a standard challenge and response along with a shared secret key. A station can be authenticated with several APs at the same time, but associated with one AP at a time.

The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed.

Lastly, just because you are authenticated to a wifi AP, you may still need to authenticate to regular network Domain logins.

Wardriver for Free Internet

Windows network discovery of the wifi AP will discover the gateway and DNS IPs so it can access the internet. Your browser will confirm. Surf away. Just be aware that this unsecured wifi AP means that sensitive stuff like your real email login, bank account login, should not be trusted on the network. The AP can log your MAC and where you go, the network can have more logs, again logging your laptops fingerprint (MAC, OS, version, Browser type, version, machine type) and what URLs and files you requested.


The Dark side of Wardriving
Welcome to the Dark Side of Wardriving because now you want more than internet right? - after you attach to the wifi AP, why not discover the other devices on the same AP or network? You can use a IP scanner or a sniffer. The IP scanner you would scan within the IP block you are in - 192.169.1.0 through 192.168.1.255 for example.
This will show all the other devices that are attached to the wifi AP - cameras, printers, desktops, laptops, iphones, and routers.
Image

WAPJacking - Wireless Access Point Hijacking
Once you have access to the wifi AP webinterface you can change the settings. The terminology I saw for this was WAPJacking - you take over the wifi AP by locking out the owner (as long as everything works, they don't check anyways) You can change the DNS and Gateway to a malicious machine to perform man-in-the-middle attacks or sniffing. Phishing by this method works very well as the owner will input the sensitive information when he makes a normal visit to the website, not a funny email link. This is hijacking the ownership of the wifi AP, and requires no special tools or special skills - you use the default IP and factory login to gain control of a unsecured wifi AP. If you have been locked out of your wifi AP, you can hit a recessed reset button on the back of the device, and it will reboot to the orginal factory settings. Simply changing the default user login can prevent this.

Image

Always carry or memorize the default wifi AP webinterface specs This is the default IP the wifi AP router is on, the default SSID, and the default user and password. While you can find extensive lists of default logins on the internet, here is a short one for wifi APs - notice similarities in the IP range - this follows the internet rules of using IPs for small networks. Medium to large sized networks can change this IP to 172.xx.xx.xx to 10.10.xx.xx, the 192.168.xx.xx. IP range tells you that it is likely a small residental or small business wifi AP.
WIRELESS ROUTER SSID WEB INTERFACE USERNAME PASSWORD

3Com Office Connect 3CRWE754G72-A 3Com http://192.168.1.1/ <blank> <blank>
Belkin F5D7630-4A belkin54g http://192.168.2.1/ <blank> <blank>
BT Voyager 2000 BTVOYAGER http://192.168.1.1/
http://voyager.home/ admin admin
BT Voyager 2100 BTVOYAGER2100 http://192.168.1.1/
http://voyager.home/
BT Wireless Network 1250 <blank> http://192.168.0.1/
http://gateway.2wire.net/ <blank> <blank>
Buffalo AirStation 54Mbps http://192.168.11.1/ root <blank>
D-Link DSL-604+ default http://192.168.0.1/ admin admin
Intertex IX66 AirSIP wireless_gw http://192.168.30.1/
Netgear DG814 http://192.168.0.1/ admin password
Netgear DG824M Wireless http://192.168.0.1/ admin password
Netgear DG834G NETGEAR http://192.168.0.1/
Linksys WAG-54G linksys http://192.168.1.1/ admin admin
SMC ADSL Barricade 7404WBRA hub
Solwise SAR-110 http://192.168.7.1/ DSL DSL
Solwise SAR-715PVW act1 http://192.168.1.1/ admin admin
U.S. Robotics SureConnect 9106 USR9106 http://192.168.1.1/ admin admin
Vigor 2600 http://192.168.1.1/ admin <blank>
Westell WireSpeed 2410 Wireless LAN http://192.168.1.1/ <blank> <blank>
You can also search the internet for owner's manuals or guides for the wifi AP, they are hosted on manufacturer websites and will tell you everything about that router. Third party sites about networking can host default password list http://www.cirt.net/passwords
Image

WarKitting
Since you have access to the webinterface, take it to a higher level - you can have the router upload modified firmware. Warkit is a rootkit for the wifi AP, you will have to find various coders or forums that can decode a wifi AP's firmware and code in your malware. This is a kernal level hack and makes it harder to detect - owners can access the webinterface and never know that the rootkit is hiding things from them. They can use the reset button, and the modified firmware will just be reloaded.

Uploading firmware is easy
Image
--
Brick and Run or Phlashing
Brick and Run is a tactic used on smaller networks - on small networks the router is the only one that will have usable logs to detect a intruder. The ISP can log this stuff on you, the fingerprint of your laptop, the MAC, and where you went. You are doing this to cover your tracks at the ISP customer level. Brick and Run is flashing the firmware of the wifi AP to erase your tracks. You would upload the firmware and the wifi AP will reboot automatically - you leave during this process and the wifi AP will reboot with no trace of you. This requires coding of the firmware to keep the old wifi AP settings as not to tip off the owner. Lacking the properly coded firmware - you would upload a corrupt file - this will cause the wifi AP to reboot and become useless! If the owner is unable to access the wifi AP interface to view the logs - it worked! But, the ultimate goal is to reflash so the wifi AP keeps on working.

Network attacks
Image

Session Hijacking
Once on a local network you can perform a session hijacking of a authenicated user logged in to a server. The user has an on-going connection with a server which he has used a login to authenicate. Hijacking occurs when an attacker causes the user to lose his connection, and the attacker assumes his identity and privileges for the connection to the server. The attacker disables temporarily the user’s system, say by a DoS attack or a buffer overflow exploit. The attacker now has all the access that the user has. When he is done, he stops the DoS attack, and lets the user resume. The user may not detect the interruption if the disruption lasts no more than a couple of seconds. Hijacking can be achieved by using forged Disassociation DoS attack and forged packets that have the victim's IP and MAC address. Corporate wireless networks are often set up so that the user is directed to an authentication server when his station attempts a connection with an AP - this is for the network logon. The network logon can be merely having the same IP and MAC address as one of the local machines, or an actual user/pass. The corporate network logon can be for cafe wifi hotspots or hotels and are not hard to crack.
Image
Session-Riding with sniffed cookies
Image

ARP Poisoning
Image
ARP poisoning technique is possible with APs that are connected to a switch/hub along with other wired clients.
Image
ARP is used to determine the MAC address of a device whose IP address is known. The translation is performed with a table look-up - this can be on the wifi router or your machine. The ARP cache accumulates to build the network profile of users. If the ARP cache does not have an entry for an IP address, the outgoing IP packet is queued, and an ARP Request packet sent out that requests “If you are "IP address" then tell me your Ethernet address is” . The host with the target IP is expected to respond with an ARP Reply, which contains the MAC address of the host. Once the table is updated because of receiving this response, all the queued IP packets can now be sent.

This ARP poison flaw works because the ARP does not provide for any verification that the responses are from valid hosts! This corrupts the ARP cache that the OS maintains with wrong MAC addresses for some IP addresses. An attacker accomplishes this by sending an ARP Reply packet that is deliberately constructed with a “wrong” MAC address. Because ARP is a stateless protocol, a machine receiving an ARP Reply cannot determine if the response is due to a request it sent or not!

ARP poisoning is one of the techniques that enables the man-in-the-middle attack. An attacker on machine X inserts himself between two hosts B and C by (i) poisoning B so that C’s IP address is associated with X’s MAC address, (ii) poisoning C so that B’s address is associated with X’s MAC address, and (iii) relaying the packets X receives.

The ARP poison attack is applicable to all hosts in a subnet. Most APs act as transparent MAC layer bridges, and so all stations associated with it are vulnerable. If an access point is connected directly to a hub or a switch without an intervening router/firewall, then all hosts connected to that hub or switch are susceptible. Making home and small business networking easy for users have created devices that combine a network switch with four or five ports, an AP, a router and a DSL/cable modem connecting to the Internet at large. Internally, the AP is connected to the switch. As a result, an attacker on a wireless station can become a M-I-T-M between two wired hosts, one wired one wireless, or both wireless hosts.

Wifi Denial of Service
A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion or a special packets that disconnect the client from the AP. DoS attacks are difficult to prevent on wifi networks and difficult to stop an on-going attack, and the victim might not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station is mainly for session hijacking.

DoS by Jamming
Consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. You can also by kits to assemble a electronic jammer. The attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops too low for the machines to accept them. Jamming signals is illegal by FCC codes that require devices not to interfere with each other.

DoS by Associations
The AP stores data supplied by the connect computers in the Association Request into a table called the Association Table that the AP maintains in its memory. When this table overflows, the AP would refuse further clients. The actual size of this table varies among different models of APs.
IEEE 802.11 specifies a maximum value of 2007 concurrent associations to an AP. The attacker authenticates several non-existing stations using legitimate-looking but randomly generated MAC addresses. The attacker then sends a flood of spoofed associate requests so that the association table overflows. Once the table has reached its limit - no other users will be able to connect to the wifi AP. Enabling MAC filtering in the AP will prevent this attack as it require the MAC to approved by the sysadmin.

DoS by Forged Dissociation
The attacker sends a spoofed Disassociation frame to a victim's computer where the source MAC address is set to that of the AP.
This opens a session hijacking by allowing the attacker to reassociate as the victim to the wifi AP - the victim's computer is still authenticated but needs only to reassociate with the wifi AP. It does this by sending a Reassociation Requests to the AP. The AP may send a Reassociation Response accepting the attacker's machine spoofing as the victim's machine and the station can then resume sending data. Meanwhile the attacker keeps sending frames that deauthenticates the victim's machine from the AP.

DoS by Forged Deauthentication
The attacker sends a spoofed Deauthentication frame where the source MAC address is spoofed to that of the AP. The victim's computer is now unassociated and unauthenticated, from the wifi AP. The victim will have to reconnect. To prevent a reconnection, the attacker continues to send Deauthentication frames for a desired period.

The mischievous packets of Disassociation and Deauthentication are sent directly to the client, so these will not be logged by the AP or IDS, and neither MAC filtering nor WEP protection will prevent it.

--
Wardriver Tools

Windows already has its own network discovery tools and wlan tools included in Professional versions. Serious hackers and network auditors use the open-source operating system Linux as the platform from which they launch attacks and perform analysis - this is because other companies charge money for applications to do this, open source means people can share or make it freeware. Windows does not make it easy for freeware coders to write code for it, the market for wardriving tools is strict due to legal implications. These tools can work on several OS, Windows, Mac and Linux, but it might require a certain wifi adaptor. This is not a comprehensive list, but shows the range of tools.

Aircrack
Aircrack/Aircrack-ng is also available on the Windows platform, albeit without the packet injection capabilities offered by aireplay. They come with the following tools:
airmon.sh - a utility to check an interfaces status and placing the interface into monitor mode
airodump - 802.11 packet capture program (the resulting captures are used with aircrack)
aircrack - static WEP and WPA-PSK key cracker that uses airodump captures as its input
aireplay - 802.11 packet injection program *Does not support Orinoco drivers
airdecap - decrypts WEP/WPA capture files
arpforge - tool for forging ARP request packets
Image

AirJack
(802.11ninja.net/airjack/) is a collection of wireless card drivers and related programs. It includes a program called monkey_jack that automates the MITM attack. Wlan_jack is a DoS tool that accepts a target source and BSSID to send continuous deauthenticate frames to a single client or an entire network (broadcast address). Essid_jack sends a disassociate frame to a target client in order to force the client to reassociate with the network, thereby giving up the network SSID.

AirSnort
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys." AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. In even more simplistic terms, AirSnort is a program that listens to the wireless radio transmissions of a network and gathers them into a meaningful manner. After enough time has passed (sometimes in a matter of hours) and data are gathered, analytical tools process the data until the network security is broken. At that point everything that crosses the network can be read in plain text. (www.airsnort.shmoo.com )

AirSnarf
AirSnarf is an access point spoofing tool based off the simplest way to dupe users into handing over their sensitive information to rouge hackers. Quite simply this application mimics a legitimate access point. The method of attack is broken down into recreating an identical logon webpage that would normally be displayed by the AP. The user is bumped off the network and forced to re-login or is caught before they login the first time. The simple trick convinces them into voluntary sending their login information to the hacker who can then use it at their disposal. It is extremely simple yet effective. All the details of the AP connection are legitimate to the unsuspecting user within their network configuration. They never realize this has happened in some cases as you then authenticate them to the network and allow them to pass through your computer.

APTools
APTools is a utility that queries ARP Tables and Content-Addressable Memory (CAM) for MAC Address ranges associated with 802.11b Access Points. It will also utilize Cisco Discovery Protocol (CDP) http://winfingerprint.sourceforge.net/aptools.php

AP Hunter
AP Hunter (Access Point Hunter) can find and automatically connect to whatever wireless network is within range. AP Hunter can be used for site surveys, writing the results in a file.

Airpwn
Airpwn is a tool for generic packet injection on an 802.11 network.
airpwn requires two 802.11b interfaces, one for listening, and another for injecting. It uses a config file with multiple config sections to respond to specific data packets with arbitrary content.

Cain & Abel
This tool can be used for sniffing and attacks to a wifi ARP. The tool can also be used to enumerate windows machines on the local network. VOIP cracking available.
Image

Madwifi
http://sourceforge.net/projects/madwifi/ http://madwifi.org/
Multiband Atheros Driver for WiFi (MADWIFI): Linux driver for 802.11a/b/g universal NIC cards - Cardbus, PCI, or miniPCI - using Atheros chip sets.

MadMAC
MadMACs: MAC Address Spoofing And Host Name Randomizing App For Windows. http://www.irongeek.com/i.php?page=secu ... ac-spoofer. Can work with Vista.
Ettercap
Ettercap (http://ettercap.sourceforge.net) is capable of performing ARP poisoning as well as Cain & Abel. Linux, Mac OS, and Windows http://ettercap.sourceforge.net/download.php

WEPcrack
WEPcrack, simultaneously being developed along with AirSnort, is another wireless network cracking tool. It too exploits the vulnerabilities in the RC4 Algorithm, which comprise the WEP security parameters. While WEPcrack is a complete cracking tool, it is actually comprised of three different hacking applications all of which are based on the development language of PERL. The first, WeakIVGen, allows a user to emulate the encryption output of 802.11 networks to weaken the secret key used to encrypt the network traffic. Prism-getIV is the second application that will analyze packets of information until ultimately matching patterns to the one known to decrypt the secret key. Thirdly the WEPcrack application pulls the two other beneficial data outputs together to decipher the network encryption. (www.wepcrack.sourceforge.net)

WEPWedgie
WEPWedgie is a toolkit for determining 802.11 WEP keystreams and injecting traffic with known keystreams. The toolkit also includes logic for firewall rule mapping, pingscanning, and portscanning via the injection channel and a cellular modem htp://sourceforge.net/projects/wepwedgie/

WEPattack
WepAttack is a WLAN open source Linux tool for breaking 802.11 WEP keys. This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack. htp://wepattack.sourceforge.net/

LORCON
Loss Of Radio Connectivity http://802.11ninja.net/lorcon/ - Linux -
The LORCON packet injection library provides a high level interface to transmit IEEE 802.11 packets onto a wireless medium. Written for Linux systems, this architecture simplifies the development of 802.11 packet injection through an abstraction layer, making the development of auditing and assessment tools driver- independent.

Wifitap
WifiTap allows users to connect to wifi networks using traffic injection. The concept is the same as most "man-in-the-middle" attacks. For WifiTap to work, another system must have an association with an access point that the WifiTap system wants to pass traffic through. The system running wifitap is not associated with any wireless access point and the system is not handled by any access point. http://sid.rstack.org/static/articles/w ... fitap.html

Kismet
Kismet is an extremely useful tool that supports more of an intrusion detection approach to the wireless security. However, Kismet can be used to detect and analyze access points within range of the computer on which it is installed. Among many other things, the software will report the SSID of the access point, whether or not it is using WEP, which channels are being used, and the range of IP addresses employed. Other useful features of Kismet include de-cloaking of hidden wireless networks, and graphical mapping of networks using GPS integration.

Ethereal - Now Wireshark
Ethereal/Wireshark is a pre-production network capturing utility. Wireshark is the newer version of Ethereal, Ethereal older versions can still run on todays machines. It is capable of identifying and analyzing 530 different network protocols, Ethereal can pose a substantial threat through the discovery and detection of any network communication. One of many network analyzers, this application arguably does the most comprehensive job of seeing and recognizing everything that goes by its sensor. http://digitalnomad.suck-o.net/DNR/red/wiresharktut.pdf

HostAP
HostAP is really nothing more than a firmware for Prism cards to act as an access point in any environment. With multiple scanning, broadcasting, and management options, HostAP can lure disconnected clients into a connection with the HostAP user’s computer and engage into whatever activities suitable to that situation. This is a very common tool used with growing compatibility where it will be ubiquitous with any Open Source OS in the near future.

FakeAP
FakeAP can generate thousands of counterfeit 802.11b access points.
(ww.blackalchemy.to/project/fakeap)Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables. Fake AP runs on Linux (tested on RedHat 7.3)

Dweputils
Dweputils is not one application but a set of applications that together comprise a larger threat to wireless networks of any character. Dweputils is a set of utilities that can completely inspect and lock-down any WEP network. Dwepdump is a packet-gathering tool, which provides the ability to collect WEP encrypted packets. Dwepcrack then gives you the power to deduce WEP keys with a variety of frequently employed technique. Finally dwepkeygen, a 40-bit key generator, can creates keys that aren't susceptible to the Tim Newsham 221 attack with a variable length seed.

NetStumbler
This is the primary tool available for Windows users to detect 802.11 networks. It does not have any cracking tools that are inherent in the software package but can be used in conjunction with numerous other tools to find and hack a wireless network. NetStumbler is the only wifi locator app that has a audible alert sound that lets the wardriver know he has a 'hit'.

StumbVerter
(www.sonar-security.com/sv.html) This is a tool that reads NetStumbler's collected data files and presents street maps showing the logged WAPs as icons, whose color and shape indicating WEP mode and signal strength.

InSSIDer
This is a graphical 'Netstumbler' like program for windows. You can get it at metageek.net and it is freeware.
Image

WifiHopper
WiFi Hopper is a WLAN utility that combines the features of a Network Discovery and Site Survey tool with a Connection Manager. WiFi Hopper can connect to unsecured, WEP, WPA-PSK and WPA2-PSK networks directly from within the application. Only 32-bit Windows Vista, Windows 2003, Windows XP SP2 (or higher) and Windows 2000 SP4 (or higher) are supported. htp://wifihopper.com

Technitium MAC Address Changer
Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.
http://tmac.technitium.com/tmac/index.html
Image

OpenWrt
OpenWrt is a Linux-based firmware program for embedded devices such as residential gateways. Support was originally limited to the Linksys WRT54G series, but has since been expanded to include other chipsets, manufacturers and device types, including Netgear, D-Link, Asus routers and many others, including the Openmoko mobile phones. The most popular routers seem to be the Linksys WRT54G series and the Asus WL-500g. OpenWrt primarily uses a command-line interface, but also features an optional web-based GUI interface. This is ideal for Warkitting.

THC-RUT
Also referred to as the “aRe yoU There” network tool, THC-RUT, combines detection, spoofing, masking, and cracking into the same tool. Many see it as the, “first knife used on a foreign network” boasting its brute force all-in-one capabilities. Resources in the tool included spoofing Dynamic Host Configuration Protocol (DHCP), Reverse Address Resolution Protocol (RARP), and Bootstrap Protocol (BOOTP) requests. (www.thc.org)

BackTrack
BackTrack focuses its central idea on the needs of Penetration testers. The inclusion of Live CD and Live USB functionality enables any user to just insert their respective data medium and boot up a Linux-type OS. Direct hard disk installations (2.7 GB uncompressed) can also be completed within the Live CD (700 MB compressed) environment through the basic graphical installation wizard with no restart subsequent to installation. Backtrack is not just linux, it is a suite of tools for enumeration, exploitation, sniffing, injecting - and for both wireless and cabled networks.
Image

Hotspotter
Hotspotter is another rouge access point tool that can mimic any access point, dupe users to connecting, and authenticate with the hacker’s tool. This, again, is done with a deauthenticate frame sent to a MS Windows XP user’s computer that would cause the victim’s wireless connection to be switched to a non-preferred connection, AKA a rouge AP. This sort of trick is a passive approach that seeks to identify the probe frame sent by any Windows XP machine looking for its preferred network containing exploitable information.

ASLEAP
LEAP stand for Lightweight Extensible Authentication Protocol, which is intellectual property of Cisco Systems, Inc. This is a broadly used protocol for authentication on Cisco Access points with inherent weaknesses. ASLEAP is able to use hashing algorithms to create brute force attacks to recover passwords, and actively deauthenticate users from the AP making them reauthenticate quickly to expedite the process of hacking. This is another tool in the arsenal of hackers with an ever-shrinking learning curve. (www.thc.org)

IKECrack
IKECrack is an open source IKE/IPSec authentication crack tool. It uses brute force dictionary based attacks searching for password and key combinations to Pre-Shared-Key (PSK) authentication networks. With repetitive attempts at authentication with random passphrases or keys this crack tool undermines the latest WiFi security protocol.

WirelessKeyView
www.nirsoft.net WirelessKeyView recovers all wireless network keys (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP or by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard. Physical or remote access required.

WifiSlax
Wifislax is a Slackware-based live CD containing a variety of security and forensics tools. The distribution's main claim to fame is the integration of various unofficial network drivers into the Linux kernel, thus providing out-of-the-box support for a large number of wired and wireless network cards. http://www.wifislax.com/

WinDump
WinDump is the Windows version of tcpdump, the command line network analyzer for UNIX. WinDump is fully compatible with tcpdump and can be used to watch, diagnose and save to disk network traffic according to various complex rules. It can run under Windows 95, 98, ME, NT, 2000, XP, 2003 and Vista.
http://www.winpcap.org/windump/default.htm

--

Defense against wifi tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced Authentication and Encryption.

Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).

Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out. If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.

Ethereal/Wireshark – Use encryption, so that anything sniffed would be difficult or nearly impossible to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.




--
References
hawkingtech.com
Wardriver tools list - Daniel V. Hoffman, CISSP, CWNA
htp://forums.remote-exploit.org/showthread.php?t=7127
htp://www.suck-o.com/modules.php?name=Forums& ... pic&t=4230
htp://digitalnomad.suck-o.net/DNR/red/warkit.pdf
Fingerprinting 802.11 Devices
http://digitalnomad.suck-o.net/DNR/red/ ... finger.pdf
A Guide to Wardriving and Detecting Wardrivers
http://digitalnomad.suck-o.net/DNR/red/ ... rivers.pdf
htp://wirelessdefence.org/Contents/AircrackMain.htm
htp://www.iss.net/security_center/advice/Coun ... efault.htm
htp://i.technet.microsoft.com
htp://en.wikipedia.org/wiki/BackTrack
/www.3com.com/other/pdfs/products/en_US/101900.pdf
--
WarDriving with DNR - 2009 editionImage

DNR (Writer for suck-o.com)
Digital Mercenary
Image
Image
Joined: Feb 25, 2006
Posts: 3699
Location: Michigan USA

--
Last edited by DNR on 07 Oct 2009, 22:21, edited 10 times in total.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Firmware
Locating firmware for your wifi AP. This is for D-link, but most, if not all wifi/network device manufacturer has a support or tech support site.

ftp://ftp.dlink.com/
then
ftp://ftp.dlink.com/Wireless/
then pick your model of d-link wifi AP
10/21/2004 12:00AM Directory Driver
10/21/2004 12:00AM Directory Firmware
08/02/2005 12:00AM Directory Manual

--
Netgear
Type in the model
http://kb.netgear.com/app/
--
Linksys
Type in the model
http://www.linksysbycisco.com/US/en/support
--
Also check sites like: http://www.wardrive.net/firmware/download

http://www.myopenrouter.com/

http://www.polarcloud.com/tomato
Tomato is a small, lean and simple replacement firmware for Linksys' WRT54G/GL/GS, Buffalo WHR-G54S/WHR-HP-G54 and other Broadcom-based routers.

http://melbourne.wireless.org.au/files/wrt54/cfe.pdf
The Broadcom Common Firmware Environment (CFE) is a collection of software modules for initialization and bootstrap of designs incorporating Broadcom MIPS64™ processors. CFE can be used early in the development of designs using Broadcom processors to do bringup, and later be used to bootstrap the OS in a production environment.

ftp://ftp.netbsd.org/

Common Firmware Environment (CFE)
http://www.linux-mips.org/wiki/Common_F ... nvironment

Common Firmware Environment (CFE) is a firmware developed by Broadcom for 64-bit SB1 (Swarm) and 32-bit BCM47xx SOCs.
This firmware is used in the following systems :

in recent versions of Linksys WRT54G cheap all-in-one routers, DSL modem and Wifi access-point. ..in Broadcom 96345-based cheap routers (that include a DSL modem and a Wifi access-point).[/b]

http://www.broadcom.com/support/communi ... nloads.php
CFE firmware can be loaded using ROM Emulator (.srec file) or TFTP server (.flash file).

http://www.broadcom.com/docs/SiByte/README-1.4.2.txt
This directory contains Broadcom's Broadband processor division
"Common Firmware Environment," or CFE. (pronounce it 'cafe' if you like)
It is intended to be a flexible toolkit of CPU initialization and
bootstrap code for use on processors like the SB1250 and its derivatives.
cfe/ Main CFE source tree
build/ The "new" build tree location

..
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Wardriving - Windows Vista, and Cain

Post by DNR »

Wardriving - Windows Vista, and Cain

I was out running around, I had my laptop and a camera. People say you can't do any wardriving with a simple laptop and Windows Vista, here is to show you can.

First I had to get out of town - never wardrive in your neighborhood!
Image

25 miles away - I can pull off the freeway real quick and do a scan and save sniffed files to reveiw later. You can see I am about 250 feet away from the hotel. I get back in the car and run a few tools..
Image

Now I have known about this hotel complex, I have even sat in their parking lot - but I am showing what you can do in five minutes or less - with just Windows Vista and its tools.
Image
You can see I got plenty of signals to chose from - This is a Hot area - you can see even users with ad-hoc networks setup.

Now, I pick "La Quinta" because I know its a bad network. When you associate with the AP Windows will ask if this is a Private or Public Network - choose Private - because Windows will now assumed its a trusted network - this allows the use of Discovery to find all computers and devices. They can 'discover' you too, but no one will be paying attention in this five minute stop. Good lord, it has a Xbox on the network!
Image

You can right click on each device for MAC, IP, name, vendor, model version, etc
But use Cain & Abel to enumerate, sniff, and display more info.
Image
In just a few minutes you can have Cain enumerate Computers on the network (depending on their host-based firewall!), find Shares. Cain can sniff for traffic and discover devices too.

I also used wireshark for a minute (plenty of traffic) and shut everything down and split. Gone in five minutes.

One note - this is a larger network - so the IP range is not the 'residental/small business' IP range of 192.168.1.x, this network is using 10.200.x.x - wireshark picks up the association of my nic (liteonTe) and IP 10.200.1.34 and the gateway (Cisco) IP 10.200.1.1

32.808587 LiteonTe_72:6e:b3 Cisco_92:45:cc ARP Who has 10.200.1.1? Tell 10.200.1.34

The packet details has the MAC
Sender MAC address: Cisco_92:45:cc (00:00:0c:92:45:cc)
Sender IP address: 10.200.1.1 (10.200.1.1)
Target MAC address: LiteonTe_72:6e:b3 (00:22:5f:72:6e:b3)
Target IP address: 10.200.1.34 (10.200.1.34)

More fun later!
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Windows Logs and Windows Event Viewer to show how windows connects to a wifi AP.
This is a reminder to flush your logs after wardriving, as the logs can keep what MAC you used and proves you connected to it.
The logs are found under Event Viewer>Applications and Services Logs>Microsoft>Windows>WLAN-AutoConfig>Operational
log path:
%SystemRoot%\System32\Winevt\Logs\Microsoft-Windows-WLAN-AutoConfig%4Operational.evtx
Log Information: Microsoft-Windows-WLAN-AutoConfig/Operational

-----------
Watch the Time clock to see how this event takes place in 2 seconds;

WLAN AutoConfig Service started a connection to a wireless network

Information

9/18/2009 4:38:45 PM WLAN-AutoConfig 8000 None
Log Name: Microsoft-Windows-WLAN-AutoConfig/Operational
Source: Microsoft-Windows-WLAN-AutoConfig
Date: 9/18/2009 4:38:45 PM
Event ID: 8000
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: Nomad_2
Description:
WLAN AutoConfig service started a connection to a wireless network.

Network Adapter: Dell Wireless 1397 WLAN Mini-Card
Interface GUID: {6bf8a49f-670a-4674-ba5d-17961840120f}
Connection Mode: Connection to an unsecure network without a profile
Profile Name: LaQuinta
SSID: LaQuinta
BSS Type: Infrastructure

-- Next event --
Wireless network association started.

Information
9/18/2009 4:38:45 PM WLAN-AutoConfig 11000 None
Log Name: Microsoft-Windows-WLAN-AutoConfig/Operational
Source: Microsoft-Windows-WLAN-AutoConfig
Date: 9/18/2009 4:38:45 PM
Event ID: 11000
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: Nomad_2
Description:
Wireless network association started.

Network Adapter: Dell Wireless 1397 WLAN Mini-Card
Interface GUID: {6bf8a49f-670a-4674-ba5d-17961840120f}
Local MAC Address: 00:22:5F:72:6E:B3
Network SSID: LaQuinta
BSS Type: Infrastructure
Authentication: Open
Encryption: None
802.1X Enabled: No

--next event --
Wireless network association succeeded.

Information
9/18/2009 4:38:46 PM WLAN-AutoConfig 11001 None
Log Name: Microsoft-Windows-WLAN-AutoConfig/Operational
Source: Microsoft-Windows-WLAN-AutoConfig
Date: 9/18/2009 4:38:46 PM
Event ID: 11001
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: Nomad_2
Description:
Wireless network association succeeded.

Network Adapter: Dell Wireless 1397 WLAN Mini-Card
Interface GUID: {6bf8a49f-670a-4674-ba5d-17961840120f}
Local MAC Address: 00:22:5F:72:6E:B3
Network SSID: LaQuinta
BSS Type: Infrastructure
Peer MAC Address: 00:0F:CC:0C:24:EC

--next event --
Wireless security started.

Information
9/18/2009 4:38:46 PM WLAN-AutoConfig 11010 None
Log Name: Microsoft-Windows-WLAN-AutoConfig/Operational
Source: Microsoft-Windows-WLAN-AutoConfig
Date: 9/18/2009 4:38:46 PM
Event ID: 11010
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: Nomad_2
Description:
Wireless security started.

Network Adapter: Dell Wireless 1397 WLAN Mini-Card
Interface GUID: {6bf8a49f-670a-4674-ba5d-17961840120f}
Local MAC Address: 00:22:5F:72:6E:B3
Network SSID: LaQuinta
BSS Type: Infrastructure
Peer MAC Address: 00:0F:CC:0C:24:EC
Authentication: Open
Encryption: None
FIPS Mode: Disabled
802.1x Enabled: No

--next event --

WLAN AutoConfig service has successfully connected to a wireless network.

Information
9/18/2009 4:38:46 PM WLAN-AutoConfig 8001 None
Log Name: Microsoft-Windows-WLAN-AutoConfig/Operational
Source: Microsoft-Windows-WLAN-AutoConfig
Date: 9/18/2009 4:38:46 PM
Event ID: 8001
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: Nomad_2
Description:
WLAN AutoConfig service has successfully connected to a wireless network.

Network Adapter: Dell Wireless 1397 WLAN Mini-Card
Interface GUID: {6bf8a49f-670a-4674-ba5d-17961840120f}
Connection Mode: Connection to an unsecure network without a profile
Profile Name: LaQuinta
SSID: LaQuinta
BSS Type: Infrastructure
BSSID: 00:0F:CC:0C:24:EC
PHY Type: 802.11g
Authentication: Open
Encryption: None
802.1x Enabled: No
The above you can see the steps that Windows WLAN autoconfig takes to connect to a wifi AP.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

http://www.laptopparts101.com/wireless-card/

Shows removal of a laptops wifi card

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

wifi PCAP interesting packets


Yahoo IM

Yahoo IM username leakage
Protocol: YMSG
In Packet:
Yahoo YMSG Messenger Protocol (Keep Alive)
Content: 0\300\200usernamehere\300\200
Value:usernamehere
Note:also in Plaintext in data field

Yahoo IM version
Protocol: YMSG
In Packet:
Skinname (status=Default)
Content: [truncated]: 211\300\200VoicePerSession:VoiceSession_1253302942=1=9.0.0.2162&2=us

Yahoo IM Logoff
Protocol: YMSG
In Packet:
Yahoo YMSG Messenger Protocol (Pager Logoff)
Note: you will see the computer do FIN/ACK to disconnect right after this.
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Locked