Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
In this lesson, students will get an opportunity to develop the skills to configure Airgeddon to perform a Wi-Fi Denial of Service (DoS) attack.
In the penetration testing industry there are a few models that are used to explain the step by step process of hacking a target in a way that can be easily replicated, the 5 stages of ethical hacking is the most common. If this process is undertaken correctly and accurately, the evidence of an attack and compromise can go undetected for a very long time. It is important for IT System Administrators to understand these processes, so they know what to look and be vigilant against any potential cyber attack.
Airgeddon is an open-source and free tool that can be downloaded from GitHub directly onto Raspbian or Kali Linux and then implemented to attack Wi-Fi systems. It is important to stress to the students that attacking networks that they don’t have explicit permission is highly illegal but setting up an old router without access to the Internet to test these tools in a controlled environment is fine.
Airgeddon is a Bash script application that integrates the wireless interfaces plugged into the Raspberry Pi, which is why we need the Alfa card that can go into monitor mode. Monitor mode is when a Wi-Fi card can sniff the packets being sent within its range without connecting to that network; think of it as the ability to listen to a conversation as you walk down the street. In this project we also need the ability to inject packets into other networks that we aren’t connected to as well. This is another ability of the specific chipset of the Alfa Wi-Fi card. This is the platform for further attacks like man-in-the-middle attacks. Man-in-the-middle attacks occur when the attacker is set up between a legitimate user and their intended recipient and can change data on the move to either intercept it or change it as it is sent.
Deauth frames were designed from the beginning of the IEEE 802.11 protocol as a sanctioned technique to inform a rogue station that they have been disconnected from the network. This is a valid packet that can be sent to any device on Wi-Fi and it will respond unless it has been told to ignore traffic coming from a specific target (This is rare!). The protocol doesn’t require any encryption for this frame, all you need is the victims MAC address, which is easy to discover using Airgeddon.
DoS attacks are designed to disrupt network activity and can be used to force a connection to a rogue access point instead of a legitimate one. DoS attacks are typically one attacker bombarding a victim with a flood of traffic to overload the capacity of that device and prevent legitimate traffic from being processed. Airgeddon has a range of different protocols that can be used to cause a Wi-Fi DoS, each uses a slightly different protocol, but the most common is a deauth aireplay attack which floods a network with deauth frames to force each device off the network. Remember this will also start to de-authenticate the Raspberry Pi as well, because it is probably using both Wi-Fi cards, the Alfa card and the internal card in the Raspberry Pi. DoS and Distributed Denial of Service (DDoS) attacks vary mainly regarding how much traffic is bombarding the target and where it is originating from. DoS comes from a single attacker, whereas DDoS comes from millions of attackers that are automated using a botnet or malware and focusing on a single target.
suggested Year Group
The suggested age group is 16 +, due to the nature of this project and the skills it is developing.
1. Understand how different tools in Linux are used for a range of purposes;
2. Understand how to configure Airgeddon to perform a Wi-Fi Denial of Service (DoS) attack;
3. Understand how Wi-Fi DoS attacks work.
Component Number (Peli Case)
(Base) 4 + 5
(Level 1) 6
(Level 1) 3
(Level 1) 3
(Level 1) 3
(Level 1) 5
(Level 1) 1
Component Number (Box Case)
Raspberry Pi + Case
Raspbian SD Card
Power Supply Unit
Remember, attacking a network you don’t have express permission to perform an attack like this is illegal and needs to be done in a safe, contained environment. Most Wi-Fi networks are susceptible to this kind of attack because they have no way to prevent a deauth frame from being processed. Set up your own network with an old router at home that isn’t connected to the internet. Try different types of attacks and see if you can brute force the password of your network, it would also be possible to combine different types of attack that are available within Kali and try and automate these processes using Bash. Explore the 5 stages of ethical hacking and try to discover different tools that are used in different stages and different types of attack.