WiFi RECON

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

LEARNING OUTCOMES

1.         Understand the fundamentals of Wi-Fi;

         Gain a better understanding of Linux;

3·         Use Kismet to scan local Wi-Fi and discover the associated data.

 

HARDWARE REQUIRED

Component Number (Peli Case)

(Base) 4 + 5

(Base) 5

(Base) 1

(Level 1) 6

(Base) 9

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

Component Number (Box Case)

Slot 1

Slot 11

Slot 3

Slot 12

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case

Raspbian SD Card

USB GPS

Alfa WiFi Card

TFT Screen

HDMI

Wireless Keyboard

Wireless Mouse

Power Supply

 

VIDEO GUIDE

 

Conclusions

The purpose of this project was to illustrate how much data is freely available when you use Wi-Fi. The Wi-Fi name, IP address, MAC address, encryption standard and wireless clients could all be exposed and exploited. Once you have found a target it is only a matter of time before you are able to break the encryption and have access to the network. Wireless Encryption Protocol (WEP) has been compromised for a very long time, but many Wi-Fi routers are still installed with and use WEP. WPA and WPA2 take longer but are still vulnerable to attack, and you can still search the reports generated for specific devices and MAC addresses. The information you find as a result of this project needs to be deleted promptly and NEVER used for malicious purposes. It is important to understand this information and how it can be used; for example, a network admin could scan their network to search for legitimate wireless devices and discover any wireless devices that shouldn’t be connected to their network and blacklist them. Research what encryption standards are available for Wi-Fi and the different attacks each is vulnerable to.