And the winner is…

Andrew vonNagy!

If you haven’t been following along, I ran a contest over the past week for the best wireless pen testing tip or trick.

As promised, I will be pre-ordering a copy of “Wireless Hacking Exposed” for Andrew.

Here was Andrews submission for the contest:

To PenTest WPA2 secured wireless networks, setup a honeypot AP and a Free-RADIUS WPE (wifi pwnage edition by Josh Wright) to harvest EAP/MS-CHAP credential hashes from improperly secured client devices which are not validating the RADIUS server. Then use John the Ripper or similar password cracking tool to crack the user password using a dictionary attack.

If you want more of Andrew’s wisdom, you can also check out his blog, “Revolution Wi-Fi” – It has some quality content.

Related Posts:

Advertisements

3 comments so far

  1. Trevelyn on

    Wait? Why would you go through the hassle of “free-radius” and “john the ripper?” Free-radius is ridiculously not-easy to setup and john the ripper is slow.
    If you were to go that way, I would recommend using PyCUDA python libraries that interface with the GPU for text/hash creation/comparison and cowpatty. As for the free-radius thing, use Airbase-NG and mimic the login authentication page with your own PHP/html script (similar to a “phisher”) that simply dumps the username/password to a text file and bridges connections to other wireless devices maybe via 3g?
    This would simulate a real authentication and login to a unsuspecting victim. (unless they try to access resources from the LAN) if you are worried about that, make a script that check the txt dump file from the php script. If it finds credentials it pulls down airbase-ng.
    To forward traffic ALL to your localhosted (apache2|lighttpd)/php you can easily use Ettercap or dsniff 🙂

    I like your website BTW and your Twitter feed is very informative, thanks!
    ~Douglas.

  2. Trevelyn on

    I actually showed this a few weeks back on my weblog, check out the first video, there’s even a screencast showing it off halfway through the episode. Maybe this weekend I will make a “fake” authentication page cloner video.


Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: