WiFi Traffic Reconnaissance using Aircrack-ng Suite

Hello World! Wireless networks, unlike Ethernet and optical fibres, do not require physical access, and this makes it easier for anyone to passively monitor a network and capture all transmitted frames. Today, I will demonstrate a few tools from the aircrack-ng suite that can collect all in-flight frames such as beacon frames, probe request and probe response.

Since Aircrack-ng is one of the most well-known frameworks in the field of WiFi security, I'll leave the setup instructions up to you depending on the OS distribution you choose.

The labs for this demo were provided by pentester academy. I would recommend that you attempt the following labs.

Q1 Is phy2 interface capable of transmitting frames on channel 13?

You can list all wireless physical devices and interfaces attached to the system using the iw dev command. There is only one interface in managed mode in this case, wlan0.

As we all know, the ifconfig command returns information about operational interfaces (state is up) and other network details such as IP address. In this case, the command's output is empty, indicating that the wlan0 is in the down state.

Get wireless interface details

We can safely use the iw list command and pipe the output to the grep 13 because there is only one interface attached. A "no IR" flag is displayed next to the 2472 MHz frequency (13 channel).

I learned that a WiFi device is not allowed to transmit any frames if any frequency has the no-IR flag set, depending on the jurisdiction, from the Wireless Wiki page of the kernel.org.

Filter channel information from iw list

Answer – No

So we now know that this flag is depends on the regulating country. Let's take it a step farther. Using iw reg get to get the system's current regulatory domain, which in this case is 00 (or unknown).

Get the current regulatory country

To choose a regulatory domain among the available nations, use the iw reg set country ISO> command. In this example, I'm setting it to India, therefore IN is the country code. If you look for the no IR flag on channel 13, you will see that it is not present this time. That is, you may now broadcast beacon frames from channel 13.

Change the regulatory country and check channel 13

Q2 What is the BSSID of SSID "Home_Network"?

Before proceeding, set the wlan0 interface to monitor mode. This requires that the interface be in the down state. To configure and check the interface mode, use the instructions listed below. On wired networks, this is analogous to promiscuous mode.

ifconfig wlan0 down				# set the state of wlan0 to down
iwconfig wlan0 mode monitor		# set the interface mode to monitor
ifconfig wlan0 up				# set the state of wlan0 to up
iwconfig wlan0					# verify the configuration of wlan0
ifconfig						# get information of all interface with state up
Group of commands to set up wlan0 in monitor mode
Set the wlan0 in monitor mode

As you may have seen from my recent postings on Wifi Traffic Analysis in Wireshark, the beacon frames contain the transmitter address wlan.ta, which is really the access point's BSSID. As a result, you may run airodump-ng "wlan0" to capture all becon frames on the network.

Capture all the beacon frames in the air

Answer – D2:69:10:37:F5:94

You may also use the --essid filter argument to limit the output to a certain SSID, as illustrated below.

airodump-ng --essid "Home_Network" wlan0
Using --essid flag from filters group
Filtering beacons for Home_Network SSID

Q3 What is the MAC address of the client connected to SSID "Corporate"?

The SSID filter argument (--essid) has no effect on probe requests. Therefore, from the first output in question 2, we can find out that just one client is connected to the Corporate access point.

The first section displays the beacon frames from the hotspot devices, while the second section displays the probe requests or associations of the clients or stations.
Station address connected to Corporate SSID

Answer – 02:00:00:00:07:00

Q4 A WEP network is also present in the vicinity. This network is on which channel?

We can see from the screenshots of question 2 that Home_Network is using WEP encryption and broadcasts on channel 4.

WiFi hotspot using WEP encryption

Answer – Home_Network

Q5 How many WiFi networks are present on channel 1?

You may already be aware that channels are used to split and share the band in order to allow data exchange without interference. By default, airodump-ng changes channels to pick up beacons from all hotspots in the band. We can see that the --channel option can be used to fix the channel from the output of the airodump-ng help command.

Airodump help message

Because we only want to capture traffic on channel 1, use the airodump-ng command with the --channel 1 flag. This will only display the beacons on channel 1. (2412 MHz).

airodump-ng --channel 1 wlan0
Airodump-ng command to capture traffic on channel 1
Capture beacons from only channel 1

Answer – 3

Q6 Which WiFi network is using the WPA-PSK security scheme on channel 1?

It's Forex_Magic since we have the capture output for channel 1 in question 5.

WiFI network with WPA-PSK security scheme

Answer – Forest_Magic

Q7 A hidden SSID is present in the vicinity. This network is operating on which channel?

The question states the "hidden SSID", but as we have seen, channel 1 does not contain it. To find the solution we need, remove the channel filter from the airodump-ng command. You will then notice an entry having the ESSID value <length: 0>.

WiFi network with hidden or empty SSID

Answer – 6

Q8 What is the BSSID of the SSID "EvilCorp" operating on channel 1?

This is rather simple; we need to apply two filters: one for the channel and one for the SSID. You can accomplish this by using the command line shown below.

airodump-ng --channel 1 --essid "EvilCorp" wlan0
Command to filter the capture traffic for EvilCorp SSID on channel 1
If the channel was not specified, we may obtain three responses for this question since, as you know from question 7, there are three WiFi networks with the "EvilCorp" SSID.
Filtered capture data on the wireless network

Answer – B8:0D:F7:6E:79:5A

Q9 How many BSSIDs are present for the SSID "EvilCorp" in total?

Again, based on question 7, we may conclude that there are three BSSIDs with the EvilCorp SSID. But, if you look at the channel switching, you'll notice that it only searches in the 2.4 GHz band by default and ignores the 5 GHz band. To obtain the real number of WiFi networks with the required SSID, run airodump-ng on both bands (2.4 GHz and 5 GHz). This may be accomplished by executing the following command.

airodump-ng --band abg --essid "EvilCorp" wlan0
Command to run beacon capturing on 2.4 GHz and 5 GHz

In this case, the band name is the 802.11 amendment letter - 802.11[band]. That is, an is for 5 GHz while the rest are for 2.4 GHz.

Q10 What is the MAC address of the client associated with SSID "EvilCorp"?

So I ran the command from question 9 for a long time but saw no traffic flow from the station. This might be because it is currently inactive. To get to the solution, we must force the client to transmit packets to the hotspot so that airodump-ng can capture them and display the MAC address.

But there's a catch! One of them transmits the deauthentication frame when a client or hotspot tries to disconnect, and the recipient's only response is to acknowledge the frame and disconnect. Additionally, there is currently no means to verify that the deauth packet is being transmitted from a legitimate device and not an infected WiFi device. You can actually take advantage of this and use aireplay-ng to broadcast the deauthentication packets on behalf of the "EvilCorp" SSID, forcing the client to reconnect to the hotspot.

aireplay-ng --deauth 100 -e EvilCorp wlan0
Aireplay-ng command to broadcast 100 deauth packets on behalf of EvilCorp SSID 
Sending deauth packets is a particularly loud attack since it disconnects all users at once.

You must run the following airodump-ng command on all the channels and bands that the EvilCorp hotspot device uses to send its beacon in order to be able to record probe and association requests from the client.

airodump-ng --band abg --essid EvilCorp --channel 1,6,11,36,132 wlan0
Command to filter the the channels transmitting 

Look at what we have! Finally, the client is connected to the EvilCorp network (channel 36), and its MAC address was obtained from the STATION column.

Answer – 02:00:00:00:07:00