Summary
- This is the third blog post on Wireless Penetration Testing certifications in preparation for the Offensive Wireless Professional (OSWP) exam.
- This article is a complete walkthrough of the WEP challenge delivered by WifiChallenge Lab, which is available as a Docker container.
- The OSWP exam consists of three challenges, and this article gives a detailed, easy-to-follow walkthrough of the WEP challenge.
- The attack consists of four parts:
- Enumerate Wifi networks and select the target WEP Access Point (AP) to attack.
- Capture the authentication handshake.
- Crack the handshake.
- Connect to the target network.
- This article also includes a bonus section on how to evade MAC address filtering.
- MAC address filtering can be used on top of WEP, WPA2-PSK, and WPA2-MGT, and with ‘MAC spoofing’, an attacker can connect with an existing IP address.
By Nol White Hat
Original Article