Summary

  • This is the third blog post on Wireless Penetration Testing certifications in preparation for the Offensive Wireless Professional (OSWP) exam.
  • This article is a complete walkthrough of the WEP challenge delivered by WifiChallenge Lab, which is available as a Docker container.
  • The OSWP exam consists of three challenges, and this article gives a detailed, easy-to-follow walkthrough of the WEP challenge.
  • The attack consists of four parts:
  • Enumerate Wifi networks and select the target WEP Access Point (AP) to attack.
  • Capture the authentication handshake.
  • Crack the handshake.
  • Connect to the target network.
  • This article also includes a bonus section on how to evade MAC address filtering.
  • MAC address filtering can be used on top of WEP, WPA2-PSK, and WPA2-MGT, and with ‘MAC spoofing’, an attacker can connect with an existing IP address.

By Nol White Hat

Original Article