gbhackers.com Open in urlscan Pro
2606:4700:3030::6815:22df  Public Scan

Submitted URL: https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/#:~:text=%20Wireless%20Network%20P...
Effective URL: https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/
Submission: On April 14 via manual from CA — Scanned from CA

Form analysis 4 forms found in the DOM

GET https://gbhackers.com/

<form method="get" class="td-search-form" action="https://gbhackers.com/">
  <div class="td-search-close">
    <a href="#"><i class="td-icon-close-mobile"></i></a>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

GET https://gbhackers.com/

<form method="get" class="td-search-form" action="https://gbhackers.com/">
  <div role="search" class="td-head-form-search-wrap">
    <input id="td-header-search" type="text" value="" name="s" autocomplete="off"><input class="wpb_button wpb_btn-inverse btn" type="submit" id="td-header-search-top" value="Search">
  </div>
</form>

<form id="commentform" class="comment-form">
  <iframe title="Comment Form"
    src="https://jetpack.wordpress.com/jetpack-comment/?blogid=116523949&amp;postid=8504&amp;comment_registration=0&amp;require_name_email=1&amp;stc_enabled=0&amp;stb_enabled=0&amp;show_avatars=1&amp;avatar_default=mystery&amp;greeting=Leave+a+Reply&amp;greeting_reply=Leave+a+Reply+to+%25s&amp;color_scheme=light&amp;lang=en_US&amp;jetpack_version=8.4.3&amp;show_cookie_consent=10&amp;has_cookie_consent=0&amp;token_key=%3Bnormal%3B&amp;sig=3bccc26a96e0013f3861847dcd870485aef96279#parent=https%3A%2F%2Fgbhackers.com%2Fwireless-penetration-testing-checklist-a-detailed-cheat-sheet%2F"
    style="width:100%; height: 430px; border:0;" name="jetpack_remote_comment" class="jetpack_remote_comment" id="jetpack_remote_comment" sandbox="allow-same-origin allow-top-navigation allow-scripts allow-forms allow-popups" scrolling="no"></iframe>
  <!--[if !IE]><!-->
  <script>
    document.addEventListener('DOMContentLoaded', function() {
      var commentForms = document.getElementsByClassName('jetpack_remote_comment');
      for (var i = 0; i < commentForms.length; i++) {
        commentForms[i].allowTransparency = false;
        commentForms[i].scrolling = 'no';
      }
    });
  </script>
  <!--<![endif]-->
</form>

POST #

<form action="#" method="post" class="es_subscription_form es_shortcode_form" id="es_subscription_form_1649965778" data-source="ig-es">
  <div class="es-field-wrap"><label>Name<br><input type="text" name="name" class="ig_es_form_field_name" placeholder="" value=""></label></div>
  <div class="es-field-wrap"><label>Email*<br><input class="es_required_field es_txt_email ig_es_form_field_email" type="email" name="email" value="" placeholder="" required=""></label></div> <input type="hidden" name="lists[]" value="1"> <input
    type="hidden" name="form_id" value="0">
  <input type="hidden" name="es_email_page" value="8504">
  <input type="hidden" name="es_email_page_url" value="https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet/">
  <input type="hidden" name="status" value="Unconfirmed">
  <input type="hidden" name="es-subscribe" id="es-subscribe" value="c615bad13d">
  <label style="position:absolute;top:-99999px;left:-99999px;z-index:-99;"><input type="email" name="es_hp_email" class="es_required_field" tabindex="-1" autocomplete="-1" value=""></label>
  <input type="submit" name="submit" class="es_subscription_form_submit es_submit_button es_textbox_button" id="es_subscription_form_submit_1649965778" value="Subscribe">
  <span class="es_spinner_image" id="spinner-image"><img src="https://gbhackers.com/wp-content/plugins/email-subscribers/lite/public/images/spinner.gif" data-pagespeed-url-hash="206255346"
      onload="pagespeed.CriticalImages.checkImageForCriticality(this);" class="td-animation-stack-type0-2" data-large_image_width="1600" data-large_image_height="1600"></span>
</form>

Text Content

 * Home
 * Hacks
   * Data Breach
   * PCI DSS Breach
   * Cryptocurrency hack
   * Mobile Attacks
   * Password Cracking
 * THREATS
   * DDOS
   * Malware
   * Phishing
   * Ransomware
   * Torjan Horses/worms
   * Viruses
   * CVE/vulnerability
 * PENTEST
   * Webapp Pentesting
     * OWASP – Top 10
   * Network Pentesting
   * Android Pentesting
 * KALI
 * SOC
   * SIEM
   * SOC Architecture
   * SOC Resources
 * Infosec
 * TOOLS
   * Courses
   * Tutorials
 * Courses


Search

Thursday, April 14, 2022
 * Home
 * kalitutorials
 * Malware
 * Ransomware
 * Cryptocurrency hack
 * SOC Resources
 * GBH Team


GBHackers On Security

 * Home
 * Hacks
   * Data Breach
   * PCI DSS Breach
   * Cryptocurrency hack
   * Mobile Attacks
   * Password Cracking
 * THREATS
   * DDOS
   * Malware
   * Phishing
   * Ransomware
   * Torjan Horses/worms
   * Viruses
   * CVE/vulnerability
 * PENTEST
   * Webapp Pentesting
     * OWASP – Top 10
   * Network Pentesting
   * Android Pentesting
 * KALI
 * SOC
   * SIEM
   * SOC Architecture
   * SOC Resources
 * Infosec
 * TOOLS
   * Courses
   * Tutorials
 * Courses


 * PENTESTING


WIRELESS NETWORK PENETRATION TESTING CHECKLIST – A DETAILED CHEAT SHEET

By
BALAJI N
-
October 28, 2021
1

x

x

Wireless Penetration testing actively examines the process of Information
security Measures which is Placed in WiFi Networks and also analyses the
Weakness, technical flows, and Critical wireless Vulnerabilities.

Most important countermeasures we should focus on Threat  Assessment, Data theft
Detection, security control auditing, Risk prevention and Detection, information
system Management, Upgrade infrastructure and the Detailed report should be
prepared.



Also Read:    Top 5 Best WiFi Hacking Apps For Android


FRAMEWORK FOR WIRELESS PENETRATION TESTING

1. Discover the Devices which connected with  Wireless Networks.

‒‒:‒‒
/
02:12











2. Document all the findings if Wireless Device is Found.

3. If wireless Device found using Wifi Networks, then perform common wifi
Attacks and check the devices using WEP Encryption.

4. if you found WLAN using WEP Encryption then Perform WEP Encryption
Pentesting.

5. Check whether WLAN Using WPA/WPA2 Encryption .if yes then perform WPA/WPA2
pentesting .

6. Check Whether WLAN using LEAP Encryption .if yes then perform LEAP
Pentesting.

7. No other Encryption Method used which I mentioned above, Then Check whether
WLAN using unencrypted.



8. If WLAN is unencrypted then perform common wifi network attacks, check the
vulnerability which is placed in unencrypted method and generate a report.

9. Before generating a Report make sure no damage has been caused in the
pentesting assets.

ALSO READ:    PENETRATION TESTING WITH YOUR WORDPRESS WEBSITE


WIRELESS PENTESTING WITH WEP ENCRYPTED WLAN

1.Check the SSID and analyze whether SSID Visible or Hidden.

2.  Check for networks using WEP encryption.

3.If you find the SSID as visible mode then try to sniff the traffic and check
the packet capturing status.

4. If the packet has been successfully captured and injected then it’s time to
break the WEP  key by using a WiFi cracking tool such as Aircrack-ng, WEPcrack .

4. If packets are not reliably captured then sniff the traffic again and capture
the Packet.

5. If you find SSID is the Hidden mode, then do Deauthentication the target
client by using some of deauthentication tools such as Commview and Airplay-ng.

6.Once successfully Authenticated with the client and Discovered the SSID , then
again follow the Above Procedure which is already used for discovered SSID in
earlier steps.

7.Check if the Authentication method used is OPN (Open Authentication) or SKA
(Shared Key Authentication). If SKA is used, then bypassing mechanism needs to
be performed.

9.Check if the STA (stations/clients) are connected to AP (Access Point) or not.
This information is necessary to perform the attack accordingly.

If clients are connected to the AP, Interactive packet replay or ARP replay
attack needs to be performed to gather IV packets which can be then used to
crack the WEP key.

If there’s no client connected to the AP, Fragmentation Attack or Korex Chop
Chop attack needs to be performed to generate the keystream which will be
further used to reply ARP packets.

10.Once the WEP key is cracked, try to connect to the network using
wpa-supplicant and check if the AP is allotting any IP address or not.”EAPOL
handshake”

Also Read:   Web Server Penetration Testing Checklist


WIRELESS PENETRATION TESTING WITH WPA/WPA2 ENCRYPTED WLAN

1. Start and Deauthenticate with WPA/WPA2 Protected WLAN client by using WLAN
tools Such as Hotspotter, Airsnarf, Karma, etc .

2. If the Client is Deaauthenticated, then sniff the traffic and check the
status of captured EAPOL Handshake.

3.If the client is not Deauthenticate then do it again.

4.Check whether EAPOL handshake is captured or Not.

5.Once you captured EAPOL handshake, then perform PSK Dictionary attack using
coWPAtty , Aircrack-ng to gain confidential information.

6. Add Time-memory trade off method (Rainbow tables) also known as WPA-PSK
Precomputation attack for cracking WPA/2 passphrase. Genpmk can be used to
generate pre computed hashes.

7.if its Failed then Deauthenticate again and try to capture again and redo the
above steps.


LEAP ENCRYPTED WLAN

1. Check and Confirm whether WLAN protected by LEAP Encryption or not.

2.De-authenticate the LEAP Protected Client using tools such as karma,hotspotter
etc.

3. if client is De authenticated then break the LEAP Encryption using tool such
as asleap to steal the confidential information

4.if process dropped then de authenticate again


PENETRATION TESTING WITH UNENCRYPTED  WLAN

1.Check whether SSID is Visible or not

2. sniff for IP range if SSID is visible then check the status of MAC Filtering.

3, if MAC filtering enabled then spoof the MAC Address by using tools such as
SMAC

4.Try to connect to AP using IP within the discovered range.

5.If SSID is hidden then discover the SSID using Aircrack-ng and follow the
procedure of visible SSID which i Declared above.

Also Read: Advanced ATM penetration testing methods

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates


SHARE AND SUPPORT US :

 * Click to share on Facebook (Opens in new window)
 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Twitter (Opens in new window)
 * 100Click to share on Pinterest (Opens in new window)100
 * Click to share on Telegram (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * 

 * TAGS
 * PENTESTING
 * wireless

BALAJI N
http://www.gbhackers.com
BALAJI is a Security Researcher, Editor-in-Chief, Author & Co-Founder of
GBHackers On Security, Ethical Hackers Academy, Cyber Security News.



RELATED ARTICLESMORE FROM AUTHOR


PENTESTING


MOST IMPORTANT WEB APPLICATION PENTESTING TOOLS & RESOURCES – 2022


Infosec- Resources


HOW TO PERFORM EXTERNAL BLACK-BOX PENETRATION TESTING IN ORGANIZATION WITH
“ZERO” INFORMATION


Computer Security


MODERN CYBERSOC – A BRIEF IMPLEMENTATION OF BUILDING A COLLABORATIVE CYBER
SECURITY INFRASTRUCTURE



1 COMMENT

 1. Whistler March 23, 2020 at 5:55 am
    
    Need a copy
    
    Reply




LEAVE A REPLY CANCEL REPLY



COMPLETE FREE WEBSITE SECURITY CHECK

COMPLETE FREE WEBSITE SECURITY CHECK



NEWSLETTER

SIGNUP TO GET HACKING NEWS & TUTORIALS TO YOUR INBOX

Name

Email*



COMPUTER SECURITY


HIGH-LEVEL WAYS TO IMPROVE APPLICATION SECURITY THROUGH TESTING

February 7, 2022


BEST SIEM TOOLS FOR SOC TEAM – 2022

January 20, 2022


CHINESE HACKERS USING LOG4SHELL EXPLOIT TOOLS TO PERFORM POST-EXPLOITATION
ATTACKS

January 4, 2022


RANSOMWARE AFFILIATE ARRESTED FOR SELLING STOLEN DATA OF 300 MILLION PEOPLE

December 15, 2021


DOZEN OF MALICIOUS NPM PACKAGES CAUGHT HIJACKING DISCORD SERVERS

December 10, 2021
Load more
ABOUT US
GBHackers on security is a Cyber Security platform that covers daily Cyber
Security News, Hacking News, Technology updates and Kali Linux tutorials. Our
mission is to keep the community up to date with happenings in the Cyber World.
Contact us: admin@gbhackers.com
FOLLOW US
 * Home
 * TECH NEWS
 * Infosec- Resources
 * OWASP – Top 10
 * Privacy Policy
 * Contact Us
 * About Us

© GBHackers on Security 2016 - 2022. All Rights Reserved

Edit with Live CSS


Save
Write CSS OR LESS and hit save. CTRL + SPACE for auto-complete.