10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Penetration</strong> testing <strong>with</strong> a single beagle<br />

109<br />

FIGURE 5.10<br />

Successfully cracking WPA2 <strong>with</strong> aircrack-ng.<br />

be prompted for the correct one to crack. The results for a successful crack of the<br />

target network <strong>with</strong> password “moremoney” are shown in Figure 5.10. Note that<br />

it took our BeagleBone Black just over four minutes to crack this password.<br />

In our case, the password was in our wordlist. If this was not the case, we could<br />

attempt to create some custom passwords for the particular target organization. If that<br />

were to fail, we could try attacking Wi-Fi Protected Setup (WPS) <strong>with</strong> Reaver.<br />

Another possibility would be to attack the WEP protected PFE-Guest network. It<br />

is likely that the PFE-Guest network only provides Internet access, but the password<br />

for this network could provide some clues as to possible passwords for the PFE-<br />

Secure network. The sources listed earlier in the book might be useful for some more<br />

advanced techniques should all of these things fail.<br />

FINDING WHAT IS OUT THERE<br />

Now that the wireless password has been obtained, we can attach our Beagle to the<br />

network. While we could use the graphical tools to connect to the PFE-Secure network,<br />

it is a good idea to use comm<strong>and</strong> line tools in anticipation of working <strong>with</strong><br />

hacking drones later. The wpa_supplicant tool can be used to connect to encrypted<br />

(WPA/WPA2) networks. The easiest way to use wpa_supplicant is to create a<br />

configuration file. The appropriate configuration file for our case is just a couple<br />

lines long:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!