10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Penetration</strong> testing <strong>with</strong> multiple drones<br />

197<br />

# wpas.conf file for PFunEd network<br />

network¼{<br />

ssid¼"PFunEd"<br />

psk¼"fun<strong>and</strong>games!"<br />

key_mgmt¼WPA-PSK<br />

priority¼5<br />

}<br />

The wpas.conf file may be sent using the file transfer utility built into the Mesh-<br />

Deck. Alternatively, it could be created by sending a cat comm<strong>and</strong> redirected to a<br />

file. After the wireless adapter has been associated <strong>with</strong> the PFunEd network, you<br />

may have to run dhclient3 wlan0 in order to obtain an IP address.<br />

With the drone connected to the PFunEd network, hydra or another online password<br />

cracker may be used to attempt to crack the router password. The router is<br />

located at 192.168.2.1 <strong>and</strong> it has a Web administrative interface on port 80, the<br />

st<strong>and</strong>ard http port. Connecting a browser to the router causes the page at http://<br />

192.168.2.1/login.asp to be loaded. The comm<strong>and</strong> wget http://192.168.2.1/<br />

login.asp will download this page to the drone. The source for this file can then<br />

be displayed at the comm<strong>and</strong> console by running cat login.asp on the drone. A<br />

partial source code listing for this log-in page <strong>with</strong> important parts in bold is shown<br />

below:<br />

<br />

<br />

Login<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

User Name

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!