20 Analyzing networks with Acrylic WiFi Wifi Hacking

in #steemstem5 years ago

acrylic analyzer is a tool to detect and

enable testing of wireless networks a

free version is available and can be

downloaded from the website shown the

professional version is reasonably

priced and has a lot of features I'll be

using that one in this demonstration

acrylic analyzer can be used for

detecting wireless networks and for

identifying Network strengths during a

walk around or war drive and for

identifying clients associated with the

access points it also provides wireless

network packet capture and testing of

passwords and pins on starting acrylic

analyzer the main screen comes up in the

access point view the Wi-Fi symbol at

the top I can press the play button to

start detecting networks the main pane

shows the SSID the bssid the received

signal strength the channel some quality

of security information and if we slide

across we can see the vendor information

and details of the type of access point

in the packages process the pane at the

bottom provides a moving trace of signal

strength clicking on an access point

will select the entry and subsequent

actions such as the lower tabs will

provide additional information for that

entry I can also right click on an entry

and get a further context menu let's

have a look at some of these options

I'll select add to inventory adding a

device to the inventory allows me to put

in a friendly name I'll make this one

Telecom modem and this will be displayed

instead of the bssid ok I'll save this

if I want to see my inventory I can

click on the options symbol at the top

right select windows and select the

bottom menu item inventory I can right

click the entry I've just added and I

have a maintenance menu for inventory

items this is really useful to keep

track of devices on your home network

and of course it's invaluable for a

small business with its larger fleet of

equipment the lock to channel option

locks acrylic to the channel of the

selected entry and it's useful for

limiting the amount of information

being updated the next context option

show WPS information provides a

numeration of the access point through

WPS messages this provides manufacturer

model and number device name serial

number and so on I'll select my home

network and I'll select Center

connectivity module this option allows

us to run a dictionary attack against an

access point to test its resilience we

need to use a free interface so I'll

select the Atheros acrilic provides a

small demonstration dictionary with a

few entries for serious use would need

to set up our own set of dictionaries

I'll select the default dictionary and

set it I'll select the connectivity tab

in the lower pane and we can see that we

have the tasks registered I've

disconnected my system from the network

as acrylic needs to use the connection

for this test I'll right-click and start

the attack the status information on the

right advisors progress and we can see

that the password so far are failing

I'll leave this at the moment while it

runs through the dictionary now it's

tried the password ABCD 1 9 9 4 and it

finishes the testing having found the

network key the chronique provides

options to capture the details of the

scan and it can be tweeted copied to the

clipboard for reporting or exported in

various forms ok that's a quick look at

some of the main pane options and I'll

leave them for now the lower pane has a

number of tabs the signal strengths tab

provides a summary view of access point

signal strength the network quality tab

provides a detailed analysis of the

signal for the selected access point

including its speed signal-to-noise

ratio and security the 2.4 gigahertz and

5 gigahertz tabs provide a view of which

access points are operating in what part

of their spectrum the networks requested

tab shows us which client devices have

requested access to the selected access

point

the detailed information tab provides

the details of the access point or

client its manufacturer model and serial

number

if device name and its capabilities

before I leave the access point view I

select the options symbol at the top

right and select change in the top entry

we can see monitor mode is off and we're

using the built-in interface of turn on

monitor mode and I'll select it as EOS

interface and press ok the main pane

will clear and then start to refresh

using the signals captured by the

ethereal we see the access points again

but now we can also see a plus sign to

the left of the SSID this is shown where

an access point has device activity and

the associated devices can be seen by

expanding the plus sign here we see the

MAC address of the clients on my home

network the client of course don't have

a channel shown they use their access

point channel the next view is the

station's view and I select that by

clicking the cell phone icon to the

right of the access point Wi-Fi symbol

this view shows all the bssid that have

been identified by acrylic with their

information enumerated these are shown

as access points or clients or undefined

active or passive devices we can see

activity taking place as clients request

associations right-clicking an entry

provides a similar set of options to the

access point screen with the exception

of the lock to channel option which is

replaced by add to multicast option

which isn't currently active the next

view at the top is the wireless packets

view selecting the view shows the

package screen but with no packets to

see the packets I need to turn on packet

viewing the packets are shown as entries

in the top pane their full radio frames

with their I Triple E 8 of 2.11 framing

if we're interested in IP packets

they're held inside the I Triple E 8 of

2.11 packets in the data section I have

a scroll bar on the right and if I move

it down I can see that we've got

management control and data packets

if I click on the packet we see the

radio packet structure shown in the

bottom left pane and the raw data in the

bottom-right pane note that the

structure is limited to the Wi-Fi

elements and the data content isn't

structured in any more detail if I

expand the packets we can see the

structure IP information is held inside

the I Triple E 802 dos eleven packets in

the data section but if the air

component of the path is encrypted then

we won't see a great deal of useful

information

however this X will access point is open

and I've just pinged it we can see a

data packet from the Shenzhen device

that's my luminosity tab to the ZyXEL I

can select a field in the left-hand

bottom pane and right click and add that

to the filter now we've got a manageable

list of packets originating from the

luminosity I'll select the data packs

above it and I'll expand the data field

I'll click on content and the content

part of the packet on the right is

highlighted we can see the expected four

five zero zero IP header field and the

plain text contents in the packet on the

right the next major tab at the top is

the script tab and we can see a number

of scripts come included with acrylic

the top section is for WPA keys and the

bottom 4 WPS pin codes scripts are used

to assist with the testing of passwords

and pins this is a powerful feature in

an advanced topic so I won't delve into

it any further ok so that's a quick run

through the main features of acrylic

Wi-Fi professional a serious tool for

wireless testers there's also a

commercial companion Wi-Fi heat map tool

available from the acrylic website but

can be used to do Wi-Fi signals spent

mapping throughout complex sites