Automating Wireless Network Cracking :
In this recipe we will
use Gerix to automate a wireless network attack. Gerix is an automated GUI for
AirCrack. Gerix comes installed by default on Kali Linux and will speed up your
wireless network cracking efforts.
Getting ready
A supported wireless card
configured for packet injection will be required to complete this recipe. In
the case of a wireless card, packet injection involves sending a packet, or
injecting it, onto an already established connection between two parties.
How to do it...
Let's begin the process
of performing an automated wireless network crack with Gerix by downloading it.
1.
Using wget, navigate to the following website to
download Gerix.
2.
Once the file has been
downloaded, we now need to extract the data from the RAR file.
unrar x gerix-wifi-cracker-master.rar
3.
Now, to keep things
consistent, let's move the Gerix folder to the /usr/share directory with the other penetration testing tools.
mv gerix-wifi-cracker-master /usr/share/gerix-wifi-cracker
4.
Let's navigate to the
directory where Gerix is located.
cd /usr/share/gerix-wifi-cracker
5.
To begin using Gerix,
we issue the following command:
python gerix.py
6.
Click on the Configuration tab.
7.
On the Configuration tab, select your wireless interface.
8.
Click on the Enable/Disable Monitor
Mode button.
9.
Once Monitor mode has
been enabled successfully, under Select Target Network, click on the Rescan Networks button.
10.
The list of targeted
networks will begin to fill. Select a wireless network to target. In this case,
we select a WEP encrypted network.
11.
Click on the WEP
12.
Under Functionalities, click on the Start Sniffing and Logging button.
13.
Click on the subtab WEP Attacks (No
Client).
14.
Click on the Start false access
point authentication on victim button.
15.
Click on the Start the ChopChop
attack button.
16.
In the terminal window
that opens, answer Y to the Use this packet question.
17.
Once completed, copy
the .cap file generated.
18.
Click on the Create the ARP packet
to be injected on the victim access point button.
19.
Click on the Inject the created
packet on victim access point button.
20.
In the terminal window
that opens, answer Y to the Use this packet question.
21.
Once you have gathered
approximately 20,000 packets, click on the Cracking tab.
22.
Click on the Aircrack-ng – Decrypt
WEP Password button.
That's it!