10
« on: December 07, 2015, 12:56:07 pm »
Hello everyone!
I'm using kali linux on virtual box on my macbook pro and here is how i connected my wifi adapter chipset RT3072 to be able to attemp some hacks:
* Opened virtualbox devices/network clicked on "connect network adapter"
* Then network setting and set--> attached to: bridge adapter and name: en0:wi-fi (airport)
* Cliked on Devices/USB and clicked on my adapter which is RALINK 802.12 n wlan [0101]
I THINK THIS IS CORRECT SETTING BUT IF YOU THINK IT IS NOT PLEASE LET ME KNOW.
After this point I'm having 2 big problems:
1 - trying to bypass an internet hotspot login page
2 - cracking wpa2 password.
First of all i want to say that i'm on a place where they have:
* one hidden open network (which i know the name of) where you have to enter your first name/last name/cabin number/password to login,then buy an internet plan (which is time dependent,pay per hours) and then decide or not to connect to the internet. So basically everyone that wants to use internet has to login first and then on the next page click on CONNECT to be able to use internet,then its when the counter starts.
* Then they also have another hidden network (which i know the name of) but encrypted wpa2.
* And many routers around the place to repeat the signal and allow people to connect wirelessly everywhere.
BYPASSING THE LOGIN PAGE
So,first of all what i tried to do was trying to bypass the login page doing this:
– open terminal in kali linux and type:
* Ifconfig (to see my wifi adapter wich in my case was wlan0)
– then type in order:
* ifconfig wlan0 down
* Iwconfig wlan0 mode monitor
* Ifconfig wlan0 up
(I did this way to enter the monitor mode because for some reason when i typed: airmon-ng wlan0 and then airodump-ng wlan0 didn't work)
– Then i typed:
* iwconfig (and i could see the wlan0 that was in mode:monitor)
– Then i run the command to monitor the network around me:
* airodump-ng wlan0
And now it showed me many network around me (see pictures below) *i just blured the mac addresses for privacy reason*
As you can see in the photos some of the network shows the ESSID (name of the network) but most of the others don't and they show <lengh: 1> (which i have no idea what they are).
After few minutes the monitoring finishes and at the bottom of the page appears this:
PROBLEM 1: As you can see it doesn't show any string details,nothing, and i don't know why! i can't even proceed to copy one of the MAC addresses of the devices connected to it and spoof it to my MAC address to be able to bypass the login to use free internet because as i said there is nothing in there.
CAN ANYONE GIVE ME SOME HELP ON THIS?
Ps: DO YOU THINK IS POSSIBLE TO BYPASS THIS KIND OF LOGIN PAGE TO USE FREE INTERNET?
CRACKING THE WPA2 PASSWORD
PROBLEM 2: I wanted to try to crack one of the network on the list that has wpa2 encryption.
After the list has shown up (see above) no strings appeared at the bottom page (which is a problem as i already mentioned before).
Said so,i tried to open a new page to check if the networks that i wanted to attack was using WPS protocol and typed:
* wash -i wlan0 (and this is what it showed me)
As you can see it says repeatedly "found packet with bad FCS, skipping.." And in this way i can't even proceed to crack the wpa2 network.
DOES ANYONE KNOW WHY?
IF YOU COULD HELP ME IN THIS WOULD BE GREAT AND MUCH APPRECIATED.
THANK YOU A LOT IN ADVANCE