This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

I honestly am completely new to this, I want to learn and this was my first project.

How do I know which packets are important to me? This is a WEPA2 Secure network with a complex random password.

asked 17 Dec '13, 19:07

Takashi%20Hand's gravatar image

Takashi Hand
1111
accept rate: 0%


Do you mean WEP, or WPA2? Cracking WEP is easy, and there are lots of tutorials you can google for that. Cracking WPA2 with a preshared key... that's not usually so easy. I would start with WEP if you're just looking for a 'secure' wireless network to break into.

For WPA, the only method I know is kind of lame. With a relatively weak eight-character passphrase (not out of the norm for many Wifi networks), if you intercept a valid WPA handshake from another device you can effectively do a dictionary attack against the key hash (use a tool or script to create a key hash based on a password guess and compare it to what you intercepted), or you might be able to use a precomputed hash table if the network is using a well-known SSID. Long, complex passphrases with an uncommon SSID make a WPA2 PSK network pretty hard to break to my knowledge, though I haven't followed this space for a few years now.

For a practical guide to breaking into Wifi networks, one of my favourite books on it would be: http://www.amazon.com/Wi-Foo-The-Secrets-Wireless-Hacking/dp/0321202171/ref=sr_sp-atf_image_1_1?ie=UTF8&qid=1387342762&sr=8-1&keywords=wifoo

That's old, but it was a great overall reference guide for when I was studying this area, practically 10 years ago now. Wow.

Anyway, my advice is to read up on the subject and theory of how those networks work. I like to think of "Hacking" as Bart Simpson in that episode where Lisa was his babysitter, and when told to "go to bed" he went to his parent's room, as she failed to specify which bed. That is, hacking is really about exploiting or manipulating the rules of the protocol or security mechanism in use rather than actually breaking the rules, so you should learn the rules in play before figuring out how to best go about taking advantage of them or ultimately bypassing them.

Edit: I got carried away there a bit, but to answer on point the packets to care about for WPA2 are those of the four-way handshake from a valid host. That's if you're using the dictionary attack method against the passphrase.

permanent link

answered 17 Dec '13, 21:14

Quadratic's gravatar image

Quadratic
1.9k6928
accept rate: 13%

edited 17 Dec '13, 21:23

-1

youtube dot com

Learn how to filter out known good traffic

Download sample traces, sans have them etc

Best advice just start drilling down and understand what your seeing. It seems daunting at first but once you start looking you will begin to see. There is just to many ways to answer this question.

permanent link

answered 24 Dec '13, 21:16

rayyai%20beach's gravatar image

rayyai beach
403
accept rate: 0%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×146
×26

question asked: 17 Dec '13, 19:07

question was seen: 12,535 times

last updated: 24 Dec '13, 21:16

p​o​w​e​r​e​d by O​S​Q​A