Search Results for: phishing attacks

[eBook] A Step-by-Step Guide to Cyber Risk Assessment

April 12, 2023 In today’s perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats, including ransomware, phishing, attacks on infrastructure, supply chain breaches, malicious insiders, and much more. Yet at the same time, security leaders are also under tremendous pressure to reduce costs and invest wisely.  One of the …

[eBook] A Step-by-Step Guide to Cyber Risk Assessment Read More »

EC Council CHFI v10 Practice Exam (312–49) p4

EC Council CHFI v10 Practice Exam (312–49) p4

March 30, 2023 CHFI v10 Practice Test (Full 600+ Questions) https://www.udemy.com/course/chfi-v10-certmaster-exam-prep/?referralCode=79DFFB9D994A3B22461A 140. Matthew has been assigned the task of analyzing a suspicious MS Office document via static analysis over an Ubuntu-based forensic machine. He wants to see what type of document it is, whether it is encrypted, or contains any flash objects/VBA macros. Which of …

EC Council CHFI v10 Practice Exam (312–49) p4 Read More »

How Do I Begin My Career with a Cybersecurity Scholarship in 2023?

How Do I Begin My Career with a Cybersecurity Scholarship in 2023? | David Tidmarsh | Cybersecurity Technician Cybersecurity certifications are an excellent way to begin your career in IT security. The good news is that you may be eligible for a cybersecurity scholarship that helps cover the costs of your entry-level cybersecurity training program. What Is…

The post How Do I Begin My Career with a Cybersecurity Scholarship in 2023? appeared first on Cybersecurity Exchange.

Penetration Testing Best Practices for Conducting Effective Penetration Tests on Enterprise Networks

Penetration Testing Best Practices for Conducting Effective Penetration Tests on Enterprise Networks | David Tidmarsh |Penetration Testing Penetration testing is an invaluable addition to any organization’s cybersecurity toolset. By conducting regular penetration testing, enterprises can discover and patch security issues before hackers detect and exploit them. However, not all penetration testing methods and strategies are…

The post Penetration Testing Best Practices for Conducting Effective Penetration Tests on Enterprise Networks appeared first on Cybersecurity Exchange.

Airgeddon — Easy Wireless Network Security Auditor

Airgeddon — Easy Wireless Network Security Auditor

Airgeddon is a multi-featured tool for penetration testing on WiFi system or wireless networks. This all-in-one WiFi auditing tool is written in bash by v1s1t0r1sh3r3.

Airgeddon Kali Linux 2021 hack wifi

Key-Features of Airgeddon

Airgeddon has so much features for WiFi hacking. They are following:

  • Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing.
  • DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). “DoS Pursuit mode” available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks).
  • Full support for 2.4Ghz and 5Ghz bands.
  • Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing
  • Cleaning and optimizing Handshake captured files.
  • Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using dictionary, bruteforce and rule based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools.
  • Evil Twin attacks (Rogue AP)
    • Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS).
    • Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap).
    • Integrated sniffing, sslstrip2 (Hostapd + DHCP + DoS + Bettercap).
    • Integrated sniffing, sslstrip2 and BeEF Browser Exploitation Framework (Hostapd + DHCP + DoS + Bettercap + BeEF).
    • Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd).
    • Optional MAC spoofing for all Evil Twin attacks.
  • WPS features
    • WPS scanning (wash). Self parameterization to avoid “bad fcs” problem.
    • Custom PIN association (bully and reaver).
    • Pixie Dust attacks (bully and reaver).
    • Bruteforce PIN attacks (bully and reaver).
    • Null PIN attack (reaver).
    • Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update.
    • Integration of the most common PIN generation algorithms (ComputePIN, EasyBox, Arcadyan, etc.).
    • Offline PIN generation and the possibility to search PIN results on database for a target.
    • Parameterizable timeouts for all attacks.
  • Enterprise networks attacks
    • Fake AP using “smooth” and “noisy” modes capturing enterprise hashes and plain passwords.
    • Custom certificates creation.
  • WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.).
  • Compatibility with many Linux distributions (see Requirements section).
  • Easy targeting and selection in every section.
  • Drag and drop files on console window for entering file paths or autocomplete using tab key on every path input for easier use.
  • Dynamic screen resolution detection and windows auto-sizing for optimal viewing.
  • Controlled Exit. Cleaning tasks and temp files. Restoring nftables/iptables after an attack that require changes on them. Option to keep monitor mode if desired on exit.
  • Multilanguage support and autodetect OS language feature (see Supported Languages section).
  • Help hints in every zone/menu for easy use.
  • Auto-update. Script checks for newer version if possible.
  • Docker image for easy and quick container deployment. Use already built image on Docker Hub or build our own.
  • Http proxy auto detection for updates.
  • Wayland graphic system supported (not only X window system).
  • Tmux support for headless (systems without X window) environments.
  • Multiple configurable options based on fallback substitution variables options system which allow to configure many enhancements like enable/disable colors, 5Ghz band, auto updates, hint printing, etc.
  • Full compatibility with iptables and nftables with autodetection and possibility to force iptables by setting an option.
  • Available plugins system to let the community create their own content in an easy and flexible way using the created function hooking system. More info at Plugins System section.

Installing Airgeddon on Kali Linux

We can install airgeddon from it’s GitHub repository by cloning/downloading the repository. But in Kali Linux 2021.1 update this tool is added to Kali Linux repository. We can install it by simply using apt-get install command from any version of Kali Linux:

sudo apt-get install airgeddon

This command will install airgeddon on our Kali Linux system. The above command will prompt for root password and disk space permissions. After that this airgeddon and it’s essential requirements will be installed.

installing airgeddon

Airgeddon also requires some additional tools to use all it’s features. To install them all on our Kali Linux we use following one liner command:

sudo apt install bettercap isc-dhcp-server hostapd hostapd-wpe udhcpd mdk4 hcxdumptool lighttpd hcxtools -y

Now we can use airgeddon on our system.

Requirements for Airgeddon

  • WiFi networks for testing.
  • WiFi adapter that supports monitor mode & packet injection [List].

Using Airgeddon on Kali Linux

Now we can run following command to run airgeddon on our Kali Linux system.

sudo airgeddon

Then airgeddon will open in front of us as shown in the following screenshot:

airgeddon intro

After it will ask to check for all the tools installed or not, we need to press ↵ Enter to continue.

Checked for required tools airgeddon

In the above screenshot we can see that we have all the tools. Now we plugin our external USB WiFi adapter that supports monitor mode and packet injection. Then we again need to press ↵ Enter again to continue.

Here we can see the list of interfaces on our system, as the following screenshot.

airgeddon list of interfaces

In our case our wlan1 interface supports monitor mode and packet injections, so we press 5 and hit ↵ Enter. This will tell airgeddon that we are going to work with that interface.

After that we got the main menu of airgeddon script.

Airgeddon main menu

Here at the top we can see our interface name and mode. The mode is ‘managed’ we need to change it to ‘monitor’ mode. Here everything is very clear and simple.

We can use option 2 to change the interface mode to monitor. We press 2 and ↵ Enter.

airgeddon mode changed to monitor

In the above screenshot we can see that our interface is changed from wlan1 to wan1mon and the mon is for monitor mode.

Now we can perform attacks using this script. For example here we demonstrate handshake capturing and evil-twin attacks using airgeddon on Kali Linux.

Capture and Crack Handshake File using Airgeddon

For an example first we capture handshake of a wireless network. Now what is handshake file? We know if we previously used a WiFi network using password and the password isn’t changed then we can easily connect to the network because of the handshake file. This file stores the password with encryption.

To perform handshake capture attack we enter in the handshake tools menu by pressing 5 and ↵ Enter. Then the handshake menu comes in front of us as the following screenshot.

airgeddon handshake menu

Here the option number 6 is for capture the WiFi handshake. So we press 6 and hit ↵ Enter.

no network selected

We did not choose any network, so airgeddon is redirect us to select a target WiFi network. We need to press ↵ Enter to continue.

airgeddon exploring for targets

Here we explore for target WiFi network. We can start the attack by pressing ↵ Enter, when we think we have found our target network we can press CRL+C to stop searching.

airgeddon searching for targets

Here we can see that a another window is opened to search for networks. We can see that we have only target. So we can stop the search by pressing CTRL+C. Then it will show the list of targets.

Airgeddon list of targets

As we told, we have only one WiFi network (we live in a remote area). That’s why airgeddon automatically select this. Otherwise we need to select the number of the WiFi network to select it.

We press ↵ Enter to continue. 

Airgeddon got valid target

Now airgeddon got a valid target it it asks to continue the handshake capture. We again press ↵ Enter to continue.

Then airgeddon again prompts for the methods to capture the handshake file, as we can see in the following screenshot.

Airgeddon handshake capture options

For an example we choose the deauth attack (No. 1). So we choose number 1 and press ↵ Enter.

airgeddon deauth time

Here we need to type of the value in seconds. We can simply press ↵ Enter to left it on it’s default value, which is 20. Then it show us some advises as we can see in the following screenshot:

before starting the handshake capturing on airgeddon

We can see in the above screenshot that the tool is going to capture the handshake. It also advice us to not close the windows manually during handshake capturing. We will know when airgeddon capture the handshake file. We need to press ↵ Enter to continue.

Then we can see some terminal window is opened in front of us in the following screenshot. We should not close them. 

airgeddon capturing the handshake file

To clear some things here airgeddon sending de-authentication packets to the network, then all the WiFi users will disconnect for some seconds for the flood. Whenever the devices trying to connect back the WiFi network airgeddon will capture the handshake file.

After successfully capturing the handshake file these will close automatically, and show us a congratulations message. It also asks where we want to save our handshake file. The default is under /root/handshake**.cap as we can see in the following screenshot.

airgeddon successfully captured handshake file

Here also we goes with the default by just pressing ↵ Enter. Then the handshake file is stored successfully on the root folder. Handshake capturing is complete now. We can press ↵ Enter again to back in the menu.

airgeddon back to handshake menu

We can press 0 and ↵ Enter to return to the main menu.

Main menu of airgeddon

Our captured handshake file is stored on /root/ directory. We can see it by opening our thunar file manager with root permission (sudo thunar).

We can crack the handshake file in various way. We can use airgeddons menu Airgeddon > Offline WPA/WPA2 decrypt menu > Personal > (aircrack + crunch) Bruteforce attack against Handshake/PMKID capture file. We also can use aircrack-ng or some other brute-forcing tool. There are also some online tools are available.

Evil Twin Attack using Airgeddon

We can do a lot of attacks using airgeddon. Evil twin is one of them. In this attack we create a copy of our target access point and whenever the user of the access point try to connect with our fake access point with their access point’s password we got it. But why they do it?

Because we continuously send de-authentication packets to the target access point (AP), so that the user will not able to connect with the original AP, and got trapped.

First of all we set the mode to monitor. Then we choose ‘Evil Twin attacks menu’ by pressing 7 and ↵ Enter.

Airgeddon main menu

Here we need to explore for the target by typing 4 as we did in the previous attack. We got auto-selected because we have only one target nearby.

airgeddon target list

Then we click ↵ Enter to continue. We get back to the ‘Evil Twin attacks menu’. Here we choose 9 for captive portal attack.

Airgeddon captive portal attack menu

Now here we choose option 2 for ‘Deauth aireplay attack’.

Airgeddon will ask us some question. First it will ask that if we want to integrate “DoS pursuit mode”. The default is N for no, we also know that our AP will not change the channel in this case, so we press ↵ Enter to keep it default. Then it will ask if we want to spoof our mac address. We also goes with default (that is N).

Now airgeddon will ask us that have we captured the handshake of this access point. In our above attack we had captured it. So we choose Y for yes. Then it will prompt for the location of the handshake file, and we provide it, as we can see in the following screenshot:

Airgeddon asks questions

Then it asks the location where the saved password will stay in a text file. Default location is under /root/ directory. We again goes with the default by just pressing ↵ Enter.

Airgeddon ready for evil twin

We can see in the above screenshot that our path is valid and we can move forward by pressing ↵ Enter.

In the next step airgeddon will create a phishing page and asks us for it’s language, as we can see in the following screenshot:

Airgeddon phishing page language

Here we choose 1 to select English, and press ↵ Enter.

Now airgeddon is ready to run the attack. All parameters and requirements are set. The attack is going to start. Multiple windows will be opened, don’t close anyone. When we want to stop the attack press ↵ Enter on this window and the script will automatically close them all.

Evil twin attack airgeddon

We can see lots of terminals here for various works like de-authentication, control, DNS, Web Server etc.

Now we can see on our mobile device that we are not connected to our locked main WiFi access point and there are another access point with same name, in the following screenshot:

evil twin attack running by airgeddon

Whenever we connect to the other network. It automatically redirect to log in, as shown in the following screenshot:

evil twin attack page on phone

Now here if our target use the password it will show the user that it was correct password.

sucessful password

We get it on our txt file on root directory. It also shown in the control terminal window. We need to keep the terminal windows open until the user did not put his password on the login screen. Hope target is not sleeping.

wifi password cracked by airgeddon

Here in this evil twin attack we are using the handshake file to check the password is correct or not. If they put the wrong password then it will notice it. Isn’t is amazing?

Airgeddon will detect the wrong password

There are many types of attacks we can perform using airgeddon against a wireless network. Here we discuss about only two type because everything is very easy here. We just need to select the options only, everything will be done by the script automatically.

This is how we can install and use Airgeddon on Kali Linux. This is a very easy but powerful tool for WiFi auditing.

Airgeddon is specially designed for Linux. Airgeddon did not compatible on MacOS/OSX, because Aircrack suite does not support airodump and aireplay for OSX/MacOS, and iwconfig does not exist in OSX/MacOS.

Airgeddon is not working with any Linux distribution run under Windows subsystem (WSL). Airgeddon also didn’t support native OpenBSD and FreeBSD, iwconfig command not working there and ifconfig shows different output.

Warning:- Attacking other’s network or WiFi is not legal. We publish this article for educational purpose and tested things on our own devices. If anyone attacks on others devices then we and the tool creator will not be responsible for that.

Stay updated with our articles by following us on Twitter and GitHub. Be a part of the KaliLinuxIn community by joining our Telegram Group, where we focus on Linux and Cybersecurity. We’re always available to help in the comment section and read every comment, ensuring a prompt reply

Categories of Security Challenges in Cloud Computing – Networking

Categories of Security Challenges in Cloud Computing – Networking

Networking This article is based on Categories of Security Challenges in Cloud Computing Networking and their securities. Network security (N1) Information from articles that discuss network security and VPN network are considered.Data should not be leaked while transmission and it is one of the requirements of information security [136]. To prevent leakage of sensitive information …

Categories of Security Challenges in Cloud Computing – Networking Read More »

Why Do User Permissions Matter for SaaS Security?

January 10, 2023 Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over 300 Mailchimp customer accounts and exported audience data from 102 of them. The breach was preceded by a successful phishing attempt and led to malicious attacks against Mailchimp’s customers’ end users. Three months later, Mailchimp was hit …

Why Do User Permissions Matter for SaaS Security? Read More »

Ukraine’s DELTA Military System Users Under Attack from Info Stealing Malware

December 22, 2022 The Computer Emergency Response Team of Ukraine (CERT-UA) this week disclosed that users of the Delta situational awareness program received phishing emails from a compromised email account belonging to the Ministry of Defense. The attacks, which have been attributed to a threat cluster dubbed UAC-0142, aimed to infect systems with two pieces of data-stealing …

Ukraine’s DELTA Military System Users Under Attack from Info Stealing Malware Read More »

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Introduction Lab Topology Exercise 1 — Information Security and Ethical Hacking Overview Learning Outcomes In this module, you will complete the following exercises: Exercise 1 — Information Security and Ethical Hacking Overview After completing this module, you will have further knowledge of: Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information …

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts Read More »

What Are the Most Important Types of Cyberthreats? 

What Are the Most Important Types of Cyberthreats? | Shelby Vankirk |Threat Intelligence As our lives increasingly move online, the risk of cyberattacks increases. While we often hear about large-scale hacks, there are many different types of cyberthreats that can harm individuals, businesses, and even governments. Understanding these threats and how to protect yourself from…

The post What Are the Most Important Types of Cyberthreats?  appeared first on Cybersecurity Exchange.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.