WPA-MGT

WPA-Enterpise rogue AP attack

Setup

sudo airmon-ng check kill

sudo airmon-ng start wlan0

sudo airodump-ng wlan0mon

Gather CH ESSID BSSID & Clients ; AUTH MGT = WPA Enterprise

Capture + output as recon-01.pcap

# -c channel -w output filename = recon-0#
sudo airodump-ng -c # --essid AP_NAME --bssid XX:XX:XX:XX:XX:XX -w recon --output-format pcap wlan0mon

May deauth a client once to get reconnection for cert info

#-a AP -c Client
sudo aireplay-ng -0 1 -a XX:XX:XX:XX:XX:XX -c YY:YY:YY:YY:YY:YY wlan0mon

Review the traffic / recon-01.pcap to get cert info

#wireshark filter

tls.handshake.type == 11,3
# or 
tls.handshake.certificate
Extensible Authentication Protocol > Transport Layer Security > TLSv1 Record Layer: Handshake Protocol: Certificate > Handshake Protocol: Certificate > Certificates > Certificate

for each certificate (2), we right click and select Export Packet Bytes to save the data into a file with a .der extension

Review cert info

Preparation

Edit freeradius cert config (as root user)

Create fake cert (as root user)

Setup rogue AP with hostapd-mana

Create mana.conf and mana.eap_user to /etc/hostapd-mana/ (as root)

Launch rogue AP

When a victim attempts to authenticate to our AP, the login attempt is captured in mana console

Retrieve credentials with asleap command provided by mana

<asleap cmd>

Connect to the network with retrieved credentials

Create wpa_supplicant.conf

Connect to network

Get proof

Last updated