Exploiting a WPA2-EAP Wireless Network for Secure Access

Exploiting a WPA2-EAP Wireless Network for Secure Access
Situation:
The goal of this exercise was to exploit a WPA2-EAP wireless network configured with TTLS and MSCHAPv2 protocols. The network artstailor-ddwrt-2 was targeted based on pod assignment, and the mission was to bypass the authentication mechanisms to gain access to a secure webpage hosted at 45.79.141.10.
Obstacles:
- Authentication Challenge:
- The WPA2-EAP network required credentials for TTLS authentication, which had to be intercepted and cracked.
- File Configuration:
- Properly configuring
wpa_supplicant.confwith the necessary parameters for network access.
- Properly configuring
- Dynamic Host Configuration Protocol (DHCP):
- Establishing a valid IP address on the
wlan0interface after successful connection.
- Establishing a valid IP address on the
Actions Taken:
- Wireless Channel Identification:
- Ran
sudo airmon-ng check killto stop interfering processes. - Used
sudo airmon-ng start wlan0to enable monitor mode on the adapter, creating thewlan0moninterface. - Executed
sudo airodump-ng wlan0monto identify access points and their associated channels.
- Ran
- SSID Configuration:
- Edited the
hostapd-wpe.conffile to target the SSIDartstailor-ddwrt-2. - Ran
sudo ./hostapd-wpe hostapd-wpe.confto capture NETNTLM credentials.
- Edited the
- Password Cracking:
- Created a password file and used
johnto crack the NETNTLM credentials, retrievingSw0rdf1shas the password.
- Created a password file and used
- Network Connection:
- Configured
wpa_supplicant.confwith the cracked credentials and appropriate authentication settings:- SSID:
artstailor-ddwrt-2 - Authentication: MSCHAPv2
- SSID:
- Connected to the network using
sudo wpa_supplicant -iwlan0 -cwpa_supplicant.conf.
- Configured
- DHCP Lease:
- Obtained a valid IP address by running
sudo dhclient wlan0. - Verified network connectivity using
ip a.
- Obtained a valid IP address by running
- Webpage Access:
- Navigated to the webpage at
http://45.79.141.10. - Inspected the source code and followed the hypertext link
/Corp/message.txtto retrieve sensitive information.
- Navigated to the webpage at
Results:
- Network Access Achieved:
- Successfully authenticated to the WPA2-EAP network using the cracked credentials.
- Data Retrieved:
- Accessed sensitive information at
/Corp/message.txtvia the secure webpage.
- Accessed sensitive information at
- Critical Vulnerability Identified:
- Weak password configuration and lack of
ca_certvalidation exposed the network to unauthorized access.
- Weak password configuration and lack of
Tool Purpose Overview:
airmon-ng:
- Enabled monitor mode on the wireless adapter to capture traffic.
airodump-ng:
- Identified wireless access points and associated channels.
hostapd-wpe:
- Captured NETNTLM credentials during the WPA2-EAP handshake.
john:
- Cracked NETNTLM credentials to retrieve the network password.
wpa_supplicant:
- Connected to the WPA2-EAP network using the cracked credentials.
Recommendations:
- Enforce Stronger Password Policies:
- Use complex passwords resistant to dictionary and brute-force attacks.
- Implement Certificate Validation:
- Require
ca_certvalidation inwpa_supplicant.confto ensure secure authentication.
- Require
- Monitor and Audit Wireless Networks:
- Regularly test for vulnerabilities in wireless network configurations.
- Enable Advanced Security Protocols:
- Transition from MSCHAPv2 to a more secure EAP method, such as EAP-TLS.
View PDF Document
