Good fcking afternoon EZ (Yes I curse a lot)
Since I feel like contributing to this great community I figured that Airbase-ng would be nice to introduce to members that are new to this.
A lot of basic Wireless hacking material is already here and it would be useless to recap everything.
Myself Ive spent some time on wireless security which remains to be one of my favorite fields.
So lets talk a little about airbase-ng
Airbase-ng is one of the many tools in the aircrack suite.
Its serves as software access point with a twist.
This tool allows you to create an AP on the fly residing on a monitor interface (promiscious mode).
So lets take a look at the options this tool offers;
$airbase-ng --help
Airbase-ng 1.0 rc3 - (C) 2008, 2009 Thomas d'Otreppe
Original work: Martin Beck
http://www.aircrack-ng.org
usage: airbase-ng <options> <replay interface>
Options:
-a bssid : set Access Point MAC address
-i iface : capture packets from this interface
-w WEP key : use this WEP key to en-/decrypt packets
-h MAC : source mac for MITM mode
-f disallow : disallow specified client MACs (default: allow)
-W 0|1 : [don't] set WEP flag in beacons 0|1 (default: auto)
-q : quiet (do not print statistics)
-v : verbose (print more messages)
-A : Ad-Hoc Mode (allows other clients to peer)
-Y in|out|both : external packet processing
-c channel : sets the channel the AP is running on
-X : hidden ESSID
-s : force shared key authentication (default: auto)
-S : set shared key challenge length (default: 128)
-L : Caffe-Latte WEP attack (use if driver can't send frags)
-N : cfrag WEP attack (recommended)
-x nbpps : number of packets per second (default: 100)
-y : disables responses to broadcast probes
-0 : set all WPA,WEP,open tags. can't be used with -z & -Z
-z type : sets WPA1 tags. 1=WEP40 2=TKIP 3=WRAP 4=CCMP 5=WEP104
-Z type : same as -z, but for WPA2
-V type : fake EAPOL 1=MD5 2=SHA1 3=auto
-F prefix : write all sent and received frames into pcap file
-P : respond to all probes, even when specifying ESSIDs
-I interval : sets the beacon interval value in ms
-C seconds : enables beaconing of probed ESSID values (requires -P)
Filter options:
--bssid MAC : BSSID to filter/use
--bssids file : read a list of BSSIDs out of that file
--client MAC : MAC of client to filter
--clients file : read a list of MACs out of that file
--essid ESSID : specify a single ESSID (default: default)
--essids file : read a list of ESSIDs out of that file
--help : Displays this usage screen
Only 1 option is manditory, which is the interface.
So lets run this baby with no options and see what happens.
First we need to create the monitor interface.
$airmon-ng start wlan1
Lets fire up airbase-ng
$airbase-ng mon0
18:21:34 Created tap interface at0
18:21:34 Trying to set MTU on at0 to 1500
18:21:34 Access Point with BSSID 00:00:00:00:00:00 started.
Alright it started the access point.
Lets see what it looks like with airodump-ng
airodump-ng mon0
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:00:00:00:00:00 0 51 0 0 4 54 OPN <length: 0>
As you can see it open, so no encryption.
It has no BSSID (hidden).
Lets specify some more options.
$airbase-ng -a EVILZONE -c 1 -P mon0
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:00:00:00:00:00 0 36 0 0 3 54 OPN EVILZONE
Alright as you can see in the help page the -P option responds to all beacons.
When a roaming client is .. uhm roaming it basically ask around for the ESSID's it remembered.
For example youve been to the airport and connected with their AP('s).
Most OS's and or tools remember the AP's.
Would be kinda annoying to retype a password everytime etc.
For show Ill run airodump-ng and show you a client thats roaming.
BSSID STATION PWR Rate Lost Packets Probes
(not associated) 00:21:5D:6B:8A:XX -62 0 - 1 31 5 xxx
An unassociated client will typically send out probes directed towards any AP it remembered.
Since this is wireless anyone can sniff this
Back on topic.
The previously mentioned -P option does something interesting.
Whatever probe the client sends out airbase-ng responds with : YES THATS ME HELLO PLEASE IM HERE CONNECT WITH ME.
Its kinda totally retarded and unsecure in many ways.
But thats the way it works.
Oke so we have a softAP setup , the roaming client will ask for network ; Home.
Our machine says; I am Home
The client associates.
We need to setup a dhcp server to establish further connection.
This is out of scope and I might add this in later.
Be aware that if the client expects for example a WPA protected network it will send out encrypted packets.
These will make no sense to your machine as it will be unable to decrypt them.
Some interesting uses:
-MITM
If course, fool the client into being something your not, get IP level connectivity forward his traffic and sniff.
Think about tools like; evilgrade, metasploit, SET etc.
-Cafe latte like attack for WPA.
The caffe latte as invented by vivek ramachadran (Love that guy) allows to crack a WEP key with only a client.
This attack can be applied to WPA.
If course this can be applied to WEP which is the original attack.
-DOS
This tool can be used as a DOS tool.
A client will always connect to the strongest AP in range that meets the criteria.
So if the ESSID; Home is mimiced and the SoftAP has a stronger signal the client will connect to this AP.
To Be continued (Out of time)