Skip to content

VemTech6/Wi-Fi-Pentesting-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 

Repository files navigation

Wireless Penetration Testing Project

Description

The objective of this penetration test was to simulate an attacker attempting to gain unauthorized access to a WPA2-protected Wi-Fi network using publicly available tools and techniques. The test was conducted for educational purposes and as a portfolio project to showcase wireless security skills. The detailed project walkthrough can be found HERE.

Methodology

The penetration test followed a structured process:

Phase Description
Reconnaissance Identified broadcasted SSIDs and their configurations using airodump-ng.
Target Enumeration Collected BSSID, channel, encryption, and client information.
Attack Simulation Performed a deauthentication attack and attempted WPA2 handshake capture.
Password Cracking Used aircrack-ng with a custom and pre-built wordlist (rockyou.txt).
Post-Attack Review Analyzed if the attack vector was successful or not and noted possible defenses.

Findings

Category Finding Severity Notes
SSID Broadcast SSID is visible Low While not inherently dangerous, broadcasting the SSID makes discovery easier.
Encryption WPA2-PSK identified Medium Strong encryption but subject to dictionary or brute-force if password is weak.
Handshake Capture Successful High Indicates the network is vulnerable to offline password cracking attempts.
Wordlist Attack Unsuccessful (Password Not in Wordlist) Low Demonstrates password strength against common wordlists.
Device Isolation Not enabled Medium Clients could potentially communicate with one another.

Recommendations

Recommendation Purpose / Benefit
Use a strong, unique passphrase Prevents successful dictionary and brute-force attacks.
Enable client isolation on router Blocks devices from communicating with each other, reducing lateral movement opportunities.
Disable SSID broadcast (optional) Adds minor obscurity by hiding the network from casual scanning.
Implement MAC address filtering Limits device access to approved hardware, though can be bypassed by skilled attackers.
Monitor for deauthentication attempts Helps detect active attacks like handshake capturing or forced disconnection attempts.
Update router firmware regularly Ensures the latest security patches are applied to prevent known exploits.
Restrict physical access to the network area Reduces risk of local attacks from within Wi-Fi signal range.

Conclusion

The penetration test successfully captured the WPA2 handshake but was unable to crack the passphrase using standard and custom wordlists. This outcome suggests the Wi-Fi password has a sufficient level of complexity. However, the ability to capture a handshake and attempt cracking demonstrates that physical proximity still poses a viable attack surface. Further hardening is advised to improve overall security.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published