πŸ“•
Blog
  • 🐞Vulnerabilities & Techniques
    • Web Vulnerabilities
      • Open Redirect
      • HTTP Parameter Pollution (HPP)
      • Host Header Injection (HHI)
      • XSS
      • HTML-Injection
      • clickjacking
      • S3
      • EXternal Xml Entity (XXE)
      • XSS prevention | CSP
      • DOM-XSS
      • SQL Injection | SQLI
      • Response Manipulation Technique & How Burp Suite Works
    • API Vulnerabilities
      • Mass Assignment Vulnerability
  • 🚩CTF
    • ASCWG
  • ✍️Writeups
    • Read Writeups
      • REST API WriteUps
      • Web Vulnerabilities WriteUps
    • Technical Writeups
      • Reset Password Poisoning Via Host Header Injection Lead to (ATO)
      • OTP/2FA Bypasses
        • OTP bypasses
  • 😈TryHackMe
    • THM Advent of Cyber 3 (2021) NoSQL WriteUp
  • πŸ”±Web-CyberTalents
    • CyberTalents-Web-Easy
    • CyberTalents-Web-Medium
    • CyberTalents-Web-Hard
  • πŸ–‡οΈPentesting & Bug Hunting Tips
    • ATO Via Host Header Injection
    • OTP Bypass
    • OutLook Plugin Pentest Guide
  • πŸ’»Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
      • DOM XSS in the document.write sink using source location.search
      • Lab: DOM XSS in document.write sink using source location.search inside a select element
      • Lab: DOM XSS in innerHTML sink using source location.search
      • Lab: DOM XSS in jQuery anchor href attribute sink using location.search source
      • Lab: Reflected DOM XSS
      • Lab: Stored DOM XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • πŸ›œWireless Networks Penetration Testing
  • βš”οΈWi-Fi Attacks
    • πŸ•ΈοΈNetwork Scanning attack
    • 🌊DOS / Flooding
      • 1️⃣DoS - Frame Flooding (Deauth, EAPOL, Beacons)
      • 2️⃣DoS- Exploiting Countermeasures (MIC failure)
    • Jamming Attacks (Ω‡Ψ¬Ω…Ψ§Ψͺ Ψ§Ω„Ψͺشويش)
    • Probe Requests Attack
    • Handshake Attacks
      • Dictionary Attack
      • Clientless Attack
      • KRACK Attack
      • Downgrad Attack
    • Rouge AP Attack
  • Lab Notes
  • RFID and NFC
  • Bluetooth
  • ZigBee
  • Google Map Test
Powered by GitBook
On this page
  1. Wi-Fi Attacks
  2. Handshake Attacks

Dictionary Attack

PreviousHandshake AttacksNextClientless Attack

Last updated 1 year ago

A WiFi 4-way handshake dictionary attack is a method used by attackers to crack the pre-shared key (PSK) of a Wi-Fi network secured with WPA or WPA2 encryption. The 4-way handshake is a cryptographic process that occurs when a client device attempts to join a protected Wi-Fi network. Here's how the attack works:

  1. Capture the Handshake: The attacker captures the 4-way handshake messages exchanged between a client device (such as a laptop or smartphone) and the access point (AP) when the client attempts to connect to the Wi-Fi network. These handshake messages contain cryptographic information necessary for establishing a secure connection.

  2. Generate a Dictionary: The attacker creates or obtains a large dictionary file containing a list of potential passwords or passphrases. This dictionary may include commonly used passwords, variations of dictionary words, personal information, and other combinations.

  3. Dictionary Attack: The attacker then uses software tools, such as Aircrack-ng or Hashcat, to systematically try each password in the dictionary file by computing the Pairwise Master Key (PMK) for each password candidate and comparing it to the PMK extracted from the captured handshake. The PMK is derived from the passphrase using a key derivation function (e.g., PBKDF2).

  4. Successful Password Recovery: If the attacker finds a match between the computed PMK and the PMK extracted from the handshake, it means they have successfully cracked the Wi-Fi network's pre-shared key. With the pre-shared key known, the attacker can then gain unauthorized access to the Wi-Fi network and intercept or modify network traffic.

βš”οΈ