-
Book Overview & Buying
-
Table Of Contents
BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :
Follow the given instructions to get started:
We double-check the eap.conf file to ensure that PEAP is enabled:

We then restart the Radius server with Radiusd –s –X:

We monitor the log file created by FreeRadius-WPE:

Windows has native support for PEAP. Let's ensure that Certificate Verification has been turned off:

We just need to connect to the access point Wireless Lab for Windows to start PEAP authentication:

Once the client connects to the access point, the client is prompted for a User name / Password. We use SecurityTube as the User name and abcdefghi as the Password:

As soon as we do this, we are able to see the MSCHAP-v2 challenge response appear in the log file:

We now use Asleap to crack this using a password list file that contains the password abcdefghi and we are able to crack the password!

We set up our Honeypot using FreeRadius-WPE. The enterprise client is mis-configured to not use certificate validation with PEAP. This allows...
Change the font size
Change margin width
Change background colour