CYS 506 - Lab6
CYS 506 - Lab6
CYS 506 - Lab6
2022/23
IMAM ABDULRAHMAN BIN FAISAL UNIVERSITY
College Department Course
Practical
College of Computer Science Session Plan
Networks and Ethical Hacking (CYS
and Information Technology Communications 506)
Session Topic/Title Session No. Session Duration
(Minutes)
Hacking Wireless Networks, Password 5 120
Cracking
1- Session Please list the Session Learning Outcomes (SLOs), as presented in the
Outcomes ABET Student Outcomes A to K.
Note: The sequence of instruction may vary and you may start with the
most essential SLO. 1 is the most important one, followed by 2, 3 and 4, as
per time availability.
2- Tool(s)/Software .
Cupp
Aircrack-ng
Airodump-ng
hashcat
Kali Linux
3- procedural steps
(Tasks)
Hacking a wireless network is one of the first steps to infiltrating a network, in
order for an attacker to continue his endeavors he would have to gain access to a
network. WEP, WPA, WPA2, and lastly WPA3 are all protocols made to mitigate the
attempts of that attacker. This lab discovers the steps made by an attacker to
infiltrate a wireless network. Furthermore, password cracking is demonstrated to
simulate how an attacker would crack a password.
Lab Tasks:
Part 1: Discovering wireless networks
2- Run airodump-ng to discover access points with the name of your wireless
adapter in the end
Further steps can be used to capture the handshake and will be listed below,
although they require specific hardware and can be skipped due to that
limitation.
4- Using a network card that supports monitor mode, start sniffing the packets of
a specific access point
5- Take note of a mac address of a station connected to that BSSID, then use
aireplay-ng to send fake deauthentication packets to that station, keep the
sniffing terminal open.
3- Fill up all the prompts with the information of your target to receive a wordlist
4- A wordlist has been created and contains all the possible passwords of the
target
3- After waiting, aircrack-ng should tell you that the hash was cracked.
4- Assessment Plan questions/tasks to confirm that students have achieved each of the
above SLOs. Outcome 1 is the most important one, followed by 2, 3 and
4, as per time availability. The questions/tasks below are just for
guidance and the laboratory instructor can come up with his own
questions/tasks.
Assignments:
Do the following tasks and take screenshots as proof.
4- Use the wordlist created for John (step3) to crack the following MD5 Hashes.
5- Resources Suggest further resources for the students to manage their learning after
the class. Make sure that the resources are specific and different to suit all
students, e. g. Figures, Tables, Links, etc.
https://github.com/Mebus/cupp
https://hashcat.net/hashcat/
https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access