-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :

Follow the given instructions to get started:
We double-check the eap.conf
file to ensure that PEAP is enabled:
We then restart the Radius server with Radiusd –s –X
:
We monitor the log file created by FreeRadius-WPE:
Windows has native support for PEAP. Let's ensure that Certificate Verification has been turned off:
We just need to connect to the access point Wireless Lab for Windows to start PEAP authentication:
Once the client connects to the access point, the client is prompted for a User name / Password. We use SecurityTube as the User name and abcdefghi as the Password:
As soon as we do this, we are able to see the MSCHAP-v2
challenge response appear in the log file:
We now use Asleap
to crack this using a password list file that contains the password abcdefghi
and we are able to crack the password!
We set up our Honeypot using FreeRadius-WPE. The enterprise client is mis-configured to not use certificate validation with PEAP. This allows...
Change the font size
Change margin width
Change background colour