-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :

Follow the given instructions to get started:
EAP-TTLS is also enabled by default in eap.conf
. Let us start the Radius server and monitor the log file:
We connect the client and enter the credentials SecurityTube as the Username and demo12345 as the Password:
Immediately, the MSCHAP-v2
challenge / response appears in the log file:
We again use Asleap to crack the password used. It is important to note that any password list you use, must contain the password used by the user. In order to illustrate that if this is not true, we will not be able to crack the password, we have deliberately ensured that the password is not there in the default list on BackTrack:
Cracking EAP-TTLS is almost identical to PEAP. Once the client accepts our fake certificate, we get the MSCHAP-v2 challenge / response pair. As MSCHAP-v2 is prone to dictionary attacks, we use Asleap to crack the challenge / response pair as it seems to be based out of a dictionary...
Change the font size
Change margin width
Change background colour