How to know if your Wi-Fi network is secure with Wifislax

wifislax logo

In case you didn't know, Wifislax It is a very curious Linux distribution, which comes with a large number of programs dedicated to wireless security monitoring, that is, to check if your Wi-Fi network is secure.

Many people use this program for malicious purposes, that is, to grab free Internet from the neighbor. This tutorial is meant to attack your own network and try to see if it can be attacked or not, not to steal the internet, so I am not responsible for the misuse of it.

First Steps

The first thing to do is download the ISO image of Wifislax, which we can find on the website of wifislax. As well there are people who use the old Wifiway or even the Backtrack or Kali Linux by commands, but Wifislax is the most up-to-date and the easiest to use. If you are going to use a virtual machine, note that you will need a separate Wi-Fi antenna (that is, you are not using it on the local machine).

First look at Wifislax

This operating system is usually used in Live CD boot, since nobody usually installs it (although it is usually done). It comes with two desks, KDE is the main and the one that comes with all the functions and the Xfce is the secondary one and intended for low-resource teams. Both come with everything you need to attack a Wi-Fi network, in whatever way.

Wep key, easy to take out

If your Wi-Fi network carries Wep-type security, it can be easily removed with this operating system. For this, the aircrack suite is used, specifically the airoscript, which allows to do it with a graphical interface instead of commands as used to be done in the old days. This program can be found in utilities / aircrack suite / airoscript Wifislax. Here we only have to press 1 to search our network, 2 to choose it, 3 to inject packets and 4 to attack it, using the aircrack option with 100.000 data packets or the Wlan decripter option if the key is type wlan_xx (with 4 packets you already The bag).

WPS, the candy

Years ago there was an authentication system for Wi-Fi networks called WPS, which consisted of pressing a button, we could connect without having to enter the password. People realized that it was easier to attack the WPS pin of a network than the key, since this is only numeric. A Wi-Fi key if you have WPS enabled, you may already have a WPA2 key with symbols, numbers and letters, which is insecure. To test it, we are going to go to utilities / WPA-WPS / WPSPingenerator. This is a script from the Reaver program, which attacks the WPS pins. Again, it is very simple to use and it will surely take out our password, especially if it is from Movistar, which comes out in 2 or 3 seconds.

WPA / WPA2 key, we are not quite sure yet

Even if we have the WPA2 key and we have removed WPS, they can still remove the key, using what is called a dictionary attack, in which all words in a dictionary are checked to see if they match the key. There are a large number of dictionaries on the internet, from small 1 GB dictionaries to huge 500 GB ones with millions of words and combinations. With airoscript and a downloaded dictionary, we can try to attack our network. WPA keys have an additional security that forces us to have a handshake to connect, however, it is very easy to achieve, since we will only have to try to enter the network from another device (still putting the wrong password). Once we have it, we type the dictionary path in aircrack and the program will begin to attack. It can take anywhere from 1 hour to several weeks, depending on the robustness of the key.

Other useful things from the distribution

Without a doubt, this distribution is full of useful things, also having computer security utilities. It falls short of Kali Linux level in this regard, but it also has elements like the Yamas program to do man in the middle attacks (make you go through the router to get all the data) and other security programs.

How do I know if I am being robbed?

To know if the Internet is being stolen, you will have to take into account several things.

  • Speed ​​test: If your speed is slower than usual, it may be that someone is stealing from you.
  • IP conflicts: If you get the famous "there is an IP address conflict" message, it could also be that someone has broken in without permission.
  • DHCP log: Entering the router configuration, we can see which computers have connected to the network. If there is a name that does not sound familiar or you do not get the accounts, they have entered.

Secure your password

If the attempts to attack your network have been successful, it means that tu network is vulnerable and that you must secure it with certain measures.

  • Outside WPS: Go into your router's settings (by typing the gateway in your internet browser) and remove the infamous WPS from the settings. This already isolates you from 50% of attacks.
  • WPA password: Oddly enough, there are still people who use WEP keys, a practice to avoid. Always choose a WPA2 key.
  • Rename network: If you change the ESSID (name of the network), you will be safe from password detection scripts that even the most useless can make work (they only ask for ESSID and BSSID).
  • Strong password: Never leave the factory password (because of the scripts and because the neighbor could get it by looking under the router when he goes to your house to get salt). Use a strong password, with numbers, letters and special characters, this way you will avoid that dictionaries can easily extract it.
  • Extra security measures: It is important that your router protects you from certain attacks such as the attack on the router or the man in the middle.
  • Filtered by MAC and access lists: If your neighbor is someone of Chema Alonso's caliber, try to put MAC filtering on the router, making it only accept the MAC address of the computers in your house. This will mean that even if they know the password, they cannot enter.

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Pablo Luna said

    Mac filtering has been shown to be completely ineffective and is something that the attacker can easily mask and change. Undoubtedly, it is one more barrier, but it is a hassle when it comes to bringing new toys and devices home that we want to use our local network. So that we have a DHCP server in the router if in the end we have to enable them one by one. :)

    1.    azpe said

      Now, I don't have it on, but it's one more security measure.
      The attacker will prefer to remove another network than to remove ours if he has such security, since it is easier for him that way.
      Greetings.

    2.    eno said

      At present there is no secure system, in the end even Appel has penetrated the security of his iPhone, which has discovered the vulnerability.