![]() Still, I am able to view the ESP's web page (knowing the URI beforehand).There is no HTTP traffic at all. When I first connect it to the network, it sends out an ARP for the IP. This showed up the ESP as ESPressi_ac, not it's IP. Now, tried using an external USB adapter. See? No traffic is shown from the esp8266's IP address I even tried putting up an external WiFi adapter on monitor(promiscuous) mode and then try sniffing data. What am I missing? I tried sniffing on the same WiFi adapter that was simultaneously connected to the WEP network. But, however, my phone did display the data. No matter how many times I try refreshing the page on my mobile phone, no traffic was shown. But, I could not see any traffic on Wireshark from the IP address of the microcontroller. THE PROBLEM: I tried sniffing data off the network(I am still unaware of the exact URI over which the microcontroller is transmitting data). Thus, obtained the IP address of the microcontroller.Got access to the gateway, i.e the modem's settings page(assuming the password is not changed from the default admin, admin User ID and password.Easily cracked the 128 bit WEP encrypted password using Kali Linux (Aircrack-ng tools).After accomplishing this, the next GOAL 2 is to try to spoof some data i.e send some garbage data and keep the actual data to ourselves. So, GOAL 1 is to Find the exact URI and hence, get the data being transmitted. The communication is assumed to be by HTTP and is also assumed to happen by GET method. Goal: To break into the network that the microcontroller is connected to(the WEP network) and sniff the data that is being transmitted. It would post the data over some URI ( eg. I have also set up a microcontroller(NodeMCU, in case you were wondering) to transmit some sensor data(DHT11's temperature and humidity data) over this WEP network. ![]() My setup: I have set up my very own WEP WiFi network(intentionally made vulnerable by setting up WEP encryption). Therefore, we start by collecting information about the target access point.I am relatively new to cybersecurity and hacking and I aim to learn ethical hacking as a passion alongside my mainstream education(Electrical Engineering). ![]() In order for the data to be suitable for decryption, it is necessary that the WiFi card does not switch channels, but to capture information on one channel on which the target Access Point operates. In the second example, the data will be captured and decrypted using only Wireshark. The first data capture is performed using Airodump-ng, and then the wireless traffic will be decrypted in Wireshark. Next will be shown two examples of capturing WiFi traffic and its decryption.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |