Password Hacking Analysis of Kali Linux Applications
Password Hacking Analysis of Kali Linux Applications
net/publication/370048764
CITATIONS READS
0 5,210
2 authors:
All content following this page was uploaded by Tauheed Khan Mohd on 15 April 2023.
Abstract—Kali Linux is an open-source software that special- to create more advanced encryption from TKIP (Temporal
izes in professional penetration testing and security auditing. This Key Integrity Protocol) to the AES-CCMP (Counter Mode Ci-
study analyzes 5 applications that are used for password cracking pher Block Chaining Message Authentication Code Protocol),
in Kali Linux. The attacks included in this experiment are
dictionary-based attacks. Each application is researched through which is used in WPA2 networks. But as security encryption
5 attributes: speed, efficiency, complexity, design, and versatility. developed, way of attacking grew with it. With WPA networks,
These components will determine which of the 5 tools analyzed the ”man-in-the-middle’ method made it vulnerable, causing
is the overall best for password cracking, as well as look at the WPA2 networking to develop. Nowadays, cracking has been
pros and cons for each application. introduced to brake through WPA2 networks. The main crack-
Index Terms—password cracking, aircrack-ng, wifite, hydra,
fern wifi cracker, hashcat, WPA, dictionary, penetration testing,
ing software, aircrack-ng, has made attacking WPA/WPA2
virtualbox efficient.
Aircrack-ng is the most common tool for Kali Linux users,
I. I NTRODUCTION because it can do all parts of WiFi hacking: Monitoring
(capturing files), attacking (de-authentications or creating fake
WiFi hacking has been a big subject in cyber security ever access points) , testing (analysing WiFi and drivers) , and
since WiFi has dominated every part of our lives. People on cracking (accessing WEP/WPA content). Another application
a daily basis rely on a wireless connection to function their available in Kali Linux is Wifite, the current version being
devices whether that is through personal or professional use. Wifite2. This uses air-cracking tools and formats it to automate
Unfortunately, the evolution of WiFi resulted in a spike of wireless auditing using Python script. This is very helpful on
cyber attacks. People do not always have access to Ethernet, a convenience standard, especially for beginners who are not
which is more secure then wireless networks. These attacks used to Linux programming language. Fern WiFi cracker is
can consist of capturing data to destroying a device with similar to Wifite2, but is formatted differently. It creates a
adware or botnets. From this, the demand for cyber security to Python/PyQT GUI interface and it very interactive, with no
this day is desperately needed. Over time the defensive side of coding required.
attacks have developed various software applications made as Why does Kali Linux include so many applications if they
anti-virus and anti-malware to stop any form of cyber attack all achieve the same goal or use the same Linux commands?
possible. Still, these applications are not guaranteed as the Do these applications have advantages over one another,
attacking and defensive sides keep revolutionizing methods to and what is the best one to use overall? This study will
gain advantage to one another. investigate these questions and test qualities to determine an
There are some WiFi-hacking systems that are for good overall census for each application analyzed, based on speed,
use. One of those examples is Kali Linux. Kali mostly is efficiency, complexity, design, and versatility.
used for professional penetration testing and security auditing,
II. R ELATED W ORK
though it can be useful in other aspects. For WiFi hacking, this
study with be working with penetration testing. Kali Linux A. Earlier Experiments Applied
can do many forms of WiFi hacking, such as capturing data Penetration testing is not a brand new subject. Kali Linux is
like WEP/WPA addresses, passwords or cause damage to the known for attacking and capturing data on wireless networks.
data like jamming or removing devices. Not only that, Kali One specific use is to crack a password using a Hashcat
Linux provides free applications to make these attacks more technique. This technique consists of a dictionary with a
accessible and user-friendly. list of possible passwords and goes through one-by-one until
With wireless networks, developments of WiFi protected the correct password is matched. This is when the Hashcat
Access (WPA) was necessary to ensure a security standard. comes in. A Hashcat includes a algorithm where it is able
Created by the WiFi Alliance, over time they have continued to decipher a hash that is implemented in a password for
security protection. A past study experimented with is Hashcat method to Wifite, where it uses given dictionaries to crack
technique, where testing consisted of various password hack- through. One downside to Fern is not being able to use all the
ing applications supported by Kali Linux [1]. It researches features unless paying for the pro version. That being said, it
both online and offline hacking. Here in this study, the focus is a very impressive tool and is one of the most popular tools
is specifically on online networking. The study gives brief used in this category.
summaries on methods of attacks and encryption techniques.
III. E XPERIMENTAL S ETUP
The security standards used are WPA and WPA-2. When
cracking, Aircrack-ng is the method of attack applied. Asaad is A. Tools and Prerequisites
able to monitor the network targeted, analyze the WPA/WPA- For this experiment to be possible, there are some tools
2 security of the router, then attempt the crack with hash needed to be included. Kali Linux is installed on Oracle
cat and dictionary used. The dictionary Asaad applies in VM VirtualBox. This was the best environment for a laptop
this experiment is called ”rockyou” which is a given default that is run on Microsoft Windows, since Virtualbox allows
dictionary in Kali Linux. This dictionary will be used in this cross-platform. A second external source of a connection is
study as well. needed too, so in this study, a USB WiFi Adapter is used
One specific application included in Kali Linux is a tool for the wireless connection. This adapter is the ASUS USB-
called Hydra [2]. It is a cracking tool to obtain a login AC53 Nano, which the chipset is the Realtek RTl8812BU.
username and password. The brute attack technique is also The issue with this chipset is that Kali Linux does not support
used here, but what’s different is that Hydra attempts to crack it as of April 2022 because it is outdated. There is a way
a parallel network service. This is achieved by providing a around it, where additional packages and kernels need to be
dictionary file just like a Hashcat. Another great feature Hydra installed to get the adapter to work. The step-by-step details
can do is that this tool is able to find two different passwords, will not be included but here is the source for the required
whereas other password cracking tools in Kali Linux can packages [7]. The recommended chipsets for Kali Linux to use
only do one. The command lines needed to crack a password wireless connection with a USB adapter are Atheros AR9271,
or username using Hydra is applied in the terminal, but Ralink RT3070, and Realtek RTl8187l. The expansion pack
Hydra also provides their own GUI. This can be accessed by for Kali Linux also needed to be installed in the virtualbox
executing xhydra in the command terminal. In the experiment since the standard does not support USB 2.0, which is what
this GUI will be described in depth and shown to describe all the USB WiFi adpaters use. After that, all the tools used in
the possible features. this experiment are automatically installed into Kali Linux so
An all around tool supported by Kali Linux called Wifite there was no additional downloads for any of the tools. Make
can do password cracking as well. It uses a Python script to sure that Kali Linux is updated (command: sudo apt update)
examine wireless networks. The great feature about this tool and upgraded (command: sudo apt upgrade) before attempting
is that it runs all the existing tool for the user, so knowing cracking.
command arguments and switches are not needed [3]. A study
on WEP vs WPA2 in 2019 used Wifite to show how this tool
can crack a WEP password in a matter of a few steps [4], it
is very straight-forward to follow. When they activate wifite
in the command terminal, they show how it only takes a few
lines to be able to get a desired password. This is because it
does deauthentication attacks on its own to show all possible
SSIDs to attack. The efficient feature about wifite is that it
automatically scans and shows all possible targets to attack
based on signal strength. Once the user stops the scanning
and chooses which SSID to crack the password, wifite again
does all the work with a given dictionary to go through and
finds the matched password and stores it in a .json file in a
local folder in Kali Linux to access.
The last tool that will be experimented is called fern wifi
cracker. It’s an automated GUI based tool which uses various
methods/packages such as air cracking to crack wireless access
point passwords by using many implementations including Fig. 1. Wireless connection details
dictionary files just like Wifite [5]. The user-friendly interface
is what makes this tool so convenient for the user, because The wireless connection used is a mobile hot spot on a
there is no coding command lines involved. This GUI is Samsung Galaxy S21. This connnection uses a WPA-2 which
python language oriented. Fern can attack wired and wireless will test intensively how efficient this tools are in Kali Linux.
networks, cracking and recovering WEP/WPA/WPS keys [6]. The password is not complicated to test the speed of cracking
With WiFi WPA based attacks, fern uses a similar attack a password in each tool. When cracking, always make sure
to use a connection that is not open sourced to the public but There are a few things to notice here in Fig. 3 that makes
instead for personal use only. this tool very user-friendly and easy to use. Monitor mode
was not enabled before running wifite, but that is not an
B. Wifite issue with this tool, because wifite is able to enable it on its
own. Once the wireless connection is on monitor mode, wifite
There are a few commands needed to create a workable automatically scans nearby networks and creates a clear visible
environment for Wifite. This tool implements all aircrack-ng list of possible attacks. There are listed based on connectivity
branches to make crack a password possible. One branch that strength, hence why Samsung Galaxy S21 is towards the top.
the user needs to do before running Wifite is airmon-ng. This Typing Ctrl + C will stop the scanning process. Then wifite
consists of checking if there is a working wireless connection will prompt the user to type in numbers based the scanned
and finding processes that could cause issues when cracking. list and which to target. Notice that wifite does not limit to
attacking only one source, but can attack up to all listed which
is what makes this tool effective. When a target(s) is selected,
the user can sit back and watch wifite try multiple methods to
crack the targeted password.
All of the credentials are then saved in a .json file like shown
in Fig. 5, which details the type of network, date, essid, bssid,
password, and the handshake .cap file.
C. Aircrack-ng
The Aircrack-ng tool include the fundamental methods
Fig. 3. Startup of Wifite for revolutionized tools like Wifite and Fern. For password
hacking, airmon, airodump, aireplay, and aircrack commands
are needed to crack a WPA/WPA2 password. When monitor
mode is turned on using ”airmon-ng start wlan0,” the other
sub-components of aircrack-ng is available. First, a capture of
a WPA/WPA2 handshake is needed. This is possible by using
the airodump-ng command followed by the interface of the
wireless connection.
D. Hydra
Fig. 7. Command line for .cap file
Hydra is very efficient because of the possibility of parallel
An important thing to note is that the directory is stored cracking. Instead of using a BSSID to crack a password, it
where the used dictionary is located for cracking the password, takes an IP address and the used protocol with it. Hydra is
but this is not required. When the .cap file is created, the flexible because it can support various kinds of protocols such
handshake capture still needs to be acquired. This is achieved as HTTP, MySQL, SSH, and VNC (control of a user’s device
through de-authenticating every user that is using the attacked screen remotely).
WPA/WPA2 and then wait for a source to reconnect to capture
that user’s credentials.
V. C ONCLUSION
As shown from the experiments, the setup used here unfor-
tunately caused a lot of limitations. This made the result not
completely accurate as hydra, Fern WiFi cracker, and hashcat
did not get a complete analysis compared to aircrack-ng and
wifite. It still does not take away from the potential these
applications have if used successfully, and this experiment is
to address those possibilities. Kali Linux is a very reliable
open-source for professional penetration testing and security
auditing [9]. It is very advanced and not an ideal distribution
for beginner users of Linux in general. This severely impacted
how this experiment concluded, as 3 of the 5 tools used were
not successful. The setup used was not naturally compatible
and many difficult altercations arose with downloading extra
packaging to make components like the USB WiFi adapter
usable. It unfortunately still wasn’t fully compatible with
hydra, Fern WiFi cracker, and hashcat. This doesn’t take away
the importance of this study, because Kali Linux provides all
these applications and professionals should understand which
one is the best overall or for their needs.
R EFERENCES
[1] R. R. Asaad, “Penetration testing: Wireless network attacks method on
kali linux os,” Academic Journal of Nawroz University, vol. 10, no. 1,
pp. 7–12, 2021.
[2] L. Allen, T. Heriyanto, and S. Ali, Kali Linux–Assuring security by
penetration testing. Packt Publishing Ltd, 2014.
[3] Kimocoder, “Kimocoder/wifite2: Rewrite of the popular wireless network
auditor, ”wifite” - original source by @derv82 right over.”
[4] A. Martin, B. Mohammed, and R. Ramadhin, “Wep vs wpa2 encryptions,”
2019.
[5] M. Singh, D. Singh, and A. Jara, “Secure cloud networks for connected
& automated vehicles,” in 2015 International Conference on Connected
Vehicles and Expo (ICCVE), pp. 330–335, IEEE, 2015.
[6] A. Yacchirena, D. Alulema, D. Aguilar, D. Morocho, F. Encalada, and
E. Granizo, “Analysis of attack and protection systems in wi-fi wireless
networks under the linux operating system,” in 2016 IEEE International
Conference on Automatica (ICA-ACCA), pp. 1–7, IEEE, 2016.
[7] Morrownr, “Morrownr/8812au-20210629: Linux driver for usb wifi
adapters that are based on the rtl8812au chipset - v5.13.6.”