security-labs

πŸ“‘ Project 02 β€” Network Penetration Testing

CEH-aligned penetration testing on wireless protocols β€” WEP, WPA, WPA2. Documented attack methodologies and hardening strategies.


🎯 Objective

Conducted comprehensive wireless network security assessments simulating real-world attacks on common Wi-Fi security protocols. Documented exploitation techniques and deployed defense strategies to harden enterprise wireless infrastructure.


πŸ”§ Lab Setup

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Kali Linux VM  β”‚
β”‚ (Aircrack-ng)  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚
         β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Target Router  │◀───▢│  Connected VMs  β”‚
β”‚  (WEP/WPA/WPA2) β”‚     β”‚  (Lab Network)  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚
         β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  Wireless Card  β”‚     β”‚  Deauth Attack  β”‚
β”‚  (Monitor Mode)  │────▢│  Handshake Cap  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ§ͺ Methodology

Phase 1 β€” reconnaissance

Phase 2 β€” Attacks

WEP Cracking

WPA/WPA2 β€” Handshake Capture

WPA2 β€” KRACK Attack Simulation

Phase 3 β€” Documentation


πŸ“Š Results

Protocol Attack Result Time
WEP IV Injection βœ… Cracked ~8 min
WPA Handshake + Dict Attack βœ… Cracked (weak password) ~45 min
WPA2 Handshake + Dict Attack βœ… Cracked (weak password) ~45 min
WPA2 KRACK Simulation ⚠️ Partial (client dependent) β€”

πŸ›‘οΈ Defensive Hardening β€” Deployed


πŸ“‹ Security Controls Assessment

Control Status Notes
Encryption Protocol ❌ Needs Upgrade WEP in use on legacy APs
Password Complexity ⚠️ Weak Short passwords easily cracked
Rogue AP Detection ❌ Missing No monitoring in place
Network Segmentation βœ… Implemented VLANs configured post-assessment
802.1X / EAP-TLS ⚠️ Planned Migration in progress
WPA3 Adoption βœ… Complete Post-assessment deployed

πŸ”§ Tech Stack

Kali Linux Β· Aircrack-ng Β· Wireshark Β· Nmap Β· Airmon-ng Β· Crunch Β· WPA_supplicant


⚠️ Disclaimer

All testing was performed on networks and systems owned by me or with explicit written consent. No wireless networks were targeted without permission. This project is for educational and authorised security testing purposes only.