In this video I demonstrate how to configure the router, and subsequently check if our wireless “lab” is working. Following that, methods for cracking the obtained MSCHAPv2 credentials using wordlists are shown.
DISCLAIMER: Setting up Rogue Access Points is unethical, but is generally not illegal by itself. Deauthenticating clients (i.e. any type of device) from any network without explicit written permission is illegal in most countries. Logging on to any secured wireless network, which you have obtained access by cracking the handshake is also considered illegal in most countries. This is just a friendly reminder that just because you CAN, does not mean you SHOULD (hack everyone’s wireless networks).
– Router Configuration for WPA2 Enterprise
– Freeradius Authentication Notes
– Cracking MSCHAPv2 With Asleap and John
Stay tuned and subscribe for more upcoming videos showing actual hacks!