CPENT Module 09 Wireless Penetration Testing
CPENT Module 09 Wireless Penetration Testing
Penetration Tester:
Organization:
Date: Location:
Target Organization
URL
Techniques Used 1.
2.
3.
4.
5.
Access Points 1.
Discovered
2.
3.
4.
5.
4.
5.
6.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Physical Location of
Authorized APs
Details of Authorized 1.
Persons having
2.
Physical
Access to APs 3.
4.
5.
Results Analysis:
Target Organization
URL
Scanning Methodologies
Wireless Connections Detected using Active Wireless Connections Detected using
Scanning Passive Scanning
1. 1.
2. 2.
3. 3.
4. 4.
5. 5.
Gathered AP Information
Encryption Beacon
Access Points Discovered SSID BSSID
Technique Strength
1.
2.
3.
4.
5.
6.
7.
8
9.
10.
Identified Network 1.
Vulnerabilities
2.
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Information gathered from Sniffed Traffic
BSSID STATION
PWR PWR
Beacons Packets
#Data Probes
CH Others:
HB
ENC
ESSID
BSSID
Sensitive 1.
Information
2.
obtained Through
Sniffing 3.
4.
5.
6.
7.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Test 1.5: Create a Rogue Access Point and Try to Create a Promiscuous Client
Target Organization
URL
Details of Rogue Access Point
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Details of Honeypot or
Evil Twin AP Used
Captured Login Credentials via Captive Portal or Spoofed DNS Caching? Yes No
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Captured Source 1.
MAC Addresses
2.
3.
4.
5.
Captured Destination 1.
MAC Addresses
2.
3.
4.
5.
Discovered Hosts on 1.
the Wireless
2.
Network
3.
4.
5.
Discovered Hosts on 1.
the Bridged or Wired
2.
LAN
3.
4.
5.
Confidential 15 CPENT Template Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
EC-Council Certified Penetration Testing Professional
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Techniques Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Fake MAC Address Used
IP Address of the AP
Is ARP Poisoning Attack Successful? Yes No
Details Hosts/Subnet 1.
Compromised
2.
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Identified Network 1.
Vulnerabilities
2.
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Command Used to
Monitor Traffic
Command Used to
Collect Traffic Data
Techniques Used to
Recover the Keys
Recovered WPA-PSK
Keys
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Details of Fake AP
Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Results Analysis:
Target Organization
URL
Commands Used
Details of Legitimate
Device Used for
Impersonation
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
DHCP Enabled
Wireless AP Yes No
Laptop Yes No
Does the Target Wireless Network is Allowing Direct Connections to Yes No
Malicious Devices?
IP Address of
Wireless AP
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Information 1.
Gathered from
2.
Wireless Penetration
Testing 3.
4.
5.
1.
2.
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Methods/Techniques 1.
Used
2.
3.
4.
5.
RFID Model
RFID Standard
Other Information, if
any
Step-2: Monitoring Coupling and Frequencies
RFID Operational
Frequency
Suspected
Frequencies Recorded
using Spectrum
Analyzer/Oscilloscope
Step-3: Monitoring Energy supply and modulations
How the RFID Tag
Own Battery Reader Signal
Powered
Details of RFID
Battery
Modulation
Parameters
Step-4: Line encoding, Syntax inference, and Protocol inference using signal Spectrogram
Symbol Coding
Implemented in the
RFID Tag
Step-5: Cryptanalysis
Encoding Techniques
Used
Other Information 1.
Collected
2.
3.
4.
5.
Identified 1.
Vulnerabilities in RFID
2.
Systems
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Details of Devices Used 1.
in Power Analysis
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Equipment Used for 1.
Eavesdropping
2.
3.
4.
5.
Eavesdropping the Legitimate Transmission between the RFID Tag and Yes No
the Reader Successful?
Sensitive Information 1.
Obtained through
2.
Eavesdropping
3.
4.
5.
Identified Vulnerabilities 1.
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Equipment Used for 1.
Eavesdropping and
2.
Intercepting Traffic
3.
4.
5.
Interception of the Communication between the RFID Tag and the Yes No
Reader Successful?
Data Transmitted in Clear Text? Yes No
Information Recovered 1.
2.
3.
4.
5.
6.
7.
8.
9.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Performed DoS Attack Successfully against:
1. RFID Tag YES NO
2. RFID Reader YES NO
3. Backend Server YES NO
Techniques Used to 1.
Perform DoS Attack
2.
3.
4.
5.
Response Received 1.
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Captured Data from the Legitimate RFID Tag and Created a Clone of it Yes No
using a New Chip Successfully?
Overwritten Existing RFID Tag Data with the Spoofed Data (Obtained by Yes No
Eavesdropping) Successfully?
Data Transmitted from an
RFID Tag
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Techniques Used 1.
2.
3.
4.
5.
Intercepted Communication between the RFID Reader and Tag, and Yes No
Captured an RFID Signal Successfully?
Is the RFID Replay Attack Successful? Yes No
Information Gathered 1.
2.
3.
4.
5.
Identified Vulnerabilities 1.
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target RFID System
Injected Infective Viruses to the Memory Space of RFID Tags Yes No
Successfully?
Compromised Backend RFID Middleware Systems via an SQL Injection Yes No
Attack?
Identified Vulnerabilities 1.
that leads to Virus Attacks
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target NFC Device
Eavesdropping of the Communication between NFC Devices Successful? Yes No
Information 1.
Obtained
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target NFC Device
Interfered with the NFC Data Exchange Successfully? Yes No
Is Modifying the Control-Flow of Programs Successful? Yes No
Running Data 1.
Captured
2.
3.
4.
5.
Memory Corruption 1.
Techniques Used to
2.
Override Data
3.
4.
5.
Identified 1.
Vulnerabilities
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Confidential 45 CPENT Template Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
EC-Council Certified Penetration Testing Professional
Results Analysis:
Target Organization
URL
Target NFC Device
Performed Data Corruption Attack Successfully? Yes No
Techniques Used to 1.
Perform Data
2.
Corruption
3.
4.
5.
Identified 1.
Vulnerabilities
2.
3.
4.
5.
6.
7.
8.
9.
10.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Target NFC Device
Eavesdropped, Manipulated and Transmitted the Data to the NFC Yes No
Reader Successfully?
Identified 1.
Vulnerabilities
2.
3.
4.
5.
Devices/Tools Used 1.
2.
3.
4.
5.
Results Analysis: