Time for action – cracking PEAP
Follow the given instructions to get started:
We double-check the
eap.conf
file to ensure that PEAP is enabled:We then restart the Radius server with
Radiusd –s –X
:We monitor the log file created by FreeRadius-WPE:
Windows has native support for PEAP. Let's ensure that Certificate Verification has been turned off:
We just need to connect to the access point Wireless Lab for Windows to start PEAP authentication:
Once the client connects to the access point, the client is prompted for a User name / Password. We use SecurityTube as the User name and abcdefghi as the Password:
As soon as we do this, we are able to see the
MSCHAP-v2
challenge response appear in the log file:We now use
Asleap
to crack this using a password list file that contains the passwordabcdefghi
and we are able to crack the password!
What just happened?
We set up our Honeypot using FreeRadius-WPE. The enterprise client is mis-configured to not use certificate validation with PEAP. This allows...