Time for action – cracking PEAP
Follow the given instructions to get started:
We double-check the
eap.conf
file to ensure that PEAP is enabled:We then restart the RADIUS server with
radiusd –s –X
:We monitor the log file created by FreeRADIUS-WPE:
Windows has native support for PEAP. Let's ensure that certificate verification has been turned off:
We need to click on the Configure tab that is next to Secured password and tell Windows not to automatically use our Windows logon name and password:
We will also have to force it to select User authentication in the Advanced Settings dialog box:
Once the client connects to the access point, the client is prompted for a user name and password. We use
Monster
as the user name andabcdefghi
as the password:As soon as we do this, we are able to see the MSCHAP-v2 challenge response appear in the log file:
We now use
asleap
to crack this using a password list file that contains the passwordabcdefghi
, and we are able to crack the password! (For the purposes...