Wifi
Wifi
Introduction
Wi-Fi, rumored on corners of the internet to be short for *Wireless Fidelity*, is a technology that allows devices to connect to a network wirelessly using the IEEE 802.11 standards. It enables laptops, smartphones, IoT devices, and countless other systems to exchange data over radio waves instead of physical cables. Operating primarily in the 2.4 GHz and 5 GHz bands—now extended to 6 GHz with Wi-Fi 6E—Wi-Fi is a cornerstone of modern digital communication, both in homes and in industrial, academic, and military environments.
History and Evolution of Wi-Fi Versions
Since its inception, Wi-Fi has evolved significantly in speed, range, and efficiency. The following table summarizes major iterations:
Wi-Fi Version | IEEE Standard | Year Introduced | Max Speed | Key Features |
---|---|---|---|---|
Wi-Fi 1 | 802.11b | 1999 | 11 Mbps | First widely adopted standard |
Wi-Fi 2 | 802.11a | 1999 | 54 Mbps | Operated in 5 GHz band |
Wi-Fi 3 | 802.11g | 2003 | 54 Mbps | Backward-compatible with 802.11b |
Wi-Fi 4 | 802.11n | 2009 | 600 Mbps | MIMO (Multiple Input, Multiple Output) |
Wi-Fi 5 | 802.11ac | 2014 | 1.3+ Gbps | Beamforming, wider channels |
Wi-Fi HaLow | 802.11ah | 2016 | ~347 Mbps (short range), lower for long range | Operates in sub-1 GHz bands, designed for long-range, low-power IoT, often compared to LoRa |
Wi-Fi 6 | 802.11ax | 2019 | 9.6 Gbps | OFDMA, MU-MIMO, Target Wake Time |
Wi-Fi 6E | 802.11ax (6 GHz) | 2021 | 9.6 Gbps | Expansion to 6 GHz spectrum |
Wi-Fi 7 | 802.11be | Expected 2024-2025 | 30+ Gbps | Extremely low latency, 320 MHz channels |
Wi-Fi as a Signal Intelligence Vector
While Wi-Fi is best known for its utility, it is also a rich source of wireless signal intelligence. Every Wi-Fi-enabled device emits frames containing identifiers, signal strength, channel usage, and even hints of user behavior. Open-source tools, such as **Aircrack-NG** and **Kismet Wireless**, can passively intercept and analyze these emissions.
Aircrack-NG and Wireless Surveying
The Aircrack-NG suite is a powerful collection of open-source tools used for auditing Wi-Fi network security. At the heart of this toolkit is Airodump-NG, a packet capture utility tool that allows users to monitor all nearby wireless traffic while collecting critical metadata such as BSSIDs, ESSIDs, encryption types, and client association data. Airodump-NG can capture WPA2 four-way handshakes when clients connect to access points.
Once a handshake is captured, Aircrack-NG can be used to attempt to recover the pre-shared key (PSK) by executing dictionary-based or brute-force attacks against the encrypted credentials found in the `.pcap` file. This makes Aircrack-NG a foundational toolset in Wi-Fi penetration testing, especially for assessing the effectiveness of a network's Wi-Fi security settings an the strength of user-chosen passwords on WPA/WPA2 networks.
Kismet Wireless Overview
Kismet is a robust, open-source wireless network detector, sniffer, and intrusion detection system. It supports most Wi-Fi cards capable of monitor mode and can work in both passive and active scanning modes. Kismet does not transmit packets by default, making it ideal for covert data collection and RF analysis.
Key Features:
- Capture of beacon, probe request, probe response, and data frames
- Real-time detection of new devices and access points
- Logging and replay capabilities in pcap and netxml formats
- Integration with GPS for geolocation of detected networks and clients
- Support for 802.11a/b/g/n/ac/ax, and 802.15/802.11-based SDR sniffing
Capturing WPA2 Four-Way Handshakes
The WPA2-PSK (Wi-Fi Protected Access 2 - Pre-Shared Key) authentication model relies on a four-way handshake exchange between a client and access point. Using Airodump-NG (a tool of the Aircrack-NG suite), passive capture of a 4-way handshake and even the "half handshake" are possible - allowing that network's PSK to be cracked. Kismet can be configured to passively capture this handshake, a critical step in offline password cracking using tools like `hashcat` or `aircrack-ng`.
Steps to Capture a Handshake Using Kismet
1. Enable monitor mode on a compatible wireless card.
2. Launch Kismet and configure it to use the desired interface and lock to the channel of targeted AP.
3. Wait for a client to connect to the target AP or force a reconnection (with external tools like `aireplay-ng`).
4. Kismet will automatically log the handshake when the client rejoins.
5. Extract the handshake from the Kismet logs (`.pcap` format) and analyze it with cracking tools.
Wi-Fi Direction Finding and Target Tracking
Each Wi-Fi device, whether an access point or a client, emits frames containing its MAC address and other metadata. These emissions serve as a unique digital signature, especially when randomized MAC features are disabled or circumvented.
With multiple antennas or mobile setups, Kismet (in conjunction with other tools such as `rtlamr`, `Yagi antennas`, or GPS) can be used to:
- Estimate signal strength and triangulate a source's location
- Correlate devices across time and space using MAC address persistence
- Track specific clients (e.g., mobile phones) through probe requests or known AP responses
This kind of RF telemetry is often employed in:
- Penetration testing and red team operations
- Crowd monitoring and de-anonymization research
- Asset tracking in secure environments
Ethical and Legal Considerations
While tools like Kismet and Aircrack-NG are invaluable for legitimate security research and network diagnostics, unauthorized interception of wireless traffic may violate local or federal laws. Always ensure you have **explicit authorization** before engaging in wireless surveillance or traffic capture.
Conclusion
Wi-Fi is more than a convenient way to access the internet—it is a constantly emitting RF signature that can be analyzed, mapped, and, under the right circumstances, exploited. Tools like Aircrack-NG and Kismet Wireless democratize access to this data, enabling defenders, researchers, and ethical hackers to better understand the RF landscape, secure networks, and conduct technical reconnaissance in a wireless-first world.
Disclaimer
This wiki page is intended for educational and informational purposes only. All content, including guides, tools, and methodologies discussed herein, is provided with the explicit understanding that it will be used responsibly, ethically, and legally.
Unauthorized access, surveillance, or manipulation of networks, systems, or devices without proper consent is illegal and strictly condemned by the administrators of this wiki. We do not condone or support any activities that violate laws, terms of service, or the privacy of individuals or organizations.
Users are solely responsible for how they apply the knowledge found on this site. Always ensure you have clear permission before engaging in any form of network analysis, penetration testing, or signal monitoring. Use common sense, good judgment, and respect for legal boundaries at all times.