MGT Recon

15. What is the domain of the users of the wifi-regional network?

In MGT networks misconfigured users can send their Identity (username) in clear text before performing the TLS tunnel, so with “airodump-ng” we can passively obtain this information. For this we simply use “airodump-ng” on the correct channel and wait for the clients to connect.

airodump-ng wlan0mon -w ~/wifi/scanc44 -c 44 --wps

Then open the CAP with wireshark.

Once we have the capture we can use Wireshark filtered by “eap” and look for packets with “Response, Identity”.

GLOBAL\Anonymous

GLOBAL\GlobalAdmin

Or use wifi_db

You can use tshark too:

16. What is the email address of the server certificate on wifi-global?

To create the TLS tunnel between the MGT network and a client the AP sends the certificate to the client in clear text, so anyone can see it. This information can be useful to create a fake certificate with the same fields in a RogueAP attack or to obtain information about the corporate domain, internal mails or other relevant information about the AP.

You can get this information directly from wireshark too:

In Wireshark, just filter by certificates using the AP BBSID as filter.

17. What is the EAP method supported by the wifi-global AP?

First we need the identities as discussed above.

GLOBAL\GlobalAdmin

Once we have a valid user we can force each of the EAP authentication methods to verify which methods the AP supports. We can use “EAP_buster ” for this task.


To DO : I am not getting any valid answers

Last updated