IoTcube Logo
IoTcube

Security Platform

User Guide : Blackbox-testing wfuzz

INTRODUCTION

Wi-Fi Fuzzer (wfuzz) is a tool for discovering implementation errors of 802.11-enabled devices by using smart and stateful fuzzing techniques. It automatically generates possible vulnerable inputs regarding the 802.11 protocol specification to find unknown vulnerabilities in the 802.11 stack of target devices.

USAGE

Requirements

  • <strong>A Wi-Fi dongle (supporting monitoring mode)</strong> connected to the host machine
  • Recommended model : ipTIME N150UA-4dBi
  • <strong>(Important!)</strong> In case of running the tool on virtual machine, avoid using the VirtualBox. We recommend you to run on the VMware because wfuzz is not fully compatible in the VirtualBox.

Step 1. Getting Started

To begin wfuzz, click Blackbox Testing on the main page of IoTcube, and proceed by clicking Wireless Testing.

Step 1. Getting Started

Step 2. Downloading wfuzz

In the following page, download wfuzz, which is a zip containing the main fuzzer and packet database.

Linux (32 and 64 bit) is supported at the moment.

Step 2. Downloading wfuzz

Step 3. Unarchiving Package

Please unzip the package "wfuzz.zip" downloaded in the previous step with your own unarchiving tool.

Step 3. Unarchiving Package
  • config_wfuzz.sh: Configuration script for wfuzz. Must be run with <strong>root priviledge (sudo)</strong> before wfuzz(only once).
  • wfuzz: You can launch a fuzzing process by executing this program. wfuzz must be run with <strong>root priviledge (sudo)</strong>
  • data.db: It stores packets for smart &amp; stateful fuzzing.

After unzipping the package, you will have several files for fuzzing.

Step 4. Running Program

Open terminal, go to the wfuzz directory and run config_wfuzz.sh with sudo command(only once).

Step 4. Running Program

Then run wfuzz with sudo command.

Additional content 1

Step 5. Selecting A Dongle and A Target AP

Select a Wi-Fi dongle you've connected.

Step 5. Selecting A Dongle and A Target AP

Select any profile of the target device. Then it automatically starts! wfuzz can test private acess points even if the authentication key is not available. If you want to stop the fuzzing process, press Ctrl + C

Additional content 1

Step 6. Uploading Your Log

Find the log.wfl file created in the same directory as the fuzzing program and upload it to IoTcube.

Step 6. Uploading Your Log

POSSIBLE COLLABORATION

For inquiries, suggestions or possible collaboration please send an email to cssa@korea.ac.kr.