By John Rodriguez COSC 356 SEC 001 22 April 2015 Wireless Network Attacks.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
Wireless LAN Security Understanding and Preventing Network Attacks.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Awareness Chapter 5 Wireless Network Security.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Computer Networks IGCSE ICT Section 4.
Computer Networking Devices Seven Different Networking Components.
CIST 1601 Information Security Fundamentals Chapter 12 Wireless Networking Security Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Quiz Review.
Wireless Networking 102.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Prepared by:-Nirmal Dhruvi
Wireless Networking and Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Wireless Networks Tamus, Zoltán Ádám
Group Members Nishant Vaity Sushant Chavan Wireless Networks As early as 1901, the Italian physcist Guglielmo Marconi demostrated a ship-to- shore.
IST 210 Is “Secure Database” an Oxymoron. IST New technology We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager.
1/28/2010 Network Plus Wireless Protocols Wireless Printer Setup WPS Used to automatically configure printers for Wireless operation Requires WPS compatibility.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Presented by: Dr. Munam Ali Shah
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
 Process of converting readable data into unreadable characters to prevent unauthorized access. › Encrypt – make unreadable › Decrypt – make readable.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
S305 – Network Infrastructure Chapter 6 Local Area Network.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
WLAN.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Security Tabatha Lakkala Outline 2  Wireless Access Points  Define Wireless Access Points  Hidden and not so hidden dangers  How to protect.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Understand how a router works and its purpose
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Network media, protocols and networking standards, networking hardware.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
ICT Unit 4: Network and the effects of using them
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
TERMINOLOGY Define: WPAN
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Network Security
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Technology.
CompTIA Security+ Study Guide (SY0-501)
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Presentation transcript:

By John Rodriguez COSC 356 SEC April 2015 Wireless Network Attacks

Agenda Bluetooth devices Bluejacking Bluesnarfing Wireless LAN attacks Step one: discovery RF Spectrum Access point attacks Car Jacking Conclusion Questions References

Bluetooth Devices Invented by Ericcson in 1994 Has roughly a range of 10 meters Common Bluetooth items Cell phones Computers External devices Video game consoles Wireless speakers

Bluetooth Devices con’t Bluetooth devices are a Personal Area Network(PAN) Short-range RF All versions backwards compatible Two types: Piconet: instance of two Bluetooth devices in close contact which automatically connect Scatternet: a set of interconnected piconets Attack types: Bluejacking Bluesnarfing

Bluejacking Attack that involves unwarranted messages being sent to Bluetooth devices Usually text, but can be image or sound Not often used as an attack but as a means of bypassing carrier fees Primary uses: Advertising / spam (first known use) Close proximity messaging Preventive measures: Disabling discovery Setting a period of inactivity (like a screen saver)

Bluesnarfing The unauthorized access of information from a wireless device through Bluetooth connection without the users knowledge. Typically results in copied s, contacts, or media. Even when hidden a device can be Bluesnarfed by an attacker detecting the MAC address of the device; however, generally unlikely. Preventive measures: Disabling discovery remains most effective Pins on devices can be overcome

Wireless LANs Networking linking two devices together over a small area, called a coverage area. Operate over two primary frequencies 2.4 GHz, and 5 GHz A computer will access the WLAN through use of an access point (AP) consisting of three major parts: An atenna & radio transmitter, receiver Bridging software Hardwire connection Types of attacks Discovering the network Attacks through the RF spectrum Attacks on Access points

Discovering LANs Beaconing: picking up on a regular interval wireless signal sent out announcing its presence. Two major ways to accomplish this: War driving: searching or wireless signals while mobile using a portable device. This requires a mobile device, wireless access adapter, (option) antenna, software, and GPS. War chalking: adopted practice from the Great Depression involving the use of marked symbols indicating networks in the area.

Attacks on the RF Spectrum Two notable examples: Use of Wireless Protocol Analyzer: setting a wireless NIC to monitor mode allowing it to capture frames without being identified with a particular AP. Interference: an attack that consists of intentional flood of interference on an RF spectrum (2.4 GHz, or 5 GHz). This type of attack is costly, and can be easily identified due to required close proximity, and bulky equipment.

Access Point Attacks Two most common types: Rogue access point: this refers to an access point on a network that may be deceitful, or unreliable. This does not refer to an AP set up by an attacker, but set up without permission on a network. Evil twin: Similar to a rogue access point; however, this one is established by a threat. This is used to trick users into connecting to it, and then capturing data.

Preventive Measures Wireless LAN attacks can be combated in a number of ways: Setting up secure passwords in WEP2 Being mindful of any suspicious people in vicinity of a network Making use of multiple radio frequencies Only connecting to verified, or vetted networks Etc..

Car Jacking(Hacking) Due to the overreliance of embedded computer systems in an automobile, hacking of an automobile has become a new threat. Software controls breaking (ABS), steering (auto-parking), dash devices (built-in GPS), accelerator (cruise control), etc.. Ways to accomplish this: Hardwire connection through the On-Board Diagnostic system Bluetooth connection on newer model cars External media (viruses implanted on CDs, USB)

CNET Report

In Conclusion Covered today: Wireless network attacks Discovering the network Rogue AP, evil twins Bluetooth attacks Bluesnarfing, bluejacking Some examples Car jacking CNET report on carjacking

Questions

References Bunter, Bill. "Bluejacking - Anatomy and Threat Prevention." Brighthub.com. Bright Hub, 8 Aug Web. 12 Apr Ciampa, Mark D. "Chapter 8: Wireless Network Security." Security Guide to Network Security Fundamentals. 4th ed. Boston: Course Technology, Cengage Learning, Print. Coolidge, Craig. "Reducing Rogue Access Points to Ensure a Better Wireless Experience." Reducing Rogue Acces Points. CDW, 28 Jan Web. 10 Apr Newcomb, Doug. "Congress, '60 Minutes' Exaggerate Threat Of Car Hacking." Forbes. Forbes Magazine, 9 Feb Web. 14 Apr "Bluetooth Security Fact Sheet." NSA.gov. NSA. Web. 10 Apr