Wireless II.

Slides:



Advertisements
Similar presentations
1 Practical stuff Crack the WPA key of this laptop. SSID: « Philips WiFi » Password list and cowpatty table available on CD (only useful today).
Advertisements

ACM Wi-Fi Workshop Presented By: Chris Rawlings Brad Emge.
Medium Access Control Onno W. Purbo
Wireless Cracking By: Christopher Zacky.
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
1 CSCD 439/539 Wireless Networks and Security Lecture 3 Wireless LAN Components and Characteristics Fall 2007 Some Material in these slides from J.F Kurose.
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
.11 Architect. 1 Module contents  IEEE Terminology  IEEE MAC Frames  Basic processes in IEEE networks  Configuration parameters.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
802.11b Frame Details Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Ch. 2 – and NICs Part 2 – MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif.
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
Wireless Encryption: WEP and cracking it. Eric Shea.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.
SkyJacker Theft from Above Imagine RIT Service Set Identifier (SSID) o human readable “network name” Devices store past SSID connections Wireless.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
Doc.:IEEE /1503r1 November 2011 Short Beacon Slide 1 Authors:
Exploits Data Communications Benjamin W. Siegel VCU Information Systems.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Doc.:IEEE /0129r1 January 2012 S.Abraham, Qualcomm Inc Short Beacon Slide 1 Authors:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module 48 (Wireless Hacking)
Rogue Access Points attacks
IT IS 2110 Class # 13 February 22, 2017.
Re-evaluating the WPA2 Security Protocol
Outline What is Wireless LAN Wireless Transmission Types
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Examine Wireless Frames Lab
Only For Education Purpose
Wireless Mesh Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
EEC-484/584 Computer Networks
doc.: IEEE <doc#>
Chapter 6 Medium Access Control Protocols and Local Area Networks
BSS Scanning through Low Power Radio
Basic processes in IEEE networks Configuration parameters
OCT based 6 GHz AP Operation Discussion
WUR MAC Consideration Date: Authors: Nov 2016 Liwen Chu
Protocol Details John Bellardo UCSD.
Breaking into Wi-Fi Networks
Month Year doc.: IEEE yy/xxxxr0
EEC-484/584 Computer Networks
Reducing Overhead in Active Scanning with Simulation Results
Directed Probe Request Clarification
Reducing Overhead in Active Scanning with Simulation Results
FILS Frame Content Date: Authors: February 2008
Use of EAPOL-Key messages
Month Year doc.: IEEE yy/xxxxr0
WPA Cracking && Hashcat.
TGu/TGv Joint Meeting Date: Authors: May 2008 Month Year
Request for Legacy IE ID for RSN Extension
Presentation transcript:

Wireless II

Haktip-17 Frames

Frames – Notes 3 Frame type Management Control Data Beacons Probes Request Response Associations Disassociate Authentication Auth Deauth Control RTS 2 way handshake CTS Time to send ACK Data

Frames – Questions Which frame has REQ, RESP, DISASSOC Association What are the 3 types of frames Management Control Data

Haktip-19 Beacon Frames and Injection

802.11 Beacon Frames and Injection – Notes Beacon: announces presence wireless device Beacon types Ad-hoc Ssid 32 character identifier Timestamp Capability Channel Data Rate MDK3

802.11 Beacon Frames and Injection – Questions What can MDK3 do: Network probing What is the SSID The 32 character wireless network name What does a Beacon do Announces the presence of a wireless device

Haktip-21 Frame Analyzing

Frame Analyzing – Notes ID SSID 32 character text BSSID 6 hex octets Typically the MAC address ESSID All the BSSs in the network Basically the SSID Wireshark Aircrack Airbase-ng MDK3

Frame Analyzing – Questions T/F: the BSSID is always the same as the wireless MAC address F What does the command airbase-ng do: Used with the AT interface to work with the encrypted data. E.g. you can see plaintext before sent and after received

Haktip-23 Probe Requests and  Responses

Probe Requests and Responses – Notes Probes: active Beacons: passive Probe Client Request Respond Info Data rates Ssid Timestamp Type of security Who can you probe A specific AP All

Probe Requests and Responses – Questions Difference between probe and beacon Probe: active – sends/request for you WS Beacon: passive – receives from others Who is FF:FF:FF:FF:FF:FF meant for Everyone!