Wireless LAN Security  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD.

Slides:



Advertisements
Similar presentations
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Advertisements

Overview How to crack WEP and WPA
Wireless LAN Security Understanding and Preventing Network Attacks.
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Wireless technology hit the American market more than 60 years ago during World War I and World War II Today its the IEEE standard, also known.
Wireless Cracking By: Christopher Zacky.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
7/31/2002Black Hat 2002, Las Vegas NV Advanced Attack Mike Lynn & Robert Baird.
Information Networking Security and Assurance Lab National Chung Cheng University Kai, 2004 INSA1 Using Kismet to enhance the security level in enterprise.
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Introduction to Site Surveys Matt Larsen, CEO Skybeam.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN Configuring Cisco WLAN Clients BCMSN Module 6 Lesson 4.
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
Wireless Insecurity.
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Wireless LAN Security  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Wireless Security.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
Hands-On Ethical Hacking and Network Defense
Laboratoires & Matériels WiFi
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
Chapter 8 Wireless Hacking Last modified
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
1350 TAC Training © 2000, Cisco Systems, Inc. Cisco Aironet 350 Series Product and Software Update WNBU Technical Marketing.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
RTL8712(8188_8191_8192SU) USB Linux Driver Quick Installation Guide
RTL8192C USB Linux Driver Quick Installation Guide
Chapter 8 Wireless Hacking Last modified
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.
FreeBSD WLAN Futures Sam Leffler Errno Consulting
Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
ItrainOnline MMTK Last updated: 23 April 2006 T. Krag, B. Roger 1 Wireless Client Installation Developed by: Tomas Krag, wire.less.dk.
Packet Sniffing Hans Kokx
Rogue Access Points attacks
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Presented By: Rohit Maurya
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Advanced Penetration testing
Only For Education Purpose
Wireless Hacking.
802.11b Wireless Network Security
Advanced Penetration testing
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
WPA Cracking && Hashcat.
Advanced Penetration testing
Presentation transcript:

Wireless LAN Security  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing & Managing Wireless LAN : Implementing 802.1x EAP-TLS EAP-PEAP-MSCHAPv2, FreeRADIUS + dialupadmin + MySQL with Windows XP SP1 & Linux Client ( DEMO )  Make Deep Security with WPA2 Wifi Protected Access = 802.1x + ( TKIP or CCMP ) Wifi Protected Access = 802.1x + ( TKIP or CCMP )

Hacking and Cracking Wireless LAN by Josua M Sinambela Pengguna OpenSource

Hardware Requirement Card Wireless ( USB/PCI/PCMCIA ) Card Wireless ( USB/PCI/PCMCIA ) Recommended : PCMCIA with Prism2 Firmware or Orinoco Compatible USB with Prism Firmware or Orinoco Compatible PC/Notebook/Laptop with Linux/BSD OS PC/Notebook/Laptop with Linux/BSD OS Recommended : Notebook/Laptop with PCMCIA slot Optional Antenna for more gain Optional Antenna for more gain

Tools/Software Kismet : War-driving with passive mode scanning and sniffing a/b/g, site survey tools Kismet : War-driving with passive mode scanning and sniffing a/b/g, site survey tools Airsnort : Sniffing and Cracking WEP Airsnort : Sniffing and Cracking WEP Ethereal : Sniffing and Analyze dump packet Ethereal : Sniffing and Analyze dump packet Airfart : Wireless Scanning and monitoring Airfart : Wireless Scanning and monitoring Airjack : MITM Attack and DoS tools Airjack : MITM Attack and DoS tools FakeAP : Fake AP tools FakeAP : Fake AP tools WEPCrack : Cracking WEP WEPCrack : Cracking WEP

Kismet Needs driver which are capable of reporting packets in rfmon like : Needs driver which are capable of reporting packets in rfmon like : ACX100, ADMTek, Atheros, Cisco, Prism2, Orinoco, WSP100, Drone, pcapfile, wrt54g Not work : Intel Centrino, Broadcom, Airport Extreme, Atmel, Realtek, HermesII Source Code Download from : Source Code Download from : For RPM-man : For RPM-man : or Ask Uncle Google or Ask Uncle Google How to Install Kismet from source ? How to Install Kismet from source ? README !!! It requires many Libraries & Utilities.

Compiling and Installing tar –zxvf kismet R1.tar.gz tar –zxvf kismet R1.tar.gz cd kismet R1 cd kismet R1./configure./configure make (linux) or gmake (BSD) make (linux) or gmake (BSD) make install (linux) or gmake install (BSD) make install (linux) or gmake install (BSD) cd /usr/local/etc/ cd /usr/local/etc/ vi kismet.conf vi kismet.conf

kismet.conf suiduser=josh suiduser=josh Source Driver.. ( in linux ) #source=orinoco,eth1,orinocosource #source=orinoco,eth1,orinocosource #source=wlanng_avs,wlan0,newprism2source #source=wlanng_avs,wlan0,newprism2source #source=hostap,wlan0,hostap #source=hostap,wlan0,hostap Source Driver.. ( prism2 in BSD ) #source=radiotap_fbsd_b,wi0,prismbsd #source=radiotap_fbsd_b,wi0,prismbsd piddir=/home/josh piddir=/home/josh

How to Run kismet daemon Run kismet as superuser/root Run kismet as superuser/root Run from shell/terminal console Run from shell/terminal console Run only in suiduser home directory ( see kismet.conf ) or in the directory that can be written by suiduser like /tmp Run only in suiduser home directory ( see kismet.conf ) or in the directory that can be written by suiduser like /tmp cd /home/josh cd /home/josh kismet kismet

Press “h” for help

Kismet In Action

AirSnort Works only with Cards : Works only with Cards : Cisco, Prism2, Orinoco Source Code Downloaded from : Source Code Downloaded from : For RPM-man : or Ask uncle Google or Ask uncle Google How to Install AirSnort from source ? How to Install AirSnort from source ? README !!! It requires many Libraries & Utilities.

Compiling and Installing tar –zxvf airsnort tar.gz tar –zxvf airsnort tar.gz cd airsnort cd airsnort /configure./configure make make make install make install

How to Run Airsnort Airsnort works in XWindows mode Airsnort works in XWindows mode Open Terminal program Open Terminal program su to Superuser/root ( only root can change wireless adapter mode ) su to Superuser/root ( only root can change wireless adapter mode ) Run with type airsnort & Run with type airsnort &

Airsnort Interface

AirSnort In Action

Ethereal Get the source Get the source Or install from Installation CD Or install from Installation CD I use Mandrake 10.0 Official. It is available Run Ethereal in XWindows Run Ethereal in XWindows

Ethereal in Action

AirFart Used for Scanning and Wireless Monitoring Used for Scanning and Wireless Monitoring Only supports prism2 cards with wlan-ng driver. Only supports prism2 cards with wlan-ng driver. Get source from : Get source from :

AirFart Interfaces

FakeAP FakeAP generates b beacon with random ESSID, BSSID (MAC) and channel. FakeAP generates b beacon with random ESSID, BSSID (MAC) and channel. Works only with PRISM2/2.5/3 Card with hostap driver ( Master Mode ) Works only with PRISM2/2.5/3 Card with hostap driver ( Master Mode ) Needs hostap-utils for activate WEP Needs hostap-utils for activate WEP Get from Get from

Install FakeAP local]# tar -zxvf fakeap031.tar.gz local]# tar -zxvf fakeap031.tar.gzfakeap-0.3.1/fakeap-0.3.1/fakeap.plfakeap-0.3.1/CREDITSfakeap-0.3.1/COPYINGfakeap-0.3.1/READMEfakeap-0.3.1/INSTALLfakeap-0.3.1/lists/fakeap-0.3.1/lists/stefan-maclist.txtfakeap-0.3.1/lists/stefan-wordlist.txtfakeap-0.3.1/lists/koaps-fo-wo local]# cd fakeap-0.3.1/ local]# cd fakeap-0.3.1/ fakeap-0.3.1]# vi fakeap.pl fakeap-0.3.1]# vi fakeap.pl

Edit fake.pl my $MAX_CHANNEL = 14; my $MAX_CHANNEL = 14; my $IWCONFIG = "/sbin/iwconfig"; my $IWCONFIG = "/sbin/iwconfig"; my $IFCONFIG = "/sbin/ifconfig"; my $IFCONFIG = "/sbin/ifconfig"; my $CRYPTCONF = "/usr/src/hostap-utils-0.2.4/hostap_crypt_conf"; my $CRYPTCONF = "/usr/src/hostap-utils-0.2.4/hostap_crypt_conf"; RUN fake.pl fakeap-0.3.1]# perl fakeap.pl fakeap Wardrivring countermeasures Copyright (c) 2002 Black Alchemy Enterprises. All rights reserved Usage: fakeap.pl --interface wlanX [--channel X] [--mac XX:XX...] [--essid NAME] [--words FILENAME] [--sleep N] [--vendors FILENAME] [--essid NAME] [--words FILENAME] [--sleep N] [--vendors FILENAME] [--wep N] [--key KEY] [--power N] [--wep N] [--key KEY] [--power N] --channel X Use static channel X --channel X Use static channel X --essid NAME Use static ESSID NAME --essid NAME Use static ESSID NAME --mac XX:XX... Use static MAC address XX:... --mac XX:XX... Use static MAC address XX:... --words FILE Use FILE to create ESSIDs --words FILE Use FILE to create ESSIDs --sleep N Sleep N Ssec between changes, default sleep N Sleep N Ssec between changes, default vendor FILE Use FILE to define vendor MAC prefixes --vendor FILE Use FILE to define vendor MAC prefixes --wep N Use WEP with probability N where 0 < N <= 1 --wep N Use WEP with probability N where 0 < N <= 1 --key KEY Use KEY as the WEP key. Passed raw to iwconfig --key KEY Use KEY as the WEP key. Passed raw to iwconfig --power N Vary Tx power between 1 and N. In milliwatts --power N Vary Tx power between 1 and N. In milliwatts

FakeAP in Action

Impact of FakeAP for airfart

Impact of FakeAP for Kismet

Impact of FakeAP for Netstumbler

AirJack Used for jamming (DoS) and Man In The Middle Attack (MITM) Used for jamming (DoS) and Man In The Middle Attack (MITM) Works in prism2 and Lucent cards Works in prism2 and Lucent cards Only works for Linux kernel 2.4  Only works for Linux kernel 2.4 

Hacking and Cracking Wireless LAN by Josua M Sinambela Network Administrator JTE UGM