W IRELESS S ECURITY Chapter 8
History 1971 AlohoNet – Ethernet Protocol st version of Wi-Fi Alliance trade association
US Frequency Bands BandFrequency range UHF ISM MHz S-Band 2-4 GHz S-Band ISM GHz (The higher than cell phones - frequency allows the signal to carry more data.). C-Band 4-8 GHz C-Band satellite downlink GHz C-Band Radar (weather) GHz C-Band ISM GHz C-Band satellite uplink GHz X-Band8-12 GHz X-Band Radar (police/weather) GHz
What do the waves look like? Wave Video
Wireless Local Area Network (WLAN) Connecting two or more systems using wireless Standards WiFi uses radio waves Wireless cards are cheap Irda (direct line of sight – not as many security problems) 150 Feet
Access Point/Hot Spots An AP (access point also known as a AP) is the wireless server that connects clients to the internal network. AP’s typically act as a bridge for the clients. Wifi Wififreespot.com wi-fiplanet.com Boing.com Gogoair.com
Antennas Antennas come in all shapes and styles: – Omni-directional: Vertical Whip Ceiling mount – Directional: Yagi (“Pringles can”) Wall mounted panel Parabolic dish
HotSpots – Are they Safe?
Piggybacking on someone’s else Wireless Internet Google the name: David M. Kauchak
Bluetooth
proprietary open wireless technology standard for exchanging data over short distances (using short- wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices. WiFi – replaces cables for your network vs. Bluetooth – replaces cables for your devices 300 Feet
Bluetooth
Bluetooth Attacks Bluejacking -sends a message to a phone that you don’t know. Usually harmless. Bluesnarking – is unauthorized access of information & often times retrieves information. Blue bugging – similar to bluesnarking but leaves a backdoor and then the “hacker” can come and use the phone. Page
How to Secure Your Bluetooth Always Turn off your Bluetooth. Make Your Phone Visibility to Hidden. Set up a code when pairing devices Set your “Auto Connection without Confirmation” to No in all paired Devices.
Security Tools Airsnort Wepcrack Netstumbler - Kismet -
Group 3: Investigate 4G – how it works & who offers it now in the US? What problems does it still have? Is it worldwide yet? What is Long Term Evolution (LTE) Sidenote: explain this article 0/technology/internet- cable/index.htm 0/technology/internet- cable/index.htm Use: to create a characters to answer these questions. Group 1: War Driving Insertion Attacks Over the Shoulder Evil Twin Attack Sniffer programs If you have a non iphone you can try this: Group 4: How to Secure Your Wirelesss Router What is the difference between WEP & WAP Encryption – which should you use? Use your acting skills to demonstrate and tell us about this. Group 2: WLAN Wireless Mesh Network WWAN MAN Advances in bluetooth babbage/2012/07/footwear-blind babbage/2012/07/footwear-blind 8/31/hi-funs-hi-call-bluetooth- gloves-hands-in-video/ 8/31/hi-funs-hi-call-bluetooth- gloves-hands-in-video/ Group 1 & 2 – Pictures ONLY