MIS 5212.001 Week 11 Site:

Slides:



Advertisements
Similar presentations
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Advertisements

ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Wireless Cracking By: Christopher Zacky.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
MIS Week 12 Site:
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
How to Secure a Home Wi-Fi S. Roy. Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
RADIUS Secured and Authenticated WiFi Robert Leahy Charles Bodman Brandon Ellis.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Certain security vulnerabilities exist in every mode of wireless communications.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Encryption: WEP and cracking it. Eric Shea.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
© 2010 Cisco Systems, Inc. All rights reserved. 1 CREATE Re-Tooling Exploring Protocols with Wireshark March 12, 2011 CREATE CATC and Ohlone College.
Wireless Networking & Security Greg Stabler Spencer Smith.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Distributed WPA Cracking CSCI Distributed Systems Spring 2011 University of Colorado Rodney Beede Ryan Kroiss Arpit Sud
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
MIS Week 5 Site:
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Advanced Penetration testing
Re-evaluating the WPA2 Security Protocol
CSCE 548 Student Presentation By Manasa Suthram
OSA vs WEP WPA and WPA II Tools for hacking
Advanced Penetration testing
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Advanced Penetration testing
Advanced Penetration testing
Advanced Penetration testing
Advanced Penetration testing
Advanced Penetration testing
Presentation transcript:

MIS Week 11 Site:

 In the news  Presentations  More Wireless Security  Getting wireless card working in Kali  Introduction to Kismet  Next Week 2MIS

 Submitted  massive-ddos-attack-from_27.html massive-ddos-attack-from_27.html  security.html security.html  otel-wi-fi-can-allow-hackers-to-inject-malware-in- your-systems/ (Broken link at time of slide creation) otel-wi-fi-can-allow-hackers-to-inject-malware-in- your-systems/  icrosoft-subnet/crypto-ransomware-attack-hit-new- jersey-school-district-locked-up-entire- network.html?t51hb icrosoft-subnet/crypto-ransomware-attack-hit-new- jersey-school-district-locked-up-entire- network.html?t51hb MIS

 Submitted  berattackers.aspx?Page=1 berattackers.aspx?Page=1  denial-of-service-attack-on-github-tied-to-chinese- government/ denial-of-service-attack-on-github-tied-to-chinese- government/  hacker-israel.html hacker-israel.html MIS

 What I noted  before-crooks-do-it-for-you/ before-crooks-do-it-for-you/  straight-from-the-scammers/ straight-from-the-scammers/  leaders-leaked-in- /article/406424/ leaders-leaked-in- /article/406424/  ercookies_disabled/ ercookies_disabled/  ding_0days_says_eff/ ding_0days_says_eff/  malware_upload_bug/ malware_upload_bug/  MIS

 If anyone wants to connect with me on LinkedIn, please feel free to shoot me a request  I’ve got connections with a fair number of vendors and consulting companies MIS

7

 Open WiFi Networks vs Encrypted WiFi Networks  In an open network, your browsing can be monitored  Every thing is sent in the clear  WPA2-PSK fixes this “Somewhat” MIS

 Uses a pre-shared key (hence the acronym PSK)  The pre-shared key is known to all authorized users  Anyone with the pre-shared key has what they need to decrypt traffic  Wireshark has a built in option to decrypt traffic if you have the key  This means WPA2-PSK is not much more secure than no encryption, unless you trust everyone on the network MIS

10  Edit->Preferences->IEEE

 WPA2-PSK tries to address this issue by use of PTK  However, the PTK is derived from the PSK  So… It is easy to capture the PTK if you have the PSK MIS

 WPA2-Enterprise corrects these issues for large networks  EAP authentication along with a Radius server ensures each client gets a unique key  Other authenticated users no longer have a master key to decrypt the traffic MIS

 Even in WPA2-Enterprise there is still a potential vulnerability from other authorized users (Abuses GTK or Group Temporal Key)  Limited to:  ARP poisoning  Injecting malicious code  Denial of Service w/o using de-auth packets  More detailed description  /knowledge-center/wpa2-hole196- vulnerability.html /knowledge-center/wpa2-hole196- vulnerability.html MIS

 wireless:  Network detector  Sniffer  Intrusion detection system  Works with any wireless card which supports raw monitoring mode (not all do)  Can sniff:  b  a  g  n MIS

 Supports a plugin architecture allowing for additional non protocols to be decoded  Identifies networks by passively collecting packets and detecting networks, which allows it to detect (and given time, expose the names of) hidden networks and the presence of non- beaconing networks via data traffic MIS

 Pre-installed in Kali  Did not launch from drop down menu in my instance  Needed to start from command line  Be patient, it will walk through configuration  You can automate via configuration files, but for now just follow prompts MIS

 We will  Get USB Wireless Adapter working with Kali  Launch and configure Kismet  Explore a little bit MIS

MIS

 Use the command: iwconfig  This should give something like the following: MIS

MIS

MIS

 ml ml MIS

 Saw this briefly last semester  Pre-installed in Kali MIS

MIS

 Will throw an error due to running as root in Kali, just click OK and move on  Will need to turn wireless menu on by going to View tab and clicking on “Wireless Toolbar” MIS

 Select “wlan0mon”  Click on “Start”  Be patient, it will take a minute or so to update MIS

MIS

 In the news  More wireless  WEP in detail  Intro to AirCrack and breaking WEP MIS

? MIS