CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Access Control and Site Security (Part 2) (Tuesday, January 22, 2008) © Abdou Illia – Spring 2008.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Networks Olga Agnew Bryant Likes Daewon Seo.
Wireless(review) a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Wireless Security Chapter 12.
Access Control and Site Security (Part 2) (January 28, 2015) © Abdou Illia – Spring 2015.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
Wireless Networks Tamus, Zoltán Ádám
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Wireless Networking Chapter 23.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless Networks Philip Robbins – December 19, 2013

2 Hacking Wireless Networks Topics Understanding Wireless Technology & Standards Tools Hacking WEP, WPA, WPA2 Uncovering SSIDs Bypassing MAC Address Filtering De-Authentication & Mis-Association Review Q&A Quiz #4

3

4 Understanding Wireless Standards IEEE – IEEE came up the standard for wireless ethernet. – OSI Layers 1 & 2 – 79 channels, 2.4 to GHz (USA) – Half Duplex – CSMA/CA (Avoidance) v.s. CSMA/CD (Detection) – Modulation Techniques

5 Understanding Wireless Standards – Center Frequency & Channels for 2.4 GHz

6 Understanding Wireless Standards – 4 Way Handshake

7 Understanding Wireless Standards – Standards

8

9 Tools Alfa AWUSO36H WiFi Network Adapter

10 Tools Alfa AWUSO36H WiFi Network Adapter

11 Tools Alfa AWUSO36H WiFi Network Adapter 30dBm = 1W

12 Tools Netgear Wireless Router

13 Tools Netgear Wireless Router TARGET AP

14 Tools Netgear Wireless Router TARGET

15 Tools / Configuration “password”

16 Tools / Configuration Forgot the password for your router? …or your neighbors?

17 Tools / Configuration “password” WEP CONFIGURATION

18 Tools / Configuration

19 Tools / Configuration Authentication?

20 Tools / Configuration WPA CONFIGURATION

21 Tools / Configuration

22 Tools / Configuration “password”

23 Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use …

24 Tools

25 Tools

26 Tools

27 Tools

28 Tools AirSnort replacement.

29 Understanding Wireless Technology Wi-Fi Protected Access (WPA) – Touted as a step up from WEP – Weak passphrases renders the protection inadequate – False sense of security – Network Sniffers – TKIP v.s. AES

30 Cracking WPA

31 Cracking WPA

32 Cracking WPA

33 r Cracking WPA

34 r Cracking WPA

35 Cracking WPA

36 r Cracking WPA

37 r Cracking WPA

38 Cracking WPA

39 r Cracking WPA

40 r Cracking WPA

41 Cracking WPA

42 Cracking WPA

43 Cracking WPA Can take a few hours to go through 1+ million keys…

44 Cracking WPA

45 Cracking WPA

46 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

47 Understanding Wireless Technology Wired Equivalent Privacy (WEP) – Confidentiality – Access Control – Data Integrity – In reality, none of these are actually enforced!

48 Understanding Wireless Technology Wired Equivalent Privacy (WEP) Stream Cipher using XOR Keystream 64-bit Keyspace (2^64 keys) 128-bit Keyspace (2^128 keys) 40 bits24 bits

49 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

50 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

51 Understanding Wireless Technology Wired Equivalent Privacy

52 Cracking WEP

53 Cracking WEP

54 Cracking WEP

55 Cracking WEP

56 Cracking WEP

57 Cracking WEP

58 Cracking WEP 1 2 3

59 Bypassing MAC filtering

60 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a b a c b d X

61 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a b a c b d X

62 Review Questions Question #2 Which IEEE standard defines wireless technology? a b c d.All 802 standards

63 Review Questions Question #2 Which IEEE standard defines wireless technology? a b c d.All 802 standards

64 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA

65 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA

66 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength

67 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength

68 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory

69 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory

70 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a a b b c i d

71 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a a b b c i d

72 Review Questions Question #7 What protocol was added to i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS

73 Review Questions Question #7 What protocol was added to i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS

74 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE

75 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE

76 Review Questions Question #9 The operating frequency range of a is 2.4 GHZ. True or False? a.TRUE b.FALSE

77 Review Questions Question #9 The operating frequency range of a is 2.4 GHZ. True or False? a.TRUE b.FALSE

78 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)

79 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)

80 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA

81 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA

82 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)

83 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)

84 Questions? www2.hawaii.edu/~probbins