MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Overview How to crack WEP and WPA
Wireless LAN Security Understanding and Preventing Network Attacks.
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
1 MSc EEM118 Research Dissertation CITE, UEL Cryptography and Network Security Dr David Xiao
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Wireless Cracking By: Christopher Zacky.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Packet Capture Using Ethereal. Definition for Sniffer: A program and/or device that monitors data traveling over a network. Sniffers can be used both.
Wireless Insecurity.
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Security.
MIS Week 11 Site:
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Tools Training materials for wireless trainers.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Networking Material taken mainly from HowStuffWorks.com.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
COURSE OUTLINE 1 Introduction(History) Key functions Interface analysis 2 Traffic Analysis/OSI Review Protocol Filtering 3 IP and port filtering Wireshark.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Packet Sniffing Hans Kokx
Wireless Tools Joel Jaeggli For AIT Wireless Security Workshop.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
Securing A Wireless Network
Advanced Penetration testing
Traffic Analysis with Ethereal
Wireless Hacking.
Advanced Penetration testing
Take Cyber Security “TO HEART”
Advanced Penetration testing
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Advanced Penetration testing
Presentation transcript:

MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University

MASNET GroupXiuzhen ChengFeb 8, 2006 Project resolutions n Experiment with IEEE b/g networks. n Learn how to use different network analysis tools. n Exploit (WEP) security properties.

MASNET GroupXiuzhen ChengFeb 8, 2006 Warning n Do not hack any wireless networks other than the one provided for this course. n It is your sole responsibility for your actions!

MASNET GroupXiuzhen ChengFeb 8, 2006 Notes (1/2) n No laptop will be provided for this project. If you really can not have a laptop, talk to me after class. n Linux OS is highly recommended for this project, though Windows can do the same job as well. u The best practice is to use a special security Linux distribution (such as WHAX, backtrack and etc) with u A USB flash drive with 1G above capacity.

MASNET GroupXiuzhen ChengFeb 8, 2006 Notes (2/2) n A “good” b/g wireless card, which must be able to run in promiscuous mode. u Not all cards will do this, especially USB based ones. u Most PCMCIA cards will do promiscuous mode just fine though. n You are not required to follow exactly the procedures/steps mentioned below as long as you answer the question correctly. u Those steps are just meant to provide you with some guidelines.

MASNET GroupXiuzhen ChengFeb 8, 2006 Wireless Access Point (AP) Location n There is only one AP located in 719, which is near to AC 725, running both b and g. You can work at AC 725 because it is an open lab. n The network name, i.e., the SSID is CSCI388. n Please report to if the AP seems to be

MASNET GroupXiuzhen ChengFeb 8, 2006 Step 1: network survey n You will have to find the detailed information about the wireless network: u AP’s MAC address. u Security protocol running. u Encryption key length. u Clients association. u Any other information that can help you to crack the key. n For windows users, survey the site using Netstumbler. n For Linux users, use either Kismet or Air snort.

MASNET GroupXiuzhen ChengFeb 8, 2006 Step 1: (snap shot of netstumbler)

MASNET GroupXiuzhen ChengFeb 8, 2006 Step 2: Data collection n Due to the broadcasting feature of the wireless communication, you can sniff the traffic even you are not a legitimate user. u Collect data packets using tools such as Ethereal, Kismet. u After collecting enough encrypted data (ranges from 500 mega to 1G), you are ready to crack the WEP. u For extra credits, you need to detect which service the server is running and figure out how to get the file via hacking that service.

MASNET GroupXiuzhen ChengFeb 8, 2006 Step 2: (snap shot of ethereal)

MASNET GroupXiuzhen ChengFeb 8, 2006 Step 3: crack the key n Crack the WEP key using the collected data. You can recovery the key by: u The weakness of the key scheduling in RC4. u Active dictionary attack. u Or any other attacking measures (some attacking method can make your life much easier. Last year’s record is two hours). u Once you recovery the key (in ASCII format, convert it to ASCII if you get a key in hexadecimal format), you know you did it right.

MASNET GroupXiuzhen ChengFeb 8, 2006 Extra credits: Hack into the server n Use the data collected in step 2: u Detect which service the server is running. u figure out the user name and password. u Then, get the file from the server using the user name and password. u You may need a little extra works in order to associate with the AP and get access to the server.

MASNET GroupXiuzhen ChengFeb 8, 2006 What to turn in n A zip or tar ball file that contains: u Detailed cracking steps (including what tools are used, how to install and run them, provide snapshot if necessary). u The WEP encryption key. u One legitimate MAC address. u Answers to the questions. n Extra credits: u The user account and its password of the service that is running on the server. u The file you see after you hack into the server.

MASNET GroupXiuzhen ChengFeb 8, 2006 Available tools n Windows Wireless Security Tools u Ethereal – a free network protocol analyzer (sniffer) u WinPcap – for capturing packets u Netstumbler – site surveying utility u tinyPEAP – Official tinyPEAP site u Change MAC address: or u WepLab – a Wep Security Analyzer. n Linux Wireless Security Tools u Ethereal – a free network protocol analyzer (sniffer) u LibPcap – should be available with your distribution of Linux. u Kismet – A VERY good tool for surveying wireless networks puts Netstumbler to shame u Airsnort – A utility for cracking WEP keys. Also, you can get information about Monitor mode on the Airsnort page. You may find this useful, although not essential. u For changing you MAC address in Linux, use ifconfig hw ether. u WepLab – a Wep Security Analyzer. u WepAttack – this tool uses different approach (active dictionary attack) to crack the WEP. You are welcome to try it.

MASNET GroupXiuzhen ChengFeb 8, 2006 Questions? Good luck and have fun!

MASNET GroupXiuzhen ChengFeb 8, 2006 Backup slides: Snapshot of Kismet

MASNET GroupXiuzhen ChengFeb 8, 2006 Backup slides: Snapshot of AirSnort