By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking.

Slides:



Advertisements
Similar presentations
Brute Force Attack Against Wi-Fi Protected Setup
Advertisements

Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
Home Wireless Security David Mitchell 12/11/2007.
Security in Wireless Networks Juan Camilo Quintero D
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Insecurity.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.
Securing a Wireless Network
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.
Confidential and Proprietary Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze Leo Walsh, GSNA Professional Jefferson Wells.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
Wireless Networking & Security Greg Stabler Spencer Smith.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Setting Wireless Network At Home By: Parveen Sharma.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing a Wireless Home Network BY: ARGA PRIBADI.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
TERMINOLOGY Define: WPAN
Wireless Security By: Bryan M Keller.
HACKING & INFORMATION SECURITY
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
Wireless Local Area Network (WLAN)
802.11b Wireless Network Security
WLAN Security Antti Miettinen.
Presentation transcript:

By Vamseedhar Vuppu The Secrets of Wireless Hacking

Agenda Wireless Standard Encryption Schemes Wardriving Tools used for wardriving Attacking networks Tools used Defenses Conclusion

wireless standard IEEE is a set of standards for WLAN

Different Standards

Encryption Schemes WEP(Wired Equivalent Privacy) - First scheme for securing WAP AND WAP2(Wi-Fi Protected Access) - Standard schemes used today WAP-PSK (Pre-shared key) - Used in home and small office networks

Wardriving Tools Tools used in different platforms

NetStumbler Tool used in windows

Attacking networks Note: Hacking other’s network without the permission of network owner is illegal [2]. Penetration Testing tools are used Powerful Tool is BackTrack2 -Linux live distribution for pen testing -Voted as #1 tool for pen testing[3] -more than 300 security tools

Backtrack2

Defenses Minimize signal exposure SSID (Network name) - Broadcasting SSID - Not broadcasting SSID Unique SSID

Conclusion I suggest everyone to implement WPA- PSK encryption with strong passphrases and unique SSID for their networks. In future we can expect a strong encryption scheme than WPA that will come into existence

References Gast, M. (2002) Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates. Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing BackTrack (2007). Retrieved December 4, 2007, from exploit.org/backtrack.html

Questions ?