By Vamseedhar Vuppu The Secrets of Wireless Hacking
Agenda Wireless Standard Encryption Schemes Wardriving Tools used for wardriving Attacking networks Tools used Defenses Conclusion
wireless standard IEEE is a set of standards for WLAN
Different Standards
Encryption Schemes WEP(Wired Equivalent Privacy) - First scheme for securing WAP AND WAP2(Wi-Fi Protected Access) - Standard schemes used today WAP-PSK (Pre-shared key) - Used in home and small office networks
Wardriving Tools Tools used in different platforms
NetStumbler Tool used in windows
Attacking networks Note: Hacking other’s network without the permission of network owner is illegal [2]. Penetration Testing tools are used Powerful Tool is BackTrack2 -Linux live distribution for pen testing -Voted as #1 tool for pen testing[3] -more than 300 security tools
Backtrack2
Defenses Minimize signal exposure SSID (Network name) - Broadcasting SSID - Not broadcasting SSID Unique SSID
Conclusion I suggest everyone to implement WPA- PSK encryption with strong passphrases and unique SSID for their networks. In future we can expect a strong encryption scheme than WPA that will come into existence
References Gast, M. (2002) Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates. Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing BackTrack (2007). Retrieved December 4, 2007, from exploit.org/backtrack.html
Questions ?