1 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Computer Security.

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness Chapter 5 Wireless Network Security.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1 Wireless LAN Security Presented by Vikrant Karan.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Protecting Your Wireless Network Protecting Your Wireless Network University of Tasmania School Of Computing 2007.
WEP Protocol Weaknesses and Vulnerabilities
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Setting Wireless Network At Home By: Parveen Sharma.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
How to hack into mobile phones via bluetooth & How to Hack Wireless Internet Connections in 3 Easy Steps PresentedBy Pradosh H.S.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Module Overview Overview of Wireless Networks Configure a Wireless Network.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
How To Set Up A Wireless Network
Wireless Security Ian Bodley.
Presentation transcript:

1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security

2 C-DAC/Kolkata C-DAC All Rights Reserved This presentation is intended to inform the audience about the dangers associated with a computer network devices and it is not a demonstration of any Hacking.

3 C-DAC/Kolkata C-DAC All Rights Reserved Demos Wireless Security Web Security

4 C-DAC/Kolkata C-DAC All Rights Reserved INDEX Introduction A Step-by-Step process of Wireless Communications Prevent Your Network from Getting Hacked

5 C-DAC/Kolkata C-DAC All Rights Reserved INTRODUCTION

6 C-DAC/Kolkata C-DAC All Rights Reserved Wireless Internet It is internet access without the use of wires. Instead it uses radio frequency bands to exchange information between your computer and the Internet within a range.

7 C-DAC/Kolkata C-DAC All Rights Reserved Types of Wireless Security

8 C-DAC/Kolkata C-DAC All Rights Reserved Types of Security OPEN : No security configured –Obviously not advised –Data is in the air in plain text and anyone can read it WEP : Wired Equivalent privacy –Very week and not recommended – Used in Open and Shared-Key Authentication

9 C-DAC/Kolkata C-DAC All Rights Reserved Types of Security… WPA: Wi-Fi Protected Access –Much better than WEP –Pre shared Key concept used – Encryption Algorithm used TKIP –Easy to setup, as easy as WEP –Available in all the common wi-fi routers –A must for all home users –Will take a long time to break in

10 C-DAC/Kolkata C-DAC All Rights Reserved Types of Security… WPA2: Advance Wi-Fi Protected Access –Better than WPA – Used AES as Encryption System –Takes little more pain to setup –Advised in corporate environments –Strong encryption and authentication support

11 C-DAC/Kolkata C-DAC All Rights Reserved Wireless Security Standards

12 C-DAC/Kolkata C-DAC All Rights Reserved Description of WEP Protocol WEP relies on a shared secret key (40 bit/128 bit) which is shared between the sender (client) and the receiver (Access Point). Secret Key - to encrypt packets before they are transmitted Integrity Check - to ensure packets are not modified in transit. The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points. 12

13 C-DAC/Kolkata C-DAC All Rights Reserved How to configure WPA Open the configuration of your wi-fi device Go to wireless setting Under security option, select any one –WPA –WPA-PSK –WPA-Personal –WPA2-Personal Set a complex password Change the login password of the wireless router. Done

14 C-DAC/Kolkata C-DAC All Rights Reserved Look for this

15 C-DAC/Kolkata C-DAC All Rights Reserved A Step-by-Step process of Wireless Communication

16 C-DAC/Kolkata C-DAC All Rights Reserved A little info… For Connecting with a AP user render data segment called Beacon frames. After connected with AP the data segment is called Packet.

17 C-DAC/Kolkata C-DAC All Rights Reserved More info… Depending on how long the computer is connected, it can generate a certain number of packets per day. The more users that are connected to one access point, the more packets are generated.

18 C-DAC/Kolkata C-DAC All Rights Reserved First… You must locate the wireless signal This can be done by using your default Windows tool “View Available Wireless Network”

19 C-DAC/Kolkata C-DAC All Rights Reserved Second… Once you located a wireless network you can connect to it unless it is using authentication or encryption. If it is using authentication or encryption then for the next step a Cracking tool can be use for WEP keys.

20 C-DAC/Kolkata C-DAC All Rights Reserved Once enough packets recovered it will then captured information gathered from the packets and crack the key giving you access. Third….

21 C-DAC/Kolkata C-DAC All Rights Reserved Prevent Your Network from Getting Hacked

22 C-DAC/Kolkata C-DAC All Rights Reserved Prevent Your Network from Getting Hacked Don’t broadcast your SSID. This is usually done during the setup of your wireless router. Change the default router login to something else. If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. Always check for updates to your router. Turn off your router or access point when not using it.

23 C-DAC/Kolkata C-DAC All Rights Reserved Security Advised Change the router login password frequently –At least once a month Change the wireless WPA password also –At least once a month Avoid temptation to connect to open wireless just looking for free internet.

24 C-DAC/Kolkata C-DAC All Rights Reserved Security Advised.. We can configure DHCP more tightly. –Lets not keep an open pool where any one can connect –Example – I have 3 machines in my home (desktop/laptop/phone) – I’ll create a IP pool of 3 IPs only – I’ll do DHCP reservation using the MAC of these 3 IP – Effectively I’m not allowing any outsider machine to connect

25 C-DAC/Kolkata C-DAC All Rights Reserved Security Advised.. We can configure MAC binding. –Allow only MY machines to connect –Many access points support MAC binding –Any other machine will not be able to connect to my Wi-Fi

26 C-DAC/Kolkata C-DAC All Rights Reserved Web Security

27 C-DAC/Kolkata C-DAC All Rights Reserved Methods Man-in-the-Middle Attacks Stealing Passwords Trojan Horses Exploiting Defaults Wireless Attacks

28 C-DAC/Kolkata C-DAC All Rights Reserved Man-in-the-middle(MITM) Attack MAC(Media Access Control) duplication ARP (Address Resolution Protocol) poisoning Router table poisoning Fake routing tables

29 C-DAC/Kolkata C-DAC All Rights Reserved Conclusion There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.

30 C-DAC/Kolkata C-DAC All Rights Reserved Thank You