Wireless Tools Training materials for wireless trainers.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Wireless LAN Security Understanding and Preventing Network Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University Kai, 2004 INSA1 Using Kismet to enhance the security level in enterprise.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
9-Performing Vulnerability Assessments Dr. John P. Abraham Professor UTPA.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Why Wireless? The answer is simple: Reach users who are often on the move!
Site Surveys: An Introduction PersonalTelco- Play Date VIII June 4th, 2005 Matthew West.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Introduction to WiFi Networking Training materials for wireless trainers.
Wireless Security Training materials for wireless trainers.
Comparative Use of Unlicensed Spectrum Training materials for wireless trainers.
Link Budget Calculation
Securing a Wireless Network
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Lecture 18 HACKING (CONTINUED). WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
Mohan Kumar Puttasiddaiah
Introduction to WiFi Networking Training materials for wireless trainers.
AirDefense’s Role in Wireless Security
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Android Mobile Security Krystal Salerno. Introductions.
A powerful network monitoring system
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Wireless Intrusion Prevention System
Distributed WPA Cracking CSCI Distributed Systems Spring 2011 University of Colorado Rodney Beede Ryan Kroiss Arpit Sud
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Retina Network Security Scanner
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Networking Network Classification, by there: 3 Security And Communications software.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Training materials for wireless trainers Why Wireless?
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter-7 Basic Wireless Concepts and Configuration.
Some Great Open Source Intrusion Detection Systems (IDSs)
Wireless Tools Joel Jaeggli For AIT Wireless Security Workshop.
CSCE 548 Student Presentation By Manasa Suthram
Wireless Security By: Bryan M Keller.
Wireless Network Security
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Hacking.
Real GPEN GIAC Information Security Study Guide Killtest
use of handheld electronic devices for census data collection
ISMS Information Security Management System
Network monitoring tool.
Network hardening Chapter 14.
EVAPI - Enumeration Auburn Hacking club
What’s New In WatchGuard Wi-Fi Cloud v8.6
Introduction to the WatchGuard AP Device
Presentation transcript:

Wireless Tools Training materials for wireless trainers

2 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference

3 Types of wireless tools ‣ Network ESSID scannersWireless protocol analyzersEncryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis

4 Built-in wireless clients

5 NetStumbler

6

7 Kismet

8 KisMAC

9 Handheld wireless clients 9

10 +

11 = extremely powerful wireless protocol analyzer

12

13 ‣ WPA2-PSK Rainbow Tables: 1 million common passwords x 1,000 common SSIDs. 40 GB of lookup tables available on DVDs. ‣ Implementation of an offline dictionary attack against WPA-PSK and WPA2-PSK networks 13

14 Etherpeg

15 Driftnet

16 ‣ Network and port scanner ‣ Rogue AP detection ‣ Scans any number of ports on any number of hosts ‣ Sophisticated stealth scanning ‣ Idle, undetectable service “scanning” ‣ Available for all platforms

17 The Dude ‣ The Dude network monitor is a network auditing and monitoring tool by MikroTik. ‣ The Dude automatically scans devices within specified subnets, draws a map of the networks monitors services and sends alerts when there are problems. ‣ Only available for Windows.

18 Wi-Spy spectrum analyzer

19 Chanalyzer

20 Spectools

21 EaKiu

22 Ubiquiti AirView

23 Conclusion ‣ Network ESSID scanners will find neighboring WiFi networks and provide basic information about them.Wireless protocol analyzers log captured data for later analysis.Encryption cracking tools can be used to test the security of your own networks. ‣ Wireless device auditing and management tools automate the process of managing access points on your network. ‣ “War driving” tools allow you to plot the physical range of your network on a map. ‣ Spectrum analysis tools can show you sources of radio interference not necessarily caused by WiFi. 23

For more details about the topics presented in this lecture, please see the book Wireless Networking in the Developing World, available as free download in many languages at: For more details about the topics presented in this lecture, please see the book Wireless Networking in the Developing World, available as free download in many languages at: Thank you for your attention