Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.

Slides:



Advertisements
Similar presentations
1 Practical stuff Crack the WPA key of this laptop. SSID: « Philips WiFi » Password list and cowpatty table available on CD (only useful today).
Advertisements

Medium Access Control Onno W. Purbo
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
.11 Architect. 1 Module contents  IEEE Terminology  IEEE MAC Frames  Basic processes in IEEE networks  Configuration parameters.
Submission doc.: IEEE 11-12/279r0 March 2012 Jarkko Kneckt, NokiaSlide ai simulations Date: Authors:
WLAN What is WLAN? Physical vs. Wireless LAN
WLAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE WLAN architecture Basic routing example IAPP.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
802.11b Frame Details Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Ch. 2 – and NICs Part 2 – MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif.
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
Wireless Encryption: WEP and cracking it. Eric Shea.
Doc.:IEEE /0129r3 May 2012 Santosh Abraham, Qualcomm Inc. Short Beacon Slide 1 Authors:
Wireless LANs Prof. F. Tobagi MAC Management 1.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Natalie Podrazik – CS 491V – “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Natalie Podrazik April.
SkyJacker Theft from Above Imagine RIT Service Set Identifier (SSID) o human readable “network name” Devices store past SSID connections Wireless.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Doc.:IEEE /1503r1 November 2011 Short Beacon Slide 1 Authors:
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
Exploits Data Communications Benjamin W. Siegel VCU Information Systems.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Doc.:IEEE /0129r1 January 2012 S.Abraham, Qualcomm Inc Short Beacon Slide 1 Authors:
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Module 48 (Wireless Hacking)
Rogue Access Points attacks
OSA vs WEP WPA and WPA II Tools for hacking
Wireless II.
Examine Wireless Frames Lab
Wireless Mesh Networks
Bab 4 Politeknik Telkom 2008.
BSS Scanning through Low Power Radio
Basic processes in IEEE networks Configuration parameters
Month Year doc.: IEEE yy/xxxxr0
‘Additional’ Site Report mechanism
Directed Probe Request Clarification
Fast Active Scan Proposals
Month Year doc.: IEEE yy/xxxxr0
Request for Legacy IE ID for RSN Extension
Presentation transcript:

Wireless II

Frames

Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate  Authentication  Auth  Deauth ▫Control  RTS  2 way handshake  CTS  Time to send  ACK ▫Data

Frames – Questions What are the 3 types of WiFi frames ▫Management ▫Control ▫Data What are the 4 management frames ▫Beacon * ▫Probe * ▫Association ▫Auth

Beacon Frames and Injection

Beacon Frames and Injection – Notes Beacon: announces presence wireless device Beacon types ▫Ad-hoc ▫Ssid  32 character identifier ▫Timestamp ▫Capability  Channel  Data Rate MDK3

Beacon Frames and Injection – Questions ▫What is the name of the 32 bit string identifier  SSID ▫What is the typical default broadcast interval for the SSID?  10 sec

Frame Analyzing

Frame Analyzing – Notes ID ▫SSID  32 character text ▫BSSID  6 hex octets  Typically the MAC address ▫ESSID  All the BSSs in the network  Basically the SSID Wireshark Aircrack ▫Airbase-ng MDK3

Frame Analyzing – Questions Which xSSID is by default the MAC address ▫BSSID How many octets is the BSSID ▫6

Probe Requests and Responses

Probe Requests and Responses – Notes Probes: active Beacons: passive Probe ▫Client ▫Request ▫Respond Info ▫Data rates ▫Ssid ▫Timestamp ▫Type of security Who can you probe ▫A specific AP ▫All

Probe Requests and Responses – Questions Which frame type is active vs. passive ▫Probe What is sent as a probe response ▫SSID ▫Data rates ▫Timestamp ▫Type of security