Wireless Network Hacking
Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP key WEP: RC4 64-bit or 128-bit 40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack WPA: TKIP for encryption WPA2: AES for encryption
Per packet key mixing rekeying mechanism message integrity check (MIC) IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed
Wardriving, Warwalking, Warflying, etc. Aircrack: Windows and Linux WEPCrack: Linux AirSnort: Linux NetStumbler: Windows Includes GPS to map WAPs Kismet: Linux
Used to bypass MAC filtering on WAP Tools SMAC
Rogue WAP Evil Twin / AP Masquerading Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler
Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps life/banking-online-not-hacked html life/banking-online-not-hacked html
Change default settings Use WEP / WPA encryption Enable firewall settings Reduce WLAN transmitter power Disable remote administration
dqi23oaS8 dqi23oaS8