Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security Past, Present, and Future Chris Shutters, CISSP February 2004
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Security.
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
A History of WEP The Ups and Downs of Wireless Security.
Hands-On Ethical Hacking and Network Defense
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Wireless Security on the Philippine Setting. Introduction: WHOAMI What’s this all about?
Hacking Wireless Networks (Part II – WEP & WPA)
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Security Issues Raised by Wireless LANs Dr. John A. Copeland* Communications Systems Center Georgia Tech Electrical & Computer Engineering
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module 48 (Wireless Hacking)
OSA vs WEP WPA and WPA II Tools for hacking
Methods of Securing LANs
A Wireless LAN Security Protocol
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Wireless Network Hacking

 Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP key  WEP: RC4 64-bit or 128-bit  40-bit or 104-bit with 24-bit IV  Open to FMS (Fluhrer, Marntin, Shamir) attack  WPA: TKIP for encryption  WPA2: AES for encryption

 Per packet key  mixing  rekeying mechanism  message integrity check (MIC)  IV increased to 48 bits  Over 500 Trillion keystreams possible  IV are hashed

 Wardriving, Warwalking, Warflying, etc.  Aircrack: Windows and Linux  WEPCrack: Linux  AirSnort: Linux  NetStumbler: Windows  Includes GPS to map WAPs  Kismet: Linux

  

 Used to bypass MAC filtering on WAP  Tools  SMAC

 Rogue WAP  Evil Twin / AP Masquerading  Tools to generate fake WAPs  Fakeap  Netstumbler  MiniStumbler

 Eavesdropping / Sniffing  DoS  AP Masquerading / Spoofing  MAC Spoofing  Planting Rogue Aps  life/banking-online-not-hacked html life/banking-online-not-hacked html

 Change default settings  Use WEP / WPA encryption  Enable firewall settings  Reduce WLAN transmitter power  Disable remote administration

 dqi23oaS8 dqi23oaS8