Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
Wireless technology hit the American market more than 60 years ago during World War I and World War II Today its the IEEE standard, also known.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
& WEP Tzachy Reinman System and Network Security Course
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
WLAN What is WLAN? Physical vs. Wireless LAN
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Ch. 5 – Access Points. Overview Access Point Connection.
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
By Vamseedhar Vuppu The Secrets of Wireless Hacking.
A History of WEP The Ups and Downs of Wireless Security.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Chapter 8 Wireless Hacking Last modified
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Encryption: WEP and cracking it. Eric Shea.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Chapter 8 Wireless Hacking Last modified
Setting Wireless Network At Home By: Parveen Sharma.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Wireless Hacking War Driving W. Wireless Footprinting Links
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wired Equivalent Privacy. INTRODUCTION Wired Equivalent Privacy (WEP) is a security algorithm for IEEE wireless networks. Introduced as part of.
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
TERMINOLOGY Define: WPAN
Wireless Security By: Bryan M Keller.
Wireless Protocols WEP, WPA & WPA2.
Securing A Wireless Network
Wireless Network Security
Wireless Hacking.
Wireless Security Ian Bodley.
Wireless Networking Chapter 23.
Hacking Wireless Networks
802.11b Wireless Network Security
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Stephan Bayer September 9, 2004 INLS 187

What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points while in motion. Access Point (AP) Identification Software

Its Purpose Allows you to map out vulnerable APs for future use or pinpoint them for hardening

Not a “Sniffer” or WEP Cracker Originally released as a tool that analyzed the header and IV fields of packet to determine – SSID – MAC address – WEP Usage – WEP Key length (40 or 128 bit) – Signal range – Access point vendor

Acronyms of things this software looks for SSID (Service Set Identifier) MAC (Media Access Control) IV (Initialization Vector) WEP (Wired Equivalent Privacy) The IV of a WEPpacket is included after the header and is used in combination with the shared secret key to cipher the packet’s data

War Driving Set-Up

GPS Netstumbler will detect relative position of APs with GPS Records GPS coordinate for the highest signal strength found for each access point Can be used to create maps Publish your maps to the web!

How it works Probe Request sent to broadcast destination address Response from APs contain network configuration information SSID WEP status etc

Instructions Download and install NetstumblerNetstumbler Set SSID or Network Name to ANY Start Netstumbler and click on the green arrow on the toolbar

Filters WEP usage IBSS or BSS type network IBSS – group of systems without AP – Not good to use as a bridge to internal LAN

Weaknesses Relies on one form of wireless network detection – Broadcast Probe Request Wireless vendors offer an option to disable the feature on APs

Conclusion AP identification software – Can actually be used to set up your home network Used for War Driving Not illegal, but ethics are questioned Sources: Hacking Exposed, Google Image Search