Wireless & password security Mark Theeuwes. 2 Wireless basics.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Authentication and Constructing Strong Passwords.
Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Exploring Wireless Networking.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless Communications WLAN Miguel Durand Dap02s.
Tom Parker Project Manager Identity Management Team IT Security Group.
Chapter 3 Passwords Principals Authenticate to systems.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Internet Security In the 21st Century Presented by Daniel Mills.
Text passwords Hazim Almuhimedi. Agenda How good are the passwords people are choosing? Human issues The Memorability and Security of Passwords Human.
Password Management PA Turnpike Commission
What Password Cracking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer.
CIS 450 – Network Security Chapter 8 – Password Security.
Sybex CCNA Chapter 12: Wireless Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Chapter 8 Wireless Hacking Last modified
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 3 Networking Media.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Chapter 8 Wireless Hacking Last modified
Birmingham News Sunday October 28, 2012  password1.
What do you know about password? By Guang Ling Oct. 8 th,
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Distributed Computing Projects. Find cures for diseases like Alzheimer's and Parkinson's by analyzing the ways proteins develop (protein.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
 The purpose of wireless networks is to provide wireless access to the fixed network (PSTN)
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
A wireless gateway is a computer networking device that routes packets from a wireless LAN to another network, typically a wired WAN. It is a device that.
Sybex CCENT Wireless Technologies Instructor & Todd Lammle.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
1. password (Unchanged) (Down 6) (Unchanged)14. sunshine (Up 1) (Unchanged)15. master (Down 1) 4. abc123 (Up.
Strong Passwords Get back, you hacker!. Wimpy Passwords Pet names Nicknames Things people can guess Dictionary Personal info.
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Secure Networks It’s not just for your office Dial-In Number: Meeting Number:
OSA vs WEP WPA and WPA II Tools for hacking
Instructor Materials Chapter 6 Building a Home Network
Andreas Kurtz, Felix Freiling, Daniel Metz
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Password strength Dr. X.
Wireless Technologies
I have edited and added material.
Week 1 – Taster Session dmuhackers DMU Hackers.
Instructor & Todd Lammle
Wireless Hacking.
CS 465 PasswordS Last Updated: Nov 7, 2017.
Security.
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Protecting IT systems (2)
Electromagnetic Spectrum
Security.
Exercise: Hashing, Password security, And File Integrity
Security Issues with Wireless Protocols
Elijah Hursey & Austin Keener Academy of Science Summer Bridge 2013
Wireless Network Attacks: Tools, Attack Vectors, and Solutions.
Network Penetration Testing & Defense
Presentation transcript:

Wireless & password security Mark Theeuwes

2 Wireless basics

3 l Radio waves

4 Wireless basics l Channels 2,4 GHz ( B/G/N)

5 Wireless basics l Channels 5GHz ( A/N)

6 Wireless basics l Reflection l Absorbtion l Refraction l Scattering

7 Wireless basics l Omnidirectional antenna

8 Wireless basics l Other Antenna’s

9 Wireless basics l WLAN Cell

10 Wireless basics l Range

11 Wireless basics l Roaming

12 Wireless basics l Roaming

13 Wireless basics l Cells

14 Wireless basics l Honey cone

15 Wireless basics l Building

16 Wireless basics l Autonomous Accespoint

17 CiscoWireless l LWAP

18 Cisco Wireless

19 Wireless

20 Wireless basics l Association

21 Wireless basics l Security options

22 Wireless attacks

23 Wireless attacks

24 WEP cracking

25 WPA2 cracking

26 Passwords

27 Strong passwords

28 Passwords password 2Mypassword 2MyPa$$w0rd! 1Ef$aŎX9s2!#

29 Password policy considerations l What is too simple ? l Password age ? l Password length ?

30 Passwords

31 Strong passwords

32 Myspace attack 2006 ( passwords)

33 Myspace attack 2006

34 Most common passwords (America) l password1, abc123, myspace1, password, blink182, qwerty1, fuckyou, 123abc, baseball1, football1, , soccer, monkey1, liverpool1, princess1, jordan23, slipknot1, superman1, iloveyou1, monkey

35 Password hashes

36 Password hashes

37 Password hacking

38 Password guessing l The word "password" l The same as the user name l Name of the user l Birthdays or birth places l Relatives l Pets l Favorite colors, foods, places, etc.

39 Dictionary attacks

40 Brute force

41 Rainbow tables l NTLM hashes

42 Password database Fontys Venlo (10 years ago)

43 Future ?

44 Security is a trade off

45 Questions

46