SkyJacker Theft from Above Imagine RIT 2014. Service Set Identifier (SSID) o human readable “network name” Devices store past SSID connections Wireless.

Slides:



Advertisements
Similar presentations
CBIP Mobile App How Can I get it on to my clients mobile devices?
Advertisements

Client Server. Server Client Model Servers- Wait for requests from clients - Sends requested data to client - May have to communicate with other servers.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Introduction to Network Analysis and Sniffer Pro
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Leica DISTO™ D810 touch supported devices. Leica DISTO™ D810 touch - supported iOS devices Leica DISTO™ D810 touch Leica DISTO™ sketch.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE MSAP Functional Specifications Presenter Name: Patrick Nicholson.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Katrina Tewksbury MIS 304 October 11,  What is Eye-Fi?  How does it work?  Who can use it?  How much does it cost?  Are there similar products?
Wireless Network Security Dr. John P. Abraham Professor UTPA.
WIRELESS DISPLAY OVER BLUETOOTH USING PI AND ANDROID PHONE Group Members: Shweta Ware, David Etim Network Embedded Systems.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Julien Freudiger, PARC (A Xerox Company)
What’s New in Fireware v11.9.5
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Improved Access Point Selection MobiSys2006. Outline INTRODUCTION FIELD STUDY VIRGIL EVALUATION CONCLUSION.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Support.ebsco.com The EBSCOhost iPhone Application Tutorial.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Networking Components
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
Exploits Data Communications Benjamin W. Siegel VCU Information Systems.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Module 48 (Wireless Hacking)
Cabling System & Wireless LAN
Fast MAC Layer Handoff in Networks
Wireless II.
Tutorial Using the App help.ebsco.com.
Security Issues.
CWNA-107 Practice Test
AirPrint Setup How to set up airprint on hp printer.
Webex Classes in Mobile
Bab 4 Politeknik Telkom 2008.
 Printer not found  Unable to find the printer  No devices found  Your printer could not be found on your wireless network.
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Raleigh issa – back to basics wi-fi pineapple
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Operating Systems Security
Tutorial Using the App help.ebsco.com.
SurfCFCC Secure Wireless Access For Students, Faculty, and Staff.
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
Хэвлэлийн бага хурал Өмнөговь аймгийн Нийгэм, эдийн засгийн байдал
What’s New In WatchGuard Wi-Fi Cloud v8.6
On ESS Mesh Device Discovery
Presentation transcript:

SkyJacker Theft from Above Imagine RIT 2014

Service Set Identifier (SSID) o human readable “network name” Devices store past SSID connections Wireless Basics

Steps for connection o Probing o Authentication o Association Probing o active o passive Wireless Basics

Wireless Basics (Probing) Active Directed Probe o client sends a named-specific SSID  AP with that SSID replies with probe response

Wireless Basics (Probing) Active Broadcast Probe o client sends a null SSID  all APs send probe response

More About Probe Requests Sent by devices seeking connection Devices will automatically connect to previously associated access points Requests are NOT secret

Mobile Devices Probe Requests iPad o probes for last three associated APs iPhone o probe based on movement Android o probe based on movement

Why Should I Care? Unique SSID given in probe request o use to determine physical location Rogue Access Point with same SSID o device will automatically connect o redirection of traffic/traffic injection

Enter SkyJacker Capture and display probe requests Imitate access point o create rogue AP o redirection of traffic