Download presentation
Presentation is loading. Please wait.
Published byEllen Boyd Modified over 9 years ago
1
W IRELESS S ECURITY Chapter 8
4
History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association
5
US Frequency Bands BandFrequency range UHF ISM 902-928 MHz S-Band 2-4 GHz S-Band ISM 2.4-2.5 GHz (The higher than cell phones - frequency allows the signal to carry more data.). C-Band 4-8 GHz C-Band satellite downlink3.7-4.2 GHz C-Band Radar (weather)5.25-5.925 GHz C-Band ISM 5.725-5.875 GHz C-Band satellite uplink5.925-6.425 GHz X-Band8-12 GHz X-Band Radar (police/weather)8.5-10.55 GHz
6
What do the waves look like? Wave Video
7
Wireless Local Area Network (WLAN) Connecting two or more systems using wireless 802.11 Standards WiFi uses radio waves Wireless cards are cheap Irda (direct line of sight – not as many security problems) 150 Feet
8
Access Point/Hot Spots An AP (access point also known as a AP) is the wireless server that connects clients to the internal network. AP’s typically act as a bridge for the clients. Wifi Wififreespot.com wi-fiplanet.com Boing.com Gogoair.com
9
Antennas Antennas come in all shapes and styles: – Omni-directional: Vertical Whip Ceiling mount – Directional: Yagi (“Pringles can”) Wall mounted panel Parabolic dish
10
HotSpots – Are they Safe?
11
Piggybacking on someone’s else Wireless Internet Google the name: David M. Kauchak
12
Bluetooth
13
proprietary open wireless technology standard for exchanging data over short distances (using short- wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices. WiFi – replaces cables for your network vs. Bluetooth – replaces cables for your devices 300 Feet
14
Bluetooth
15
Bluetooth Attacks Bluejacking -sends a message to a phone that you don’t know. Usually harmless. Bluesnarking – is unauthorized access of information & often times retrieves information. Blue bugging – similar to bluesnarking but leaves a backdoor and then the “hacker” can come and use the phone. Page 376-377
16
How to Secure Your Bluetooth Always Turn off your Bluetooth. Make Your Phone Visibility to Hidden. Set up a code when pairing devices Set your “Auto Connection without Confirmation” to No in all paired Devices.
17
802.11 Security Tools http://sectools.org/tag/wireless/ Airsnort - http://freshmeat.net/projects/airsnort/ http://freshmeat.net/projects/airsnort/ Wepcrack - http://sourceforge.net/projects/wepcrack http://sourceforge.net/projects/wepcrack Netstumbler - http://www.netstumbler.com/http://www.netstumbler.com/ Kismet - http://www.kismetwireless.net/http://www.kismetwireless.net/
18
Group 3: Investigate 4G – how it works & who offers it now in the US? What problems does it still have? Is it worldwide yet? What is Long Term Evolution (LTE) Sidenote: explain this article http://money.cnn.com/2012/03/3 0/technology/internet- cable/index.htm http://money.cnn.com/2012/03/3 0/technology/internet- cable/index.htm Use: http://www.voki.com/ to create a characters to answer these questions.http://www.voki.com/ Group 1: War Driving Insertion Attacks Over the Shoulder Evil Twin Attack Sniffer programs If you have a non iphone you can try this: http://www.wikihow.com/Bluejackhttp://www.wikihow.com/Bluejack Group 4: How to Secure Your Wirelesss Router What is the difference between WEP & WAP Encryption – which should you use? Use your acting skills to demonstrate and tell us about this. Group 2: WLAN Wireless Mesh Network WWAN MAN Advances in bluetooth http://www.economist.com/blogs/ babbage/2012/07/footwear-blind http://www.economist.com/blogs/ babbage/2012/07/footwear-blind http://www.engadget.com/2012/0 8/31/hi-funs-hi-call-bluetooth- gloves-hands-in-video/ http://www.engadget.com/2012/0 8/31/hi-funs-hi-call-bluetooth- gloves-hands-in-video/ Group 1 & 2 – Pictures ONLY
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.