Download presentation
Presentation is loading. Please wait.
Published byShawn Phillips Modified over 9 years ago
1
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless Networks Philip Robbins – December 19, 2013
2
2 Hacking Wireless Networks Topics Understanding Wireless Technology & Standards Tools Hacking WEP, WPA, WPA2 Uncovering SSIDs Bypassing MAC Address Filtering De-Authentication & Mis-Association Review Q&A Quiz #4
3
3
4
4 Understanding Wireless Standards IEEE 802.11 – IEEE came up the 802.11 standard for wireless ethernet. – OSI Layers 1 & 2 – 79 channels, 2.4 to 2.4835 GHz (USA) – Half Duplex – CSMA/CA (Avoidance) v.s. CSMA/CD (Detection) – Modulation Techniques
5
5 Understanding Wireless Standards – Center Frequency & Channels for 2.4 GHz
6
6 Understanding Wireless Standards – 4 Way Handshake
7
7 Understanding Wireless Standards – 802.11 Standards
8
8
9
9 Tools Alfa AWUSO36H WiFi Network Adapter
10
10 Tools Alfa AWUSO36H WiFi Network Adapter
11
11 Tools Alfa AWUSO36H WiFi Network Adapter 30dBm = 1W
12
12 Tools Netgear Wireless Router
13
13 Tools Netgear Wireless Router TARGET AP
14
14 Tools Netgear Wireless Router TARGET 192.168.1.1
15
15 Tools / Configuration “password”
16
16 Tools / Configuration Forgot the password for your router? …or your neighbors?
17
17 Tools / Configuration “password” WEP CONFIGURATION
18
18 Tools / Configuration
19
19 Tools / Configuration Authentication?
20
20 Tools / Configuration WPA CONFIGURATION
21
21 Tools / Configuration
22
22 Tools / Configuration “password”
23
23 Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use. http://www.backtrack-linux.org/downloads/ 1 2 3 4…
24
24 Tools
25
25 Tools
26
26 Tools
27
27 Tools
28
28 Tools AirSnort replacement.
29
29 Understanding Wireless Technology Wi-Fi Protected Access (WPA) – Touted as a step up from WEP – Weak passphrases renders the protection inadequate – False sense of security – Network Sniffers – TKIP v.s. AES
30
30 Cracking WPA
31
31 Cracking WPA
32
32 Cracking WPA
33
33 r Cracking WPA
34
34 r Cracking WPA
35
35 Cracking WPA
36
36 r Cracking WPA
37
37 r Cracking WPA
38
38 Cracking WPA
39
39 r Cracking WPA
40
40 r Cracking WPA
41
41 Cracking WPA
42
42 Cracking WPA
43
43 Cracking WPA Can take a few hours to go through 1+ million keys…
44
44 Cracking WPA
45
45 Cracking WPA
46
46 Understanding Wireless Technology Wired Equivalent Privacy (WEP)
47
47 Understanding Wireless Technology Wired Equivalent Privacy (WEP) – Confidentiality – Access Control – Data Integrity – In reality, none of these are actually enforced!
48
48 Understanding Wireless Technology Wired Equivalent Privacy (WEP) Stream Cipher using XOR Keystream 64-bit Keyspace (2^64 keys) 128-bit Keyspace (2^128 keys) 40 bits24 bits
49
49 Understanding Wireless Technology Wired Equivalent Privacy (WEP)
50
50 Understanding Wireless Technology Wired Equivalent Privacy (WEP)
51
51 Understanding Wireless Technology Wired Equivalent Privacy
52
52 Cracking WEP
53
53 Cracking WEP
54
54 Cracking WEP
55
55 Cracking WEP
56
56 Cracking WEP
57
57 Cracking WEP
58
58 Cracking WEP 1 2 3
59
59 Bypassing MAC filtering
60
60 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a.802.11 b.802.11a c.802.11b d.802.11X
61
61 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a.802.11 b.802.11a c.802.11b d.802.11X
62
62 Review Questions Question #2 Which IEEE standard defines wireless technology? a.802.3 b.802.5 c.802.11 d.All 802 standards
63
63 Review Questions Question #2 Which IEEE standard defines wireless technology? a.802.3 b.802.5 c.802.11 d.All 802 standards
64
64 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA
65
65 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA
66
66 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength
67
67 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength
68
68 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory
69
69 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory
70
70 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a.802.11a b.802.11b c.802.11i d.802.11
71
71 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a.802.11a b.802.11b c.802.11i d.802.11
72
72 Review Questions Question #7 What protocol was added to 802.11i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS
73
73 Review Questions Question #7 What protocol was added to 802.11i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS
74
74 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE
75
75 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE
76
76 Review Questions Question #9 The operating frequency range of 802.11a is 2.4 GHZ. True or False? a.TRUE b.FALSE
77
77 Review Questions Question #9 The operating frequency range of 802.11a is 2.4 GHZ. True or False? a.TRUE b.FALSE
78
78 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)
79
79 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)
80
80 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA
81
81 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA
82
82 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)
83
83 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)
84
84 Questions? philiprobbins@email.phoenix.edu www2.hawaii.edu/~probbins https://www.dorkatron.com/docs/CMGT441/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.