Download presentation
Presentation is loading. Please wait.
Published byTheodora Sutton Modified over 9 years ago
1
By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking
2
Agenda 802.11 Wireless Standard Encryption Schemes Wardriving Tools used for wardriving Attacking 802.11networks Tools used Defenses Conclusion
3
802.11 wireless standard IEEE 802.11is a set of standards for WLAN
4
Different 802.11 Standards
5
Encryption Schemes WEP(Wired Equivalent Privacy) - First scheme for securing 802.11 WAP AND WAP2(Wi-Fi Protected Access) - Standard schemes used today WAP-PSK (Pre-shared key) - Used in home and small office networks
6
Wardriving Tools Tools used in different platforms
7
NetStumbler Tool used in windows
8
Attacking 802.11 networks Note: Hacking other’s network without the permission of network owner is illegal [2]. Penetration Testing tools are used Powerful Tool is BackTrack2 -Linux live distribution for pen testing -Voted as #1 tool for pen testing[3] -more than 300 security tools
9
Backtrack2
10
Defenses Minimize signal exposure SSID (Network name) - Broadcasting SSID - Not broadcasting SSID Unique SSID
11
Conclusion I suggest everyone to implement WPA- PSK encryption with strong passphrases and unique SSID for their networks. In future we can expect a strong encryption scheme than WPA that will come into existence
12
References Gast, M. (2002). 802.11 Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates. Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing BackTrack (2007). Retrieved December 4, 2007, from http://www.remote- exploit.org/backtrack.html
13
Questions ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.