Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking.

Similar presentations


Presentation on theme: "By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking."— Presentation transcript:

1 By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking

2 Agenda 802.11 Wireless Standard Encryption Schemes Wardriving Tools used for wardriving Attacking 802.11networks Tools used Defenses Conclusion

3 802.11 wireless standard IEEE 802.11is a set of standards for WLAN

4 Different 802.11 Standards

5 Encryption Schemes WEP(Wired Equivalent Privacy) - First scheme for securing 802.11 WAP AND WAP2(Wi-Fi Protected Access) - Standard schemes used today WAP-PSK (Pre-shared key) - Used in home and small office networks

6 Wardriving Tools Tools used in different platforms

7 NetStumbler Tool used in windows

8 Attacking 802.11 networks Note: Hacking other’s network without the permission of network owner is illegal [2]. Penetration Testing tools are used Powerful Tool is BackTrack2 -Linux live distribution for pen testing -Voted as #1 tool for pen testing[3] -more than 300 security tools

9 Backtrack2

10 Defenses Minimize signal exposure SSID (Network name) - Broadcasting SSID - Not broadcasting SSID Unique SSID

11 Conclusion I suggest everyone to implement WPA- PSK encryption with strong passphrases and unique SSID for their networks. In future we can expect a strong encryption scheme than WPA that will come into existence

12 References Gast, M. (2002). 802.11 Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates. Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing BackTrack (2007). Retrieved December 4, 2007, from http://www.remote- exploit.org/backtrack.html

13 Questions ?


Download ppt "By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking."

Similar presentations


Ads by Google