Download presentation
Presentation is loading. Please wait.
Published byEmory Dixon Modified over 9 years ago
1
1 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Computer Security
2
2 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in This presentation is intended to inform the audience about the dangers associated with a computer network devices and it is not a demonstration of any Hacking.
3
3 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Demos Wireless Security Web Security
4
4 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in INDEX Introduction A Step-by-Step process of Wireless Communications Prevent Your Network from Getting Hacked
5
5 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in INTRODUCTION
6
6 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Wireless Internet It is internet access without the use of wires. Instead it uses radio frequency bands to exchange information between your computer and the Internet within a range.
7
7 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Types of Wireless Security
8
8 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Types of Security OPEN : No security configured –Obviously not advised –Data is in the air in plain text and anyone can read it WEP : Wired Equivalent privacy –Very week and not recommended – Used in Open and Shared-Key Authentication
9
9 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Types of Security… WPA: Wi-Fi Protected Access –Much better than WEP –Pre shared Key concept used – Encryption Algorithm used TKIP –Easy to setup, as easy as WEP –Available in all the common wi-fi routers –A must for all home users –Will take a long time to break in
10
10 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Types of Security… WPA2: Advance Wi-Fi Protected Access –Better than WPA – Used AES as Encryption System –Takes little more pain to setup –Advised in corporate environments –Strong encryption and authentication support
11
11 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Wireless Security Standards
12
12 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Description of WEP Protocol WEP relies on a shared secret key (40 bit/128 bit) which is shared between the sender (client) and the receiver (Access Point). Secret Key - to encrypt packets before they are transmitted Integrity Check - to ensure packets are not modified in transit. The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points. 12
13
13 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in How to configure WPA Open the configuration of your wi-fi device Go to wireless setting Under security option, select any one –WPA –WPA-PSK –WPA-Personal –WPA2-Personal Set a complex password Change the login password of the wireless router. Done
14
14 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Look for this
15
15 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in A Step-by-Step process of Wireless Communication
16
16 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in A little info… For Connecting with a AP user render data segment called Beacon frames. After connected with AP the data segment is called Packet.
17
17 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in More info… Depending on how long the computer is connected, it can generate a certain number of packets per day. The more users that are connected to one access point, the more packets are generated.
18
18 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in First… You must locate the wireless signal This can be done by using your default Windows tool “View Available Wireless Network”
19
19 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Second… Once you located a wireless network you can connect to it unless it is using authentication or encryption. If it is using authentication or encryption then for the next step a Cracking tool can be use for WEP keys.
20
20 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Once enough packets recovered it will then captured information gathered from the packets and crack the key giving you access. Third….
21
21 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Prevent Your Network from Getting Hacked
22
22 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Prevent Your Network from Getting Hacked Don’t broadcast your SSID. This is usually done during the setup of your wireless router. Change the default router login to something else. If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. Always check for updates to your router. Turn off your router or access point when not using it.
23
23 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Security Advised Change the router login password frequently –At least once a month Change the wireless WPA password also –At least once a month Avoid temptation to connect to open wireless just looking for free internet.
24
24 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Security Advised.. We can configure DHCP more tightly. –Lets not keep an open pool where any one can connect –Example – I have 3 machines in my home (desktop/laptop/phone) – I’ll create a IP pool of 3 IPs only – I’ll do DHCP reservation using the MAC of these 3 IP – Effectively I’m not allowing any outsider machine to connect
25
25 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Security Advised.. We can configure MAC binding. –Allow only MY machines to connect –Many access points support MAC binding –Any other machine will not be able to connect to my Wi-Fi
26
26 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Web Security
27
27 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Methods Man-in-the-Middle Attacks Stealing Passwords Trojan Horses Exploiting Defaults Wireless Attacks
28
28 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Man-in-the-middle(MITM) Attack MAC(Media Access Control) duplication ARP (Address Resolution Protocol) poisoning Router table poisoning Fake routing tables
29
29 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Conclusion There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.
30
30 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.in Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.