Download presentation
Presentation is loading. Please wait.
Published byBrent Fisher Modified over 9 years ago
1
Wireless Network Hacking
2
Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP key WEP: RC4 64-bit or 128-bit 40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack WPA: TKIP for encryption WPA2: AES for encryption
3
Per packet key mixing rekeying mechanism message integrity check (MIC) IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed
4
Wardriving, Warwalking, Warflying, etc. Aircrack: Windows and Linux WEPCrack: Linux AirSnort: Linux NetStumbler: Windows Includes GPS to map WAPs Kismet: Linux
5
http://www.youtube.com/watch?v=jETwvEDaJeQ http://www.youtube.com/watch?v=jETwvEDaJeQ http://www.youtube.com/watch?v=6RIUOoMdkv8 http://www.youtube.com/watch?v=6RIUOoMdkv8 http://www.youtube.com/watch?v=BaDUw8WZx5A http://www.youtube.com/watch?v=BaDUw8WZx5A
6
Used to bypass MAC filtering on WAP Tools SMAC
7
Rogue WAP Evil Twin / AP Masquerading Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler
8
Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps http://news.yahoo.com/blogs/upgrade-your- life/banking-online-not-hacked-182159934.html http://news.yahoo.com/blogs/upgrade-your- life/banking-online-not-hacked-182159934.html
9
Change default settings Use WEP / WPA encryption Enable firewall settings Reduce WLAN transmitter power Disable remote administration
10
http://www.youtube.com/watch?v=u- dqi23oaS8 http://www.youtube.com/watch?v=u- dqi23oaS8
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.