Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.

Similar presentations


Presentation on theme: "Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP."— Presentation transcript:

1 Wireless Network Hacking

2  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP key  WEP: RC4 64-bit or 128-bit  40-bit or 104-bit with 24-bit IV  Open to FMS (Fluhrer, Marntin, Shamir) attack  WPA: TKIP for encryption  WPA2: AES for encryption

3  Per packet key  mixing  rekeying mechanism  message integrity check (MIC)  IV increased to 48 bits  Over 500 Trillion keystreams possible  IV are hashed

4  Wardriving, Warwalking, Warflying, etc.  Aircrack: Windows and Linux  WEPCrack: Linux  AirSnort: Linux  NetStumbler: Windows  Includes GPS to map WAPs  Kismet: Linux

5  http://www.youtube.com/watch?v=jETwvEDaJeQ http://www.youtube.com/watch?v=jETwvEDaJeQ  http://www.youtube.com/watch?v=6RIUOoMdkv8 http://www.youtube.com/watch?v=6RIUOoMdkv8  http://www.youtube.com/watch?v=BaDUw8WZx5A http://www.youtube.com/watch?v=BaDUw8WZx5A

6  Used to bypass MAC filtering on WAP  Tools  SMAC

7  Rogue WAP  Evil Twin / AP Masquerading  Tools to generate fake WAPs  Fakeap  Netstumbler  MiniStumbler

8  Eavesdropping / Sniffing  DoS  AP Masquerading / Spoofing  MAC Spoofing  Planting Rogue Aps  http://news.yahoo.com/blogs/upgrade-your- life/banking-online-not-hacked-182159934.html http://news.yahoo.com/blogs/upgrade-your- life/banking-online-not-hacked-182159934.html

9  Change default settings  Use WEP / WPA encryption  Enable firewall settings  Reduce WLAN transmitter power  Disable remote administration

10  http://www.youtube.com/watch?v=u- dqi23oaS8 http://www.youtube.com/watch?v=u- dqi23oaS8


Download ppt "Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP."

Similar presentations


Ads by Google