Protecting wireless networks aka wireless hacking

652 views
564 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
652
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
43
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Protecting wireless networks aka wireless hacking

  1. 1. Protecting Wireless Networks aka Hacking Wireless Saptha Wanniarachchi MBCS,MCSE,MCITP Twitter @saptha saptha.com
  2. 2. Wired Vs Wireless Hacking r i m e i s a l l a r o u n d u s .C In theory, wireless LANs are less secure than wired LANs, because wireless communication signals travel through the air and can easily be intercepted.
  3. 3. Types Of Wireless Networks
  4. 4. Unfortunately, turning off the broadcast of the SSID may lead to a false sense of security. The method discourages only casual wireless snooping, but does not stop a person trying to attack the network. Scanning for Access Points • Access points periodically transmit beacon frames (SSID, data rate, etc.) • Client scans frequencies and picks an access point based on SSID, signal strength, ... • Client switches to assigned channel and establishes an association
  5. 5. How dose the war diving looks
  6. 6. WIFI Authentication
  7. 7. WEP
  8. 8. WPA
  9. 9. WPA 1. Pre-Shared Key 2. Enterprise
  10. 10. Summary of authentication Open Network WEP WPA
  11. 11. How to Attack Scan -> Test Injection Capability Use sniffing tools and collect IV’s Try Fake authentication and MAC spoofing When you have enough IV’s use cracking tool to extract password Or try MIM Attack and inject packets
  12. 12. Source: Consumer Reports MisconfigurationMisconfiguration possibilitiespossibilities •• no encryption usedno encryption used •• weak (guessable) passwordweak (guessable) password used to generate keyused to generate key •• weak protection of encryptionweak protection of encryption key on client machinekey on client machine •• weak protection ofweak protection of management interface formanagement interface for access pointaccess point
  13. 13. Tools
  14. 14. Tools
  15. 15. Tools
  16. 16. Tools
  17. 17. Tools
  18. 18. Tools
  19. 19. Tools
  20. 20. Tools
  21. 21. Recommendations: WLAN Security • WEP (fair) • enable wireless frame encryption • use longest key • change the WEP key regularly (manually) • 802.1X and WPA (user authentication + dynamic keys) (better) • use as soon as practical and stable • set rekeying to occur every few hours • 802.11i (best) • upgrade / use when available and supported
  22. 22. Q&A

×