This document provides a 3-step process for hacking wireless internet connections and discusses ways to prevent a network from being hacked. It begins by explaining wireless internet and encryption methods like WEP, WPA, and WPA2. The 3 steps are: 1) Locate wireless signals using tools like NetStumbler or Kismet, 2) Connect or use AirSnort to crack WEP keys by gathering packets over time, 3) AirSnort or other tools will then crack the key. It concludes by advising changing defaults, using strong encryption like WPA2, and turning off routers when not in use to help prevent hacking.
1. How to Hack Wireless InternetHow to Hack Wireless Internet
Connections in 3 Easy StepsConnections in 3 Easy Steps
PresentedPresented
ByBy
ANAND KUMAR MISHRAANAND KUMAR MISHRA
2. How to Hack Wireless InternetHow to Hack Wireless Internet
ConnectionsConnections
This presentation is intended to inform theThis presentation is intended to inform the
audience about methods used to “hack”audience about methods used to “hack”
wireless internet connections, not for anywireless internet connections, not for any
malicious use but strictly for educationalmalicious use but strictly for educational
purposes and personal intentions such aspurposes and personal intentions such as
recovering a misplaced network key forrecovering a misplaced network key for
the users own wireless connection.the users own wireless connection.
3. Wireless InternetWireless Internet
The term “wireless internet” is perfectlyThe term “wireless internet” is perfectly
self-explanatory. It is internet accessself-explanatory. It is internet access
without the use of wires. Instead it useswithout the use of wires. Instead it uses
radio frequency bands to exchangeradio frequency bands to exchange
information between your computer andinformation between your computer and
the Internet.the Internet.
Wireless access allows users toWireless access allows users to connectconnect
to the internet from any location withinto the internet from any location within
range of a wireless access point.range of a wireless access point.
4. Wireless Internet EquipmentWireless Internet Equipment
For home use, the basic equipment is:For home use, the basic equipment is:
Wireless NIC cardWireless NIC card
Wireless router or access pointWireless router or access point
Internet accessInternet access
5. AdvantagesAdvantages
No wiresNo wires
MobilityMobility
Faster speedsFaster speeds
Widely available equipmentWidely available equipment
ConvenienceConvenience
Inexpensive to set-upInexpensive to set-up
6. DisadvantagesDisadvantages
Limited rangeLimited range
Interference with other wireless accessInterference with other wireless access
pointspoints
Encryption can be broken even at itsEncryption can be broken even at its
strongeststrongest
7. Hacking Wireless InternetHacking Wireless Internet
Wireless networks are very common. It isWireless networks are very common. It is
also very common to find wirelessalso very common to find wireless
networks that are unsecured. Maybe thenetworks that are unsecured. Maybe the
users are lazy or maybe they are notusers are lazy or maybe they are not
savvy when it comes wireless networks.savvy when it comes wireless networks.
Whatever the reason, hackers have foundWhatever the reason, hackers have found
wireless networks relatively easy to breakwireless networks relatively easy to break
into, and even use wireless technology tointo, and even use wireless technology to
crack into non-wireless networks.crack into non-wireless networks.
8. Wireless EncryptionWireless Encryption
The main source of vulnerabilityThe main source of vulnerability
associated with wireless networks are theassociated with wireless networks are the
methods of encryption. There are a fewmethods of encryption. There are a few
different type of wireless encryptiondifferent type of wireless encryption
including:including:
9. WEPWEP
Stands for Wired Equivalent Privacy.Stands for Wired Equivalent Privacy.
Breakable even when configured correctlyBreakable even when configured correctly
Can be broken in as little as 3 minutesCan be broken in as little as 3 minutes
10. WPA or WPA2WPA or WPA2
Stands for Wi-Fi Protected AccessStands for Wi-Fi Protected Access
Created to provide stronger securityCreated to provide stronger security
Still able to be cracked if a short password isStill able to be cracked if a short password is
used.used.
If a long passphrase or password is used, theseIf a long passphrase or password is used, these
protocol are virtually uncrackable.protocol are virtually uncrackable.
Even with good passwords or phrases, unlessEven with good passwords or phrases, unless
you really know what your doing, wirelessyou really know what your doing, wireless
networks can be hacked and here’s how…….networks can be hacked and here’s how…….
11. A little info…A little info…
When a user uses wireless internet theyWhen a user uses wireless internet they
generate what are called data “packets”.generate what are called data “packets”.
Packets are transmitted between thePackets are transmitted between the
wireless NIC card and the wireless accesswireless NIC card and the wireless access
point via radio waves whenever thepoint via radio waves whenever the
computer is connected with the accesscomputer is connected with the access
point.point.
12. More info…More info…
Depending on how long the computer isDepending on how long the computer is
connected, it can generate a certainconnected, it can generate a certain
number of packets per day.number of packets per day.
The more users that are connected to oneThe more users that are connected to one
access point, the more packets areaccess point, the more packets are
generated.generated.
13. First…First…
You must locate the wireless signalYou must locate the wireless signal
This can be done by using your defaultThis can be done by using your default
Windows tool “View Available WirelessWindows tool “View Available Wireless
Network”Network”
More useful tools include NetStumbler andMore useful tools include NetStumbler and
Kismet. Kismet has an advantage over theKismet. Kismet has an advantage over the
other because it can pick up wirelessother because it can pick up wireless
signals that are not broadcasting theirsignals that are not broadcasting their
SSID.SSID.
14. Second…Second…
Once you located a wireless network youOnce you located a wireless network you
can connect to it unless it is usingcan connect to it unless it is using
authentication or encryption.authentication or encryption.
If it is using authentication or encryptionIf it is using authentication or encryption
then the next step would be to usethen the next step would be to use
AirSnort, a tool for sniffing out andAirSnort, a tool for sniffing out and
cracking WEP keys.cracking WEP keys.
15. AirSnortAirSnort
AirSnort must gather about 5 to 10 millionAirSnort must gather about 5 to 10 million
packets before it can even begin to crackpackets before it can even begin to crack
a wireless key.a wireless key.
This could take anywhere between a fewThis could take anywhere between a few
minutes to a few weeks depending on howminutes to a few weeks depending on how
many packets are being generated. If amany packets are being generated. If a
small number of people are using thesmall number of people are using the
network then it will most likely take weeks.network then it will most likely take weeks.
16. Third…Third…
Once AirSnort has recovered enoughOnce AirSnort has recovered enough
packets it will then go to work on readingpackets it will then go to work on reading
the captured information gathered fromthe captured information gathered from
the packets and crack the key giving youthe packets and crack the key giving you
access.access.
Other tools such as CowPatty can useOther tools such as CowPatty can use
dictionary files to crack hard WPA keys.dictionary files to crack hard WPA keys.
17. Prevent Your Network from GettingPrevent Your Network from Getting
HackedHacked
Don’t broadcast your SSID . This is usuallyDon’t broadcast your SSID . This is usually
done during the setup of your wireless router.done during the setup of your wireless router.
Change the default router login to somethingChange the default router login to something
else.else.
If your equipment supports it, use WPA or WPAIf your equipment supports it, use WPA or WPA
2 because it offers better encryption which is still2 because it offers better encryption which is still
able to be broken but much harder.able to be broken but much harder.
Always check for updates to your router.Always check for updates to your router.
Turn off your router or access point when notTurn off your router or access point when not
using it.using it.
18. Prevent Your Network from GettingPrevent Your Network from Getting
HackedHacked
There is no such thing as 100% percentThere is no such thing as 100% percent
security when using wireless networks butsecurity when using wireless networks but
at least with these few simple steps youat least with these few simple steps you
can make it harder for the average personcan make it harder for the average person
to break into your network.to break into your network.