SlideShare a Scribd company logo
1 of 24
Assessing Wireless
Radio and Bluetooth
CNG 256 Vulnerability Assessment
Frank H. Vianzon, GPEN, GCWN, GISP, CompTIA A+, CompTIA Network+
Wi-Fi: Overview
 Standard is IEEE 802.11
 Exists in everything these days, from laptops to smartphones to IoT devices
Four Environments
Four environments built around the technology
1. Extensions to an existing wired network
2. Multiple Access Points
3. LAN-to-LAN wireless network
4. 3G or 4G hot spots
Wireless Standards
Wireless Vocabulary
Term Description
Association The process of connecting a client to an access point
BSSID – Basic
Service Set
Identification
The MAC address of an access point
SSID / ESSID –
Extended Service
Set Identification
The (broadcast) name of a network
Hot Spot A location that provides wireless access to the public
Access Point /
Wireless Access
Point (WAP)
A hardware or software construct that provides wireless access
Service Set Identifier (SSID)
 SSID is a continual broadcast by the access point
 SSID is embedded within the header of the packets
 SSID is the name of a network. Also called an ESSID
(Extended SSID)
 You can try to mask a ESSID
 BSSID’s identify access points and their clients
 Is the MAC address
 MUST be transmitted
BSSID
This identifier is called a basic
service set identifier (BSSID)
and is included in all wireless
packets.
Each Access Point has its Own
BSS
Wireless Antennas : Laptops
 On a standard laptop, the antenna is typically around the screen
 Can be extended via USB
 When extending, make sure to match cables and Ohms
Wireless Antenna : Yagi Antenna
 Unidirectional
 Site to site or directional
Wireless Antennas : Omnidirectional and
Parabolic Grid
 Omnidirectional – all directions
 Two dimensions but not three
 Sometimes magnetic for cars and war driving
Wireless Authentication Modes
 Open
 only requires a MAC address
 Shared Key
 All AP’s and clients use the same authentication key
 Hashing methods used to protect the key can be easily broken
 802.1X
 Authentication uses usernames and passwords, certificates or devices such as smart
cards. Requires one or both of these
 RADIUS server to centralize user accounts and authentication information
 A PKI for issuing certificates
Wireless Encryption
 WEP – Wireless Equivalent Privacy
 Oldest and weakest
 Initial solution
 WPA – Wi-Fi Protected Access
 Uses Temporal Key Integrity Protocol (TKIP)
 TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy
WLAN equipment to upgrade to TKIP without replacing hardware.
 Uses Message Integrity Code (MIC)
 WPA2
 Uses AES
 Requires hardware
WEP Encryption:
 Introduced with the 802.11b standard
 11MBs, 2.4 GHz, RC4
 Design Parameters
 Defeat Eavesdropping on communications
 Check integrity of data
 Use Shared Secret
 Problems with WEP
 Designed w/o input from the academic community or the public, professional
cryptologist were never consulted
 Passively uncover the key
Breaking WEP
 Need to intercept as many IV’s (Initialization Vectors) as possible
1. Start the wireless interface in monitor mode
2. Fake authentication with the access point
3. ARP requests can be intercepted and reinjected
4. Run password cracking tool
Comcast Split Wireless
Attack Surface
Attacks and Vulnerabilities
 Attacks in transit
 WEP
 WPA
 WPA2
 Attacks on endpoints
 Laptops
 WAP – Wireless Access Points
 Rouge access points
Access Points
Wireless access points transmits its SSID and BSSID
to anyone in range
Using monitor mode, we can see the BSSID and
then use a brute force utility to find the password
Access Points
Monitor Mode vs Managed Mode
Managed Mode is the mode you are mostly in to connect to
wireless networks
Monitor mode makes your wireless card passive. It is simply
listening in on every channel
Finding the MAC address
For Windows, you can use the inSSIDer tool
For Linux, you can use place the card in monitor mode and
use the airodump NG tool
Access Points
Testing Points
If you systems are using certificates or other PKI
authentication, try to join the network.
Egress Rules
Once you join, can you nmap the network?
User Laptops
 User laptops will continuously broadcast for saved networks
 We can attack the user MAC or answer the broadcast with a WiFi Pineapple
Bluetooth
 Bluetooth devices are prominent these days. Bluetooth is found on laptops and
mobile devices
 Operates on the 2.4 GHz range
 Four different versions
Bluetooth Modes
 Discoverable
 Allows the device to be scanned and located by other Bluetooth devices
 Limited Discoverable
 Mode is becoming more common. This put it into discovery mode for a short period of
time
 Non-discoverable
 As the name suggests, it cannot be located
 Pairing
 We have to pair devices in a peer to peer type connection
Bluetooth Threats
 What type of information do you exchange with Bluetooth?
 Calendars and Address Books
 Photos, cameras, microphones
 Attacker can inject microphone

More Related Content

What's hot

Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connectionsNitin kumar Gupta
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 

What's hot (20)

Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
Wifi security
Wifi securityWifi security
Wifi security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 

Similar to CNG 256 wireless wi-fi and bluetooth

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 

Similar to CNG 256 wireless wi-fi and bluetooth (20)

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 

More from Frank Victory

Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technologyFrank Victory
 
Kealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsKealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsFrank Victory
 
Automation and open source turning the tide on the attackers
Automation and open source   turning the tide on the attackersAutomation and open source   turning the tide on the attackers
Automation and open source turning the tide on the attackersFrank Victory
 
CNG 256 cloud computing
CNG 256 cloud computingCNG 256 cloud computing
CNG 256 cloud computingFrank Victory
 
Differential learning SnowFROC 2017
Differential learning SnowFROC 2017Differential learning SnowFROC 2017
Differential learning SnowFROC 2017Frank Victory
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Frank Victory
 
Active defensecombo clean
Active defensecombo cleanActive defensecombo clean
Active defensecombo cleanFrank Victory
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutionsFrank Victory
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policiesFrank Victory
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorizationFrank Victory
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacksFrank Victory
 

More from Frank Victory (12)

Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
 
Kealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsKealy OWASP interactive_artifacts
Kealy OWASP interactive_artifacts
 
Automation and open source turning the tide on the attackers
Automation and open source   turning the tide on the attackersAutomation and open source   turning the tide on the attackers
Automation and open source turning the tide on the attackers
 
CNG 256 cloud computing
CNG 256 cloud computingCNG 256 cloud computing
CNG 256 cloud computing
 
Differential learning SnowFROC 2017
Differential learning SnowFROC 2017Differential learning SnowFROC 2017
Differential learning SnowFROC 2017
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
 
Active defensecombo clean
Active defensecombo cleanActive defensecombo clean
Active defensecombo clean
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policies
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

CNG 256 wireless wi-fi and bluetooth

  • 1. Assessing Wireless Radio and Bluetooth CNG 256 Vulnerability Assessment Frank H. Vianzon, GPEN, GCWN, GISP, CompTIA A+, CompTIA Network+
  • 2. Wi-Fi: Overview  Standard is IEEE 802.11  Exists in everything these days, from laptops to smartphones to IoT devices
  • 3. Four Environments Four environments built around the technology 1. Extensions to an existing wired network 2. Multiple Access Points 3. LAN-to-LAN wireless network 4. 3G or 4G hot spots
  • 5. Wireless Vocabulary Term Description Association The process of connecting a client to an access point BSSID – Basic Service Set Identification The MAC address of an access point SSID / ESSID – Extended Service Set Identification The (broadcast) name of a network Hot Spot A location that provides wireless access to the public Access Point / Wireless Access Point (WAP) A hardware or software construct that provides wireless access
  • 6. Service Set Identifier (SSID)  SSID is a continual broadcast by the access point  SSID is embedded within the header of the packets  SSID is the name of a network. Also called an ESSID (Extended SSID)  You can try to mask a ESSID  BSSID’s identify access points and their clients  Is the MAC address  MUST be transmitted
  • 7. BSSID This identifier is called a basic service set identifier (BSSID) and is included in all wireless packets. Each Access Point has its Own BSS
  • 8. Wireless Antennas : Laptops  On a standard laptop, the antenna is typically around the screen  Can be extended via USB  When extending, make sure to match cables and Ohms
  • 9. Wireless Antenna : Yagi Antenna  Unidirectional  Site to site or directional
  • 10. Wireless Antennas : Omnidirectional and Parabolic Grid  Omnidirectional – all directions  Two dimensions but not three  Sometimes magnetic for cars and war driving
  • 11. Wireless Authentication Modes  Open  only requires a MAC address  Shared Key  All AP’s and clients use the same authentication key  Hashing methods used to protect the key can be easily broken  802.1X  Authentication uses usernames and passwords, certificates or devices such as smart cards. Requires one or both of these  RADIUS server to centralize user accounts and authentication information  A PKI for issuing certificates
  • 12. Wireless Encryption  WEP – Wireless Equivalent Privacy  Oldest and weakest  Initial solution  WPA – Wi-Fi Protected Access  Uses Temporal Key Integrity Protocol (TKIP)  TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware.  Uses Message Integrity Code (MIC)  WPA2  Uses AES  Requires hardware
  • 13. WEP Encryption:  Introduced with the 802.11b standard  11MBs, 2.4 GHz, RC4  Design Parameters  Defeat Eavesdropping on communications  Check integrity of data  Use Shared Secret  Problems with WEP  Designed w/o input from the academic community or the public, professional cryptologist were never consulted  Passively uncover the key
  • 14. Breaking WEP  Need to intercept as many IV’s (Initialization Vectors) as possible 1. Start the wireless interface in monitor mode 2. Fake authentication with the access point 3. ARP requests can be intercepted and reinjected 4. Run password cracking tool
  • 17. Attacks and Vulnerabilities  Attacks in transit  WEP  WPA  WPA2  Attacks on endpoints  Laptops  WAP – Wireless Access Points  Rouge access points
  • 18. Access Points Wireless access points transmits its SSID and BSSID to anyone in range Using monitor mode, we can see the BSSID and then use a brute force utility to find the password
  • 19. Access Points Monitor Mode vs Managed Mode Managed Mode is the mode you are mostly in to connect to wireless networks Monitor mode makes your wireless card passive. It is simply listening in on every channel Finding the MAC address For Windows, you can use the inSSIDer tool For Linux, you can use place the card in monitor mode and use the airodump NG tool
  • 20. Access Points Testing Points If you systems are using certificates or other PKI authentication, try to join the network. Egress Rules Once you join, can you nmap the network?
  • 21. User Laptops  User laptops will continuously broadcast for saved networks  We can attack the user MAC or answer the broadcast with a WiFi Pineapple
  • 22. Bluetooth  Bluetooth devices are prominent these days. Bluetooth is found on laptops and mobile devices  Operates on the 2.4 GHz range  Four different versions
  • 23. Bluetooth Modes  Discoverable  Allows the device to be scanned and located by other Bluetooth devices  Limited Discoverable  Mode is becoming more common. This put it into discovery mode for a short period of time  Non-discoverable  As the name suggests, it cannot be located  Pairing  We have to pair devices in a peer to peer type connection
  • 24. Bluetooth Threats  What type of information do you exchange with Bluetooth?  Calendars and Address Books  Photos, cameras, microphones  Attacker can inject microphone

Editor's Notes

  1. IoT devices: Nest Thermostat, Ring Doorbell, Refrigerators, Garage Doors
  2. https://www.juniper.net/documentation/en_US/junos-space-apps/network-director2.0/topics/concept/wireless-ssid-bssid-essid.html
  3. Standard laptops – works great for users Older laptops may have door on bottom. Newer laptops are typically intergrated
  4. Shared Key is the most common
  5. Lab – find the rouge access point
  6. Lab on placing in monitor mode Once you have the MAC address, you can launch deauth attacks. This is a form of DoS attack Bully to force the network connection
  7. Some of the PKI structures will let you join but not let you do anything Stop client to client access?