Basically, a group of computers connected together with various wires is called a network. Similarly, a group of computers connected together with the help of radio waves in a limited space is called a wireless network.
https://www.infosectrain.com/courses/ceh-v11-certification-training/
3. What is a Wireless Network?
Basically, a group of computers connected together with various wires is called
a network. Similarly, a group of computers connected together with the help of
radio waves in a limited space is called a wireless network.
One of the best advantages of using a wireless network is the devices within a
network can move from one location/area to another, yet they can share the
data and stay connected with the services in the network. The second and best
advantage of using a wireless network is that installing it is very cheap and
faster than installing a wired network.
www.infosectrain.com | sales@infosectrain.com 02
DOMAIN 6
Wireless Network Hacking
In this blog, we will discuss the 6th
domain of CEH,
which is ‘Wireless Network Hacking’
4. > Accessibility
Wireless networks do not require any wired connection so that users can
communicate and connect even when they are not at the same location. For
example, we can access our office networks without cables and adapters just
by using wireless networks.
> Cost-effective
Using wireless networks is cost-effective because installing them is way
cheaper than installing wired networks.
> Flexible
In this pandemic, without these wireless networks, there wouldn’t have been
any possibility of Work From Home. In my opinion, the flexibility of wireless
networks is the only thing that is saving the corporate world.
Even though there are many advantages, there is one big disadvantage that
may entirely ruin the reputation of wireless networks, and that is security. Yes,
though these wireless networks are cost-effective, flexible, and accessible from
anywhere, they are less secure when compared to wired networks.
Wireless networks are easy to attack, so we must be very conscious while using
them. When you are using a wireless network, try to avoid public connections.
For example, assume you went to a mall, and for Wi-Fi, we will register as a
guest user on the public network. This can attract many attackers.
A pro-life tip
Instead of logging in as a guest user, using your mobile data is a safer way.
www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 6
Wireless Network Hacking
Advantages of using a wireless network
There are various advantages of using a wireless network. A few of them are:
6. DOMAIN 6
Wireless Network Hacking
www.infosectrain.com | sales@infosectrain.com 05
Kismet
Kismet is a packet sniffer, network detector, and intrusion detection system
for 802.11 LANs. Kismet works for Bluetooth, SDRs, Wi-Fi, and other wireless
protocols. The main job of Kismet is to gather the data packets traveling in its
environment and use them to detect hidden Wi-Fi networks so that attackers
can exploit them.
7. Wi-Fi phisher
Wi-Fi phisher is a tool used by attackers to install automated phishing attacks
against Wi-Fi networks to obtain user credentials. Wi-Fi phisher is a social
engineering attack that doesn’t require brute force, unlike any other attacking
method.
www.infosectrain.com | sales@infosectrain.com 06
DOMAIN 6
Wireless Network Hacking
8. inSSIDer
inSSIDer is a popular Wi-Fi scanner for Microsoft Windows, and OS X. InSSIDer
can function as a Wi-Fi scanner, and it can find open wireless access points,
measure the signal strength, and save a log with GPS data.
DOMAIN 6
Wireless Network Hacking
www.infosectrain.com | sales@infosectrain.com 07
9. Aircrack-ng
Aircrack-ng is one of the finest password cracking tools. Aircrack-ng analyses
the network packets and cracks the network password. FMS, PTW, Korek, and
other WEP password attacks are supported by Aircrack-ng.
DOMAIN 6
Wireless Network Hacking
www.infosectrain.com | sales@infosectrain.com 08
10. Tools used for Wireless Hacking:
> Social Engineering
> Chatty technicians
> Garbage collecting/dumpster diving
www.infosectrain.com | sales@infosectrain.com 09
DOMAIN 6
Wireless Network Hacking
11. Tools used for Wireless Hacking:
Social Engineering
Social engineering is nothing other than a cybersecurity threat, a type of
intrusion that takes advantage of the weakness in your human workforce or
security system to gain access to the company’s network. Hackers manipulate
employees, even senior staff, with complicated emotional and trickery
manipulations to get an organization’s sensitive information.
www.infosectrain.com | sales@infosectrain.com 10
DOMAIN 6
Wireless Network Hacking
12. Chatty Technicians
If you are using a system or network for your personal jobs at home, you may
usually think you are less prone to cyberattacks. That is when you believe
everyone who messages or calls you as technical support. For example, you
may receive calls from unknown people posing as bank employees, and when
they ask for your credentials, you will simply believe them and hand over your
credentials to them. That is how attackers can get your sensitive data.
www.infosectrain.com | sales@infosectrain.com 11
DOMAIN 6
Wireless Network Hacking
13. Garbage Collecting/Dumpster Diving
Have you ever thrown away your credit card statement into a trash bin without
shredding it? and left the place with full conviction that attackers would not
take that information because it is a garbage area? That is where you went
wrong.
Attackers who use social engineering techniques usually check the trash
around companies for unshredded credit card statements from which they
can get your sensitive bank information.
www.infosectrain.com | sales@infosectrain.com 12
DOMAIN 6
Wireless Network Hacking