SlideShare a Scribd company logo
WIRELESS NETWORK SECURITY
     AND PROTECTION
       Azeem Arshad Vasanwala
WHAT IS A WIRELESS
   NETWORK?
HOW ARE THEY PROTECTED?
HOW ARE THEY PROTECTED?

• WEP   (Least secure)
  •   None

  •   64Bit Encryption

  •   128Bit Encryption
HOW ARE THEY PROTECTED?

• WEP   (Least secure)
  •   None

  •   64Bit Encryption

  •   128Bit Encryption

• WPA   & WPA2
WEP


KEY MANAGEMENT
WEP

A passphrase is used to generate a key. 4 keys are
 generated in total, using 4 passphrases. They are
 then distributed to network end users. Anyone
 who gets hold of these keys is essentially in the
networks. The same key is given to ALL the users
Company A    We have generated a
            key. Every user uses the
                  same key :D
Company A          We have generated a
                  key. Every user uses the
                        same key :D




            You are all using the same
            key? Now who left it lying
                                         Company A’s Rival
            around on a post it…….
Company A
            OUR SERVERS HAVE
              BEEN HACKED
Company A
                 OUR SERVERS HAVE
                   BEEN HACKED




                                         Company A’s Rival
            Thanks for telling us your
                latest plans :D
WEP

A cracker would only have to compromise the key
from a SINGLE user, and he would then know the
                key for all users.

  The time taken to crack a network is directly
         proportional to the key length
WPA

  WPA (WiFi Protected Access) was created to
address problems with WEP. Passwords and data is
 transferred using a Pre Shared Key. Thus, nothing
can be decrypted without this key, which is known
        to the router and the machine only.

    But passwords need to be strong, and non
               dictionary words
WPAv2



Only change is the mandatory inclusion of AES-
               CCMP algorithm
OTHER FORMS OF SECURITY
OTHER FORMS OF SECURITY

• USB   and Wired devices
OTHER FORMS OF SECURITY

• USB   and Wired devices

   • Dongles
OTHER FORMS OF SECURITY

• USB   and Wired devices

   • Dongles

   • Ethernet
OTHER FORMS OF SECURITY

• USB   and Wired devices

   • Dongles

   • Ethernet

   • Smart   cards, etc
OTHER FORMS OF SECURITY

• USB   and Wired devices

   • Dongles

   • Ethernet

   • Smart    cards, etc

• RF   Shielding
OTHER FORMS OF SECURITY

• USB   and Wired devices

   • Dongles

   • Ethernet

   • Smart     cards, etc

• RF   Shielding

• Preventing   internet access till login
WHAT CAN YOU DO?
WHAT CAN YOU DO?

• Change   default passwords
WHAT CAN YOU DO?

• Change   default passwords

• Use WPA    or WPAv2 encryption, with a proper password
WHAT CAN YOU DO?

• Change   default passwords

• Use WPA    or WPAv2 encryption, with a proper password

• Filter
      devices, such that only the ones you allow can access
 your hotspot (MAC Address Filtering)
WHAT CAN YOU DO?

• Change    default passwords

• Use WPA     or WPAv2 encryption, with a proper password

• Filter
      devices, such that only the ones you allow can access
 your hotspot (MAC Address Filtering)

• Don’t    broadcast your network
WHAT CAN YOU DO?

• Change    default passwords

• Use WPA     or WPAv2 encryption, with a proper password

• Filter
      devices, such that only the ones you allow can access
 your hotspot (MAC Address Filtering)

• Don’t    broadcast your network

• Use   firewalls
THANKS AND KEEP YOUR
  NETWORK SAFE :D

More Related Content

Similar to Edu camp presentation 13/4/12

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
ImXaib
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
NotSure11
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
Mavaz
 
Cracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless NetworksCracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless Networksguestf2e41
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
UC San Diego
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
Napier University
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
rash2kool
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
Pranshu Pareek
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
Greater Noida Institute Of Technology
 
WEP .WAP WAP2.pptx
WEP .WAP WAP2.pptxWEP .WAP WAP2.pptx
WEP .WAP WAP2.pptx
kudakwashemakado1
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol SecurityDavid Barker
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Alf Tero
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
n|u - The Open Security Community
 

Similar to Edu camp presentation 13/4/12 (20)

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
AleksandrDoroninSlides.ppt
AleksandrDoroninSlides.pptAleksandrDoroninSlides.ppt
AleksandrDoroninSlides.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Cracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless NetworksCracking Wep And Wpa Wireless Networks
Cracking Wep And Wpa Wireless Networks
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
WEP .WAP WAP2.pptx
WEP .WAP WAP2.pptxWEP .WAP WAP2.pptx
WEP .WAP WAP2.pptx
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Edu camp presentation 13/4/12

  • 1. WIRELESS NETWORK SECURITY AND PROTECTION Azeem Arshad Vasanwala
  • 2. WHAT IS A WIRELESS NETWORK?
  • 3. HOW ARE THEY PROTECTED?
  • 4. HOW ARE THEY PROTECTED? • WEP (Least secure) • None • 64Bit Encryption • 128Bit Encryption
  • 5. HOW ARE THEY PROTECTED? • WEP (Least secure) • None • 64Bit Encryption • 128Bit Encryption • WPA & WPA2
  • 7. WEP A passphrase is used to generate a key. 4 keys are generated in total, using 4 passphrases. They are then distributed to network end users. Anyone who gets hold of these keys is essentially in the networks. The same key is given to ALL the users
  • 8.
  • 9. Company A We have generated a key. Every user uses the same key :D
  • 10. Company A We have generated a key. Every user uses the same key :D You are all using the same key? Now who left it lying Company A’s Rival around on a post it…….
  • 11.
  • 12.
  • 13. Company A OUR SERVERS HAVE BEEN HACKED
  • 14. Company A OUR SERVERS HAVE BEEN HACKED Company A’s Rival Thanks for telling us your latest plans :D
  • 15. WEP A cracker would only have to compromise the key from a SINGLE user, and he would then know the key for all users. The time taken to crack a network is directly proportional to the key length
  • 16. WPA WPA (WiFi Protected Access) was created to address problems with WEP. Passwords and data is transferred using a Pre Shared Key. Thus, nothing can be decrypted without this key, which is known to the router and the machine only. But passwords need to be strong, and non dictionary words
  • 17. WPAv2 Only change is the mandatory inclusion of AES- CCMP algorithm
  • 18. OTHER FORMS OF SECURITY
  • 19. OTHER FORMS OF SECURITY • USB and Wired devices
  • 20. OTHER FORMS OF SECURITY • USB and Wired devices • Dongles
  • 21. OTHER FORMS OF SECURITY • USB and Wired devices • Dongles • Ethernet
  • 22. OTHER FORMS OF SECURITY • USB and Wired devices • Dongles • Ethernet • Smart cards, etc
  • 23. OTHER FORMS OF SECURITY • USB and Wired devices • Dongles • Ethernet • Smart cards, etc • RF Shielding
  • 24. OTHER FORMS OF SECURITY • USB and Wired devices • Dongles • Ethernet • Smart cards, etc • RF Shielding • Preventing internet access till login
  • 26. WHAT CAN YOU DO? • Change default passwords
  • 27. WHAT CAN YOU DO? • Change default passwords • Use WPA or WPAv2 encryption, with a proper password
  • 28. WHAT CAN YOU DO? • Change default passwords • Use WPA or WPAv2 encryption, with a proper password • Filter devices, such that only the ones you allow can access your hotspot (MAC Address Filtering)
  • 29. WHAT CAN YOU DO? • Change default passwords • Use WPA or WPAv2 encryption, with a proper password • Filter devices, such that only the ones you allow can access your hotspot (MAC Address Filtering) • Don’t broadcast your network
  • 30. WHAT CAN YOU DO? • Change default passwords • Use WPA or WPAv2 encryption, with a proper password • Filter devices, such that only the ones you allow can access your hotspot (MAC Address Filtering) • Don’t broadcast your network • Use firewalls
  • 31. THANKS AND KEEP YOUR NETWORK SAFE :D

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n