SlideShare a Scribd company logo
1 of 10
Download to read offline
Wireless LAN IEEE 802.11
Wardiving and Network-Sniffing


by Andreas Lechner
1. WLAN 802.11 Technology


n    WLAN – Wireless Local Area Network
      Ø    designed for mobile user to connect to a local area network (LAN)
            through a wireless (radio) connection.


n    IEEE 802.11 – Standard
      Ø    all WLAN are implemented in the IEEE 802.11 standards
      Ø    They are created and maintained by the IEEE (Institute of Electrical and
            Electronics Engineers)
      Ø    Most common protocols in these days: IEEE 802.11 a/b/g/n
1. WLAN 802.11 IEEE Standard
2. WLAN Security Standards


n    1997 the original 802.11 standard only offers
          - SSID (Service Set Identifier)
          - MAC Filtering (Media Access Control)
          - and WEP (Wired Equivalent Privacy)

n    2003 Wi-Fi introduced the Wi-Fi Protected Access (WPA).

n    2004 The WPA2 was introduced.
2. Why is WLAN Security important?




Prof. Rick Graziani Presentation Chapter 8 Security


                                                      Picture from http://bcbusinessonline.ca

Security usually refers to ensuring that users can perform only the tasks that
they are authorized to do and can obtain only the information that they are
authorized to have.
Prof. Rick Graziani
2. Wardiving


n    Wardiving
      Ø    Uses software such as Netstumbler (for windows) or Kismet (Mac) to
            scan the airwaves for SSIDs and Data
      Ø    Can be used to hack into WLAN
2. Sniffing


n    Sniffing
      Ø    is a data interception technology. Sniffer is a program that monitor or
            reading all network traffic passing in and out over a network such as
            Wireshark
2. Sniffing
2. What we learn from it


n    Sometimes it can be better to use a LAN instead of WLAN
n    Be sure that you are using the latest WLAN Standard
      Ø     Such as WPA2/AES or WPA2/TKIP (Personal / Enterprise)
      Ø     Replace old routers or access-points with new ones or look for updates
n    Don’t do any important stuff like banking in open hotspots / internet
      cafes. As well the Bond Student WLAN is not secure enough to do
      banking.
       Ø    At least if you do it in the Bond Network be sure that you have a secure
             encryption à https:// (Hypertext Transfer Protocol Secure)
Thank you for listening!


References and Literature:
http://www.wifi.org
http://standards.ieee.org/wireless (etc.)
http://www.lancom.de (Techpaper)
http://www.cisco.com
http://www.computec.ch
http://en.wikipedia.org/wiki/Wireles_LAN (etc.)
http://en.wikipedia.org/wiki/Wireless_security
http://www.javvin.com/wirelessmap.html
http://bcbusinessonline.ca
•     Presentation by Jörg Grünauer at http://134.91.24.143/~gruenauer
•     Presentation by Prof. Rick Graziani & Prof. Yousif - Chapter 8 Security
•     Presentation by Alain Girardet & Dominik Blunk - WLAN & Wardiving
•     Presentation by Andreas Lechner - WLAN 802.11 in 2008
•     Presentation by Joachim Urbach - Die Funktionsweise von Wireless-LAN
•     Presentation by Axel Wachtler, Frank Becker, Sven Klemm - Themenabend Wireless LAN
•     Presentation by Karen Chou, Randall Okamoto, Sheng Shan Zhao, Andrew Armada – Wireless LAN
•     Diploma thesis by Stefan Dörhöfer – Empirische Untersuchung zur WLAN-Sicherheit mittels Wardiving

More Related Content

What's hot

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex TrainingBryan Len
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 

What's hot (20)

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex Training
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
WEP
WEPWEP
WEP
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 

Similar to Wardiving and Network-Sniffing

The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security systemIJAEMSJORNAL
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 

Similar to Wardiving and Network-Sniffing (20)

The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Pdf3
Pdf3Pdf3
Pdf3
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 

Wardiving and Network-Sniffing

  • 1. Wireless LAN IEEE 802.11 Wardiving and Network-Sniffing by Andreas Lechner
  • 2. 1. WLAN 802.11 Technology n  WLAN – Wireless Local Area Network Ø  designed for mobile user to connect to a local area network (LAN) through a wireless (radio) connection. n  IEEE 802.11 – Standard Ø  all WLAN are implemented in the IEEE 802.11 standards Ø  They are created and maintained by the IEEE (Institute of Electrical and Electronics Engineers) Ø  Most common protocols in these days: IEEE 802.11 a/b/g/n
  • 3. 1. WLAN 802.11 IEEE Standard
  • 4. 2. WLAN Security Standards n  1997 the original 802.11 standard only offers - SSID (Service Set Identifier) - MAC Filtering (Media Access Control) - and WEP (Wired Equivalent Privacy) n  2003 Wi-Fi introduced the Wi-Fi Protected Access (WPA). n  2004 The WPA2 was introduced.
  • 5. 2. Why is WLAN Security important? Prof. Rick Graziani Presentation Chapter 8 Security Picture from http://bcbusinessonline.ca Security usually refers to ensuring that users can perform only the tasks that they are authorized to do and can obtain only the information that they are authorized to have. Prof. Rick Graziani
  • 6. 2. Wardiving n  Wardiving Ø  Uses software such as Netstumbler (for windows) or Kismet (Mac) to scan the airwaves for SSIDs and Data Ø  Can be used to hack into WLAN
  • 7. 2. Sniffing n  Sniffing Ø  is a data interception technology. Sniffer is a program that monitor or reading all network traffic passing in and out over a network such as Wireshark
  • 9. 2. What we learn from it n  Sometimes it can be better to use a LAN instead of WLAN n  Be sure that you are using the latest WLAN Standard Ø  Such as WPA2/AES or WPA2/TKIP (Personal / Enterprise) Ø  Replace old routers or access-points with new ones or look for updates n  Don’t do any important stuff like banking in open hotspots / internet cafes. As well the Bond Student WLAN is not secure enough to do banking. Ø  At least if you do it in the Bond Network be sure that you have a secure encryption à https:// (Hypertext Transfer Protocol Secure)
  • 10. Thank you for listening! References and Literature: http://www.wifi.org http://standards.ieee.org/wireless (etc.) http://www.lancom.de (Techpaper) http://www.cisco.com http://www.computec.ch http://en.wikipedia.org/wiki/Wireles_LAN (etc.) http://en.wikipedia.org/wiki/Wireless_security http://www.javvin.com/wirelessmap.html http://bcbusinessonline.ca •  Presentation by Jörg Grünauer at http://134.91.24.143/~gruenauer •  Presentation by Prof. Rick Graziani & Prof. Yousif - Chapter 8 Security •  Presentation by Alain Girardet & Dominik Blunk - WLAN & Wardiving •  Presentation by Andreas Lechner - WLAN 802.11 in 2008 •  Presentation by Joachim Urbach - Die Funktionsweise von Wireless-LAN •  Presentation by Axel Wachtler, Frank Becker, Sven Klemm - Themenabend Wireless LAN •  Presentation by Karen Chou, Randall Okamoto, Sheng Shan Zhao, Andrew Armada – Wireless LAN •  Diploma thesis by Stefan Dörhöfer – Empirische Untersuchung zur WLAN-Sicherheit mittels Wardiving