SlideShare a Scribd company logo
1 of 39
By :
Septafiansyah Dwi Putra
ITB
 Radio Frequency Basics
 Mobile telephony
 Cellular Digital Packet Data (CDPD)
 Private data networks
 Bluetooth
 3G
 Etc
 Immediate communication, mobile user
 Two-way, interactive
 Broadcast
 Convenience
 Bandwidth limitations
 Roaming (no fixed location)
 A wireless LAN or WLAN is a wireless local area network that
uses radio waves as its carrier.
 The last link with the users is wireless, to give a network
connection to all users in a building or campus.
 The backbone network usually uses cables
Wireless LANs operate in almost the same way as wired LANs,
using the same networking protocols and supporting the most
of the same applications.
The wireless LAN connects to a wired LAN
 There is a need of an access point that bridges wireless LAN
traffic into the wired LAN.
 The access point (AP) can also act as a repeater for wireless
nodes, effectively doubling the maximum possible di
 802.11a offers speeds with a theoretically maximum rate of
54Mbps in the 5 GHz band
 802.11b offers speeds with a theoretically maximum rate of
11Mbps at in the 2.4 GHz spectrum band
 802.11g is a new standard for data rates of up to a theoretical
maximum of 54 Mbps at 2.4 GHz. 
 Wired Equivalent Privacy (WEP) – A protocol to
protect link-level data during wireless
transmission between clients and access points.
 Services:
 Authentication: provides access control to the network
by denying access to client stations that fail to
authenticate properly.
 Confidentiality: intends to prevent information
compromise from casual eavesdropping
 Integrity: prevents messages from being modified
while in transit between the wireless client and the
access point.
Means:
 Based on cryptography
 Non-cryptographic
 Both are identity-based verification mechanisms (devices
request access based on the SSID – Service Set Identifier of the
wireless network).
 Authentication techniques
 Cryptographic techniques
 WEP Uses RC4 symmetric key, stream cipher algorithm to
generate a pseudo random data sequence. The stream is
XORed with the data to be transmitted
 Key sizes: 40bits to 128bits
 Unfortunately, recent attacks have shown that the WEP
approach for privacy is vulnerable to certain attack regardless
of key size
 Data integrity is ensured by a simple encrypted version of
CRC (Cyclic Redundant Check)
 Also vulnerable to some attacks
 Security features in Wireless products are
frequently not enabled.
 Use of static WEP keys (keys are in use for a
very long time). WEP does not provide key
management.
 Cryptographic keys are short.
 No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
 Identity based systems are vulnerable.
 Packet integrity is poor.
 3Com Dynamic Security Link
 CISCO LEAP - Lightweight Extensible Authentication
Protocol
 IEEE 802.1x – Port-Based Network Access Control
 RADIUS Authentication Support
 EAP-MD5
 EAP-TLS
 EAP-TTLS
 PEAP - Protected EAP
 TKIP - Temporal Key Integrity Protocol
 IEEE 802.11i
 Windows
 Wireless NIC drivers are easy to get
 Wireless hacking tools are few and weak
 Unless you pay for AirPcap devices or OmniPeek
 Linux
 Wireless NIC drivers are hard to get and install
 Wireless hacking tools are much better
 For Linux, the best chipsets to use are Orinoco, Prism2.x/3,
Atheros, and Cisco
 A good resource is at Madwifi
 Go to http://madwifi-project.org/wiki/Compatibility
Service Set Identifier
(SSID)
 An identifier to distinguish one
access point from another
Initialization Vector (IV)
 Part of a Wired Equivalent Privacy
(WEP) packet
 Used in combination with the shared
secret key to cipher the packet's
data
SSID can be found from any of these frames
 Beacons
 Sent continually by the access point (unless disabled)
 Probe Requests
 Sent by client systems wishing to connect
 Probe Responses
 Response to a Probe Request
 Association and Reassociation Requests
 Made by the client when joining or rejoining the network
If SSID broadcasting is off, just send
adeauthentication frame to force a
reassociation
 Each MAC must be entered into the list of approved addresses
 High administrative effort, low security
 Attacker can just sniff MACs from clients and spoof them
 In Windows, just select it from the available wireless networks
 Click on set up a wireless network from a home or small office.
 And then input
the SSID
 In Windows Vista
Rund regedt32
Navigate to
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlCla
ss{4D36E972-E325-11CE-BFC1-08002BE10318}
Find REG_SZ name NetworkAddress and change it
 SMAC is easier
 Many Wi-Fi cards
allow you to change
the MAC in Windows'
Device Manager
 Brute-force keyspace – takes weeks even for 40-bit keys (use
Cain & Abel)
 Collect Initialization Vectors, which are sent in the clear, and
correlate them with the first encrypted byte
 This makes the brute-force process much faster
 Aircrack-ng or AirSnort (old)
 kismet
 Cain & Abel
 WLAN-Tools
 DWEPCrack
 WEPAttack
 Cracks using the weak IV flaw
 Best countermeasure – use WPA/WPA2
 This demo is conducted in my home
 Network configuration.
Linksys Access point
WEP 64 bit key
Passcode ???
SSID DIJIANG
 WPA/WPA2 is strong
 No major weaknesses
 However, if you use a weak Pre-Shared Key, it can be found
with a dictionary attack
 Tool: Aircrack-ng
 Change the default setting
 Filtering MAC Address
 100% safe = imposible
Wireless hacking   septafiansyah

More Related Content

What's hot

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and securityakki_hearts
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 

What's hot (20)

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 

Viewers also liked

Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesAmit Kumar
 
Chapter 6 telecommunication
Chapter 6 telecommunicationChapter 6 telecommunication
Chapter 6 telecommunicationAG RD
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
Multiplexing
MultiplexingMultiplexing
Multiplexingnimay1
 
Radio Wave propagation
Radio Wave propagationRadio Wave propagation
Radio Wave propagationRitika De
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Adil Mehmoood
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmIndra97065
 
WAVE propagation ppt by GAGAN PRASAD
WAVE propagation ppt by GAGAN PRASADWAVE propagation ppt by GAGAN PRASAD
WAVE propagation ppt by GAGAN PRASADGagan Prasad
 
Multiplexing
MultiplexingMultiplexing
Multiplexingstooty s
 

Viewers also liked (20)

Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Bsnl ppt
Bsnl pptBsnl ppt
Bsnl ppt
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Chapter 6 telecommunication
Chapter 6 telecommunicationChapter 6 telecommunication
Chapter 6 telecommunication
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Radio Wave propagation
Radio Wave propagationRadio Wave propagation
Radio Wave propagation
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
WAVE propagation ppt by GAGAN PRASAD
WAVE propagation ppt by GAGAN PRASADWAVE propagation ppt by GAGAN PRASAD
WAVE propagation ppt by GAGAN PRASAD
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Similar to Wireless hacking septafiansyah

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networkingM Sabir Saeed
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsMD SAQUIB KHAN
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 

Similar to Wireless hacking septafiansyah (20)

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Darsh
DarshDarsh
Darsh
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Wireless hacking septafiansyah

  • 2.  Radio Frequency Basics  Mobile telephony  Cellular Digital Packet Data (CDPD)  Private data networks  Bluetooth  3G  Etc
  • 3.  Immediate communication, mobile user  Two-way, interactive  Broadcast  Convenience  Bandwidth limitations  Roaming (no fixed location)
  • 4.
  • 5.  A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier.  The last link with the users is wireless, to give a network connection to all users in a building or campus.  The backbone network usually uses cables Wireless LANs operate in almost the same way as wired LANs, using the same networking protocols and supporting the most of the same applications.
  • 6. The wireless LAN connects to a wired LAN  There is a need of an access point that bridges wireless LAN traffic into the wired LAN.  The access point (AP) can also act as a repeater for wireless nodes, effectively doubling the maximum possible di
  • 7.  802.11a offers speeds with a theoretically maximum rate of 54Mbps in the 5 GHz band  802.11b offers speeds with a theoretically maximum rate of 11Mbps at in the 2.4 GHz spectrum band  802.11g is a new standard for data rates of up to a theoretical maximum of 54 Mbps at 2.4 GHz. 
  • 8.  Wired Equivalent Privacy (WEP) – A protocol to protect link-level data during wireless transmission between clients and access points.  Services:  Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly.  Confidentiality: intends to prevent information compromise from casual eavesdropping  Integrity: prevents messages from being modified while in transit between the wireless client and the access point.
  • 9. Means:  Based on cryptography  Non-cryptographic  Both are identity-based verification mechanisms (devices request access based on the SSID – Service Set Identifier of the wireless network).
  • 11.  Cryptographic techniques  WEP Uses RC4 symmetric key, stream cipher algorithm to generate a pseudo random data sequence. The stream is XORed with the data to be transmitted  Key sizes: 40bits to 128bits  Unfortunately, recent attacks have shown that the WEP approach for privacy is vulnerable to certain attack regardless of key size
  • 12.  Data integrity is ensured by a simple encrypted version of CRC (Cyclic Redundant Check)  Also vulnerable to some attacks
  • 13.  Security features in Wireless products are frequently not enabled.  Use of static WEP keys (keys are in use for a very long time). WEP does not provide key management.  Cryptographic keys are short.  No user authentication occurs – only devices are authenticated. A stolen device can access the network.  Identity based systems are vulnerable.  Packet integrity is poor.
  • 14.  3Com Dynamic Security Link  CISCO LEAP - Lightweight Extensible Authentication Protocol  IEEE 802.1x – Port-Based Network Access Control  RADIUS Authentication Support  EAP-MD5  EAP-TLS  EAP-TTLS  PEAP - Protected EAP  TKIP - Temporal Key Integrity Protocol  IEEE 802.11i
  • 15.
  • 16.  Windows  Wireless NIC drivers are easy to get  Wireless hacking tools are few and weak  Unless you pay for AirPcap devices or OmniPeek  Linux  Wireless NIC drivers are hard to get and install  Wireless hacking tools are much better
  • 17.  For Linux, the best chipsets to use are Orinoco, Prism2.x/3, Atheros, and Cisco  A good resource is at Madwifi  Go to http://madwifi-project.org/wiki/Compatibility
  • 18. Service Set Identifier (SSID)  An identifier to distinguish one access point from another Initialization Vector (IV)  Part of a Wired Equivalent Privacy (WEP) packet  Used in combination with the shared secret key to cipher the packet's data
  • 19.
  • 20. SSID can be found from any of these frames  Beacons  Sent continually by the access point (unless disabled)  Probe Requests  Sent by client systems wishing to connect  Probe Responses  Response to a Probe Request  Association and Reassociation Requests  Made by the client when joining or rejoining the network If SSID broadcasting is off, just send adeauthentication frame to force a reassociation
  • 21.  Each MAC must be entered into the list of approved addresses  High administrative effort, low security  Attacker can just sniff MACs from clients and spoof them
  • 22.
  • 23.  In Windows, just select it from the available wireless networks  Click on set up a wireless network from a home or small office.  And then input the SSID
  • 24.  In Windows Vista Rund regedt32 Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlCla ss{4D36E972-E325-11CE-BFC1-08002BE10318} Find REG_SZ name NetworkAddress and change it  SMAC is easier
  • 25.  Many Wi-Fi cards allow you to change the MAC in Windows' Device Manager
  • 26.  Brute-force keyspace – takes weeks even for 40-bit keys (use Cain & Abel)  Collect Initialization Vectors, which are sent in the clear, and correlate them with the first encrypted byte  This makes the brute-force process much faster
  • 27.  Aircrack-ng or AirSnort (old)  kismet  Cain & Abel  WLAN-Tools  DWEPCrack  WEPAttack  Cracks using the weak IV flaw  Best countermeasure – use WPA/WPA2
  • 28.  This demo is conducted in my home  Network configuration. Linksys Access point WEP 64 bit key Passcode ??? SSID DIJIANG
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.  WPA/WPA2 is strong  No major weaknesses  However, if you use a weak Pre-Shared Key, it can be found with a dictionary attack  Tool: Aircrack-ng
  • 38.  Change the default setting  Filtering MAC Address  100% safe = imposible

Editor's Notes

  1. 802.11 Most wireless LAN products operate in unlicensed radio bands 2.4 GHz is most popular Available in most parts of the world,No need for user licensing,Most wireless LANs use spread-spectrum radio Resistant to interference, secure Two popular methods Frequency Hopping (FH) Direct Sequence (DS) 802.11a Ultra-high spectrum efficiency 5 GHz band is 300 MHz (vs. 83.5 MHz @ 2.4 GHz) More data can travel over a smaller amount of bandwidth High speed Up to 54 Mbps Less interference , Fewer products using the frequency , 2.4 GHz band shared by cordless phones, microwave ovens, Bluetooth, and WLANs Disadvantages Standards and Interoperability , Standard not accepted worldwide , No interoperability certification available for 802.11a products Not compatible or interoperable with 802.11b , Legal issues , License-free spectrum in 5 GHz band not available worldwide Market Beyond LAN-LAN bridging, there is limited interest for 5 GHz adoption 802.11g is a high-speed extension to 802.11b Compatible with 802.11b , High speed up to 54 Mbps , 2.4 GHz (vs. 802.11a, 5 GHz) , Adaptive Rate Shifting , Provides higher speeds and higher capacity requirements for applications Wireless Public Access Compatible with existing 802.11b standard , Leverages Worldwide spectrum availability in 2.4 GHz , Likely to be less costly than 5 GHz alternatives Provides easy migration for current users of 802.11b WLANs , Delivers backward support for existing 802.11b products , Provides path to even higher speeds in the future
  2. EAP-SIM  Dalam sebuah jaringan berbasis GSM, koneksi mobile melakukan otentikasi SIM melalui RADIUS protokol atau dikenal sebagai EAP-SIM. dimana client akan melewati otorisasi provisioning, otentikasi dan layanan yang sama seperti yang sudah ada pada layanan GSM tanpa perubahan pada elemen jaringan selular. EAP-AKA   Pada jaringan berbasis UMTS, pada EAP-AKA otentikasi diimplementasikan dengan fungsi yang berasal dari key jaringan akses, biasanya diambil dari Modul Subscriber Identity Universal (USIM). Metode AKA didasarkan pada mekanisme challenge dan respon untuk otentikasi bersama. Hal ini dapat tentunya membuat lebih aman. EAP-TLS  didefinisikan dalam RFC5216. Keamanan Transport Layer Protocol (TLS) yang kuat, dengan penggunaan PKI (infrastruktur kunci publik) untuk mengamankan otentikasi bersama antara client ke server dan sebaliknya. Kedua klien dan server harus diberi sertifikat digital ditandatangani oleh Otoritas Sertifikat (CA) yang menyatakan bahwa link tersebut sudah aman. EAP-TTLS  Tunnel TLS metode EAP (EAP-TTLS) sangat mirip dengan EAP-PEAP dalam cara kerjanya. Tidak memerlukan klien diotentikasi ke server dengan sertifikat digital yang ditandatangani oleh CA. Server menggunakan tunnel yang aman dari TLS untuk mengotentikasi klien dengan password dan dengan mekanisme pertukaran key. Dan pada EAP-TTLS menggunakan username dan password sebagai tambahannya sedangkan pada EAP-TLS tidak ada username dan password
  3. Wi-Fi Protected Access ( WPA ) and Wi-Fi Protected Access II ( WPA2 ) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy) . [1] WPA2 Main article: IEEE 802.11i-2004 WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it introduces CCMP ( Counter Cipher Mode with Block Chaining Message Authentication Code Protocol ) , a new AES -based encryption mode with strong security. [6] Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. [7] Encryption protocol TKIP (Temporal Key Integrity Protocol)  The RC4 stream cipher is used with a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet. Used by WPA. CCMP   An AES-based encryption mechanism that is stronger than TKIP. Used by WPA2. Among informal names are "AES" and "AES-CCMP". According to the 802.11n specification, this encryption protocol must be used to achieve the fast 802.11n high bitrate schemes , though not all implementations enforce this. [24] Otherwise, the data rate will not exceed 54 MBit/s. EAP extensions under WPA and WPA2 Enterprise In April 2010, the Wi-Fi Alliance announced the inclusion of additional Extensible Authentication Protocol (EAP) [25] types to its certification programs for WPA- and WPA2- Enterprise certification programs. [26] This was to ensure that WPA-Enterprise certified products can interoperate with one another. Previously, only EAP-TLS (Transport Layer Security) was certified by the Wi-Fi alliance. As of 2010 the certification program includes the following EAP types: EAP-TLS (previously tested) EAP-TTLS/MSCHAPv2 (April 2005 [27] ) PEAPv0/EAP-MSCHAPv2 (April 2005) PEAPv1/EAP-GTC (April 2005) PEAP-TLS EAP-SIM (April 2005) EAP-AKA (April 2009 [28] ) EAP-FAST (April 2009)