wireless network hacking. authentication techniques 1. open system: no security techniques 2....

Post on 03-Jan-2016

216 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

CHAPTER 10

Wireless Network Hacking

Authentication & Cracking Techniques

Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge

with WEP key WEP: RC4 64-bit or 128-bit

40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack

WPA: TKIP for encryption WPA2: AES for encryption

Bode, James

TKIP

Per packet key mixing rekeying mechanism message integrity check (MIC)

IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed

Wireless Hacking Tools

Wardriving, Warwalking, Warflying, etc.

Aircrack: Windows and Linux

WEPCrack: Linux

AirSnort: Linux

NetStumbler: Windows Includes GPS to map WAPs

Kismet: Linux

Bode, James

MAC Filters / MAC Spoofing Used to bypass MAC filtering on WAP Tools

SMAC

Bode, James

Rogue APs Rogue WAP Evil Twin / AP Masquerading

Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler

Bode, James

Wireless Hacking Techniques

Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps

http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html

Bode, James

Securing Wireless

Change default settings

Use WEP / WPA encryption

Enable firewall settings

Reduce WLAN transmitter power

Disable remote administration

Bode, James

Cracking WPA / WPA2 http://

www.youtube.com/watch?v=u-dqi23oaS8

Bode, James

top related