wireless network hacking. authentication techniques 1. open system: no security techniques 2....
TRANSCRIPT
CHAPTER 10
Wireless Network Hacking
Authentication & Cracking Techniques
Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge
with WEP key WEP: RC4 64-bit or 128-bit
40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack
WPA: TKIP for encryption WPA2: AES for encryption
TKIP
Per packet key mixing rekeying mechanism message integrity check (MIC)
IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed
Wireless Hacking Tools
Wardriving, Warwalking, Warflying, etc.
Aircrack: Windows and Linux
WEPCrack: Linux
AirSnort: Linux
NetStumbler: Windows Includes GPS to map WAPs
Kismet: Linux
Sniffing for SSID
http://www.youtube.com/watch?v=jETwvEDaJeQ
http://www.youtube.com/watch?v=6RIUOoMdkv8
http://www.youtube.com/watch?v=BaDUw8WZx5A
MAC Filters / MAC Spoofing Used to bypass MAC filtering on WAP Tools
SMAC
Rogue APs Rogue WAP Evil Twin / AP Masquerading
Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler
Wireless Hacking Techniques
Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps
http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html
Securing Wireless
Change default settings
Use WEP / WPA encryption
Enable firewall settings
Reduce WLAN transmitter power
Disable remote administration
Cracking WPA / WPA2 http://
www.youtube.com/watch?v=u-dqi23oaS8