wireless network hacking. authentication techniques 1. open system: no security techniques 2....

10
CHAPTER 10 Wireless Network Hacking

Upload: brent-fisher

Post on 03-Jan-2016

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

CHAPTER 10

Wireless Network Hacking

Page 2: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Authentication & Cracking Techniques

Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge

with WEP key WEP: RC4 64-bit or 128-bit

40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack

WPA: TKIP for encryption WPA2: AES for encryption

Bode, James
Page 3: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

TKIP

Per packet key mixing rekeying mechanism message integrity check (MIC)

IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed

Page 4: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Wireless Hacking Tools

Wardriving, Warwalking, Warflying, etc.

Aircrack: Windows and Linux

WEPCrack: Linux

AirSnort: Linux

NetStumbler: Windows Includes GPS to map WAPs

Kismet: Linux

Bode, James
Page 6: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

MAC Filters / MAC Spoofing Used to bypass MAC filtering on WAP Tools

SMAC

Bode, James
Page 7: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Rogue APs Rogue WAP Evil Twin / AP Masquerading

Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler

Bode, James
Page 8: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Wireless Hacking Techniques

Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps

http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html

Bode, James
Page 9: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Securing Wireless

Change default settings

Use WEP / WPA encryption

Enable firewall settings

Reduce WLAN transmitter power

Disable remote administration

Bode, James
Page 10: Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP

Cracking WPA / WPA2 http://

www.youtube.com/watch?v=u-dqi23oaS8

Bode, James