wireless security a lab that actually works! anne hewitt oscar salazar a lab that actually works!...

12
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar

Upload: loreen-bryan

Post on 18-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

Wireless SecurityWireless Security

A lab that actually works!

Anne HewittOscar Salazar

A lab that actually works!

Anne HewittOscar Salazar

Page 2: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

ComparisonComparison

Monitor unencrypted traffic

Spoof a MAC address

Crack WEP Decrypt encrypted

packets Time: 5-7 hours

Monitor unencrypted traffic

Spoof a MAC address

Crack WEP Decrypt encrypted

packets Time: 5-7 hours

Discover wireless network & clients

Crack WEP Spoof a MAC

address Man in the Middle

Attack Time: 1 hour

Discover wireless network & clients

Crack WEP Spoof a MAC

address Man in the Middle

Attack Time: 1 hour

Page 3: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

Lab SetupLab Setup

Page 4: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

ReconnaissanceReconnaissance

Setup wireless cards on attackers Have Attacker 2 run Kismet to get

information on our wireless network

Setup wireless cards on attackers Have Attacker 2 run Kismet to get

information on our wireless network

Page 5: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar
Page 6: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

Cracking the WEPCracking the WEP

Attacker 2 runs Airodump to collect packets

Attacker 1 injects packets and replays them to generate a lot of packets using Aireply

Attacker 2 runs Aircrack-ptw to crack the WEP

Attacker 2 runs Airodump to collect packets

Attacker 1 injects packets and replays them to generate a lot of packets using Aireply

Attacker 2 runs Aircrack-ptw to crack the WEP

Page 7: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar
Page 8: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar
Page 9: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

MAC Address SpoofingMAC Address Spoofing

Attack MACs are blocked due to previous suspicious activity. Must change to get access to the network

Attack MACs are blocked due to previous suspicious activity. Must change to get access to the network

Page 10: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

Man in the Middle AttackMan in the Middle Attack

Attacker 1 uses Ettercap to perform a Man in the Middle attack

WireShark is used to snoop traffic

Attacker 1 uses Ettercap to perform a Man in the Middle attack

WireShark is used to snoop traffic

Page 11: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar
Page 12: Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar

DefensesDefenses

Use WPA password with a long, complex password.

Use with a combination of other security measure with WPA

Change default router login and password

Disable remote login to router

Use WPA password with a long, complex password.

Use with a combination of other security measure with WPA

Change default router login and password

Disable remote login to router