1 / 17

Wireless Sniffer 실습 Outline: Network Environment, Packet Capturing, Wireless LAN Security, Hacking Episode, War Driving

Learn about packet capturing, data link layer, wireless LAN security, hacking episodes, weaknesses, and war driving in both wired and wireless network environments. Understand the use of traffic analyzers and the FON community. Discover methodologies for wireless packet capturing and analyze MAC address behavior. Explore wireless LAN vulnerabilities, security hacks, and weaknesses. Get hands-on experience with tools like WinPCAP and Ethereal for network analysis.

dangelol
Download Presentation

Wireless Sniffer 실습 Outline: Network Environment, Packet Capturing, Wireless LAN Security, Hacking Episode, War Driving

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Sniffer 실습

  2. Outline • Network environment • Wired/Wireless • Packet Capturing • Data Link Layer의 동작 • Wireless LAN Security • Hacking Episode • Weakness • War Driving • FON Community • Traffic Analyzer 사용법 • 실습

  3. Wired LAN Environment Internet Gateway Router Dummy HUB PC A PC D PC B PC C

  4. Wireless LAN Environment Laptop A Internet AP Laptop B Laptop B의 전파 범위 Laptop D Laptop C

  5. Data Link Layer Procedure • Wired LAN • Promiscuous mode • Non-promiscuous mode • Wireless LAN • Normal mode • Monitoring mode Physical Layer Data Link Layer Upper Layer MAC address 일치 MAC address 불일치 Data Link Layer에서의 동작

  6. Wireless LAN Security- Hacking Episode(1/3) • The Parking Lot Attacker A Firewall Attacker B Intra Network

  7. Wireless LAN Security- Hacking Episode(2/3) • Up in the air Packet 수집 Attacker WEP Key 추출

  8. Wireless LAN Security- Hacking Episode(3/3) • Accidental Tourist Tourist Attacker Public Network Company Network

  9. Wireless LAN Weakness • 취약점 • 물리적인 보안이 이루어지지 않는다 • WEP(Wired Equivalent Privacy)의 취약성 • 100MB에서 1GB 분량의 packet 수집시 key 추출 가능 • 다수의 hacking utility • Airsnort : http://airsnort.shmoo.com • WEPCrack : http://sourceforge.net/projects/wepcrack • 대안 • IEEE 802.1x • IPSEC

  10. War Driving (1/3) • 의미 • 특정 지역의 AP등 무선 랜 기기의 위치를 지도화하는 것 • 참고 • http://www.nodedb.org/unitedstates/or/portland • http://www.pasadena.net/apmap/ 서울 서부에서 인천 동부 지도 강남 일대 지도

  11. War Driving(2/3) Passive Probing • 방법 • Active Probing • Probe Request • Probe Response • ESSID • Etc • Passive Probing • RFMON(Radio Frequency Monitoring)

  12. War Driving(3/3) • Cantenna • 내장된 antenna는 넓은 범위의 미세한 신호를 수신하기에 부적합 • 외장 antenna 필요 • 참조 • http://www.oreillynet.com/cs/weblog/view/wlg/448 • http://www.radio-active.net.au/web/80211/pringles.html • http://www.radio-active.net.au/web/80211/betterpringles.html • http://www.turnpoint.net/wireless/has.html • http://me.jeremiahwhite.com/pringles.html

  13. FON WiFi Community • FON • 세계 최대 WiFi 커뮤니티 • “집에서 이미 지불하고 있는 인터넷 접속료를 왜 집 밖에서 인터넷 접속을 할 때마다 따로 지불해야 하는가?” • 집에서 WiFi를 공유하는 대신 집 밖에서 다른회원이 공유하는 FON에 무료로 접속할 수 있다 참고: http://www.fon.com/kr/info/whatsFon FON 공유기

  14. Tools Introduction(1/2) • WinPCAP(Windows Packet CAPture library) • Win32 platform용 packet capture tool • Network analyze library • 오픈 소스 • libPCAP(UNIX library)의 windows 버전 • http://www.winpcap.org

  15. Tools Introduction(2/2) • Ethereal • 가장 대표적인 Network Analyzer • IEEE 802.11abg 지원 • 오픈 소스 • 강력한 필터 기능이 특징 • WinPCAP library와 driver 이용 • http://www.ethereal.com • AiroPeek(OmniPeek) • Wireless traffic analyzer로 유명하다 • IEEE 802.11abgn, VoIP 지원 • GUI와 graphic indicator로 사용법이 쉽다 • WinPCAP library와 driver 이용 • http://www.wildpackets.com

  16. Wireless Packet Capture Non-promiscuous mode로 capture해야함 Interface 관련 설정 Capture시 적용 filter Capture를 저장할 파일 Capture 종료 컨디션 <Capture Options 설정화면>

  17. 실습 • 전자정보관 실습실 복도의 War Driving Map을 작성해보자 • NESPOT login시 packet을 capture해보고 어떤 protocol을 쓰는지, 어떤 인증 방식으로 login을 하는지에 대해 추론해보자

More Related