140 likes | 148 Views
Basically, a group of computers connected together with various wires is called a network. Similarly, a group of computers connected together with the help of radio waves in a limited space is called a wireless network.<br><br>https://www.infosectrain.com/courses/ceh-v11-certification-training/<br>
E N D
CEH v11 DOMAIN 6 Wireless Network Hacking www.infosectrain.com
Domains of CEH DOMAIN 1 Information Security & Ethical Hacking Overview DOMAIN 9 DOMAIN 2 Reconnaissance Techniques 6% Cryptography 21% 6% DOMAIN 3 System hacking phases & Attack Techniques DOMAIN 8 CEH v11 DOMAINS 17% 6% Cloud Computing DOMAIN 7 DOMAIN 4 Network and perimeter hacking 8% 14% Mobile platform, IoT, & OT hacking 16% 6% DOMAIN 6 DOMAIN 5 Web application hacking Wireless network hacking www.infosectrain.com | sales@infosectrain.com 01
DOMAIN 6 Wireless Network Hacking In this blog, we will discuss the 6th domain of CEH, which is‘Wireless Network Hacking’ What is a Wireless Network? Basically, a group of computers connected together with various wires is called a network. Similarly, a group of computers connected together with the help of radio waves in a limited space is called a wireless network. One of the best advantages of using a wireless network is the devices within a network can move from one location/area to another, yet they can share the data and stay connected with the services in the network. The second and best advantage of using a wireless network is that installing it is very cheap and faster than installing a wired network. www.infosectrain.com | sales@infosectrain.com 02
DOMAIN 6 Wireless Network Hacking Advantages of using a wireless network There are various advantages of using a wireless network. A few of them are: > Accessibility Wireless networks do not require any wired connection so that users can communicate and connect even when they are not at the same location. For example, we can access our office networks without cables and adapters just by using wireless networks. > Cost-effective Using wireless networks is cost-effective because installing them is way cheaper than installing wired networks. > Flexible In this pandemic, without these wireless networks, there wouldn’t have been any possibility of Work From Home. In my opinion, the flexibility of wireless networks is the only thing that is saving the corporate world. Even though there are many advantages, there is one big disadvantage that may entirely ruin the reputation of wireless networks, and that is security. Yes, though these wireless networks are cost-effective, flexible, and accessible from anywhere, they are less secure when compared to wired networks. Wireless networks are easy to attack, so we must be very conscious while using them. When you are using a wireless network, try to avoid public connections. For example, assume you went to a mall, and for Wi-Fi, we will register as a guest user on the public network. This can attract many attackers. A pro-life tip Instead of logging in as a guest user, using your mobile data is a safer way. www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: > Kismet > Wi-Fi phisher > inSSIDer > Aircrack-ng www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 6 Wireless Network Hacking Kismet Kismet is a packet sniffer, network detector, and intrusion detection system for 802.11 LANs. Kismet works for Bluetooth, SDRs, Wi-Fi, and other wireless protocols. The main job of Kismet is to gather the data packets traveling in its environment and use them to detect hidden Wi-Fi networks so that attackers can exploit them. www.infosectrain.com | sales@infosectrain.com 05
DOMAIN 6 Wireless Network Hacking Wi-Fi phisher Wi-Fi phisher is a tool used by attackers to install automated phishing attacks against Wi-Fi networks to obtain user credentials. Wi-Fi phisher is a social engineering attack that doesn’t require brute force, unlike any other attacking method. www.infosectrain.com | sales@infosectrain.com 06
DOMAIN 6 Wireless Network Hacking inSSIDer inSSIDer is a popular Wi-Fi scanner for Microsoft Windows, and OS X. InSSIDer can function as a Wi-Fi scanner, and it can find open wireless access points, measure the signal strength, and save a log with GPS data. www.infosectrain.com | sales@infosectrain.com 07
DOMAIN 6 Wireless Network Hacking Aircrack-ng Aircrack-ng is one of the finest password cracking tools. Aircrack-ng analyses the network packets and cracks the network password. FMS, PTW, Korek, and other WEP password attacks are supported by Aircrack-ng. www.infosectrain.com | sales@infosectrain.com 08
DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: > Social Engineering > Chatty technicians > Garbage collecting/dumpster diving www.infosectrain.com | sales@infosectrain.com 09
DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: Social Engineering Social engineering is nothing other than a cybersecurity threat, a type of intrusion that takes advantage of the weakness in your human workforce or security system to gain access to the company’s network. Hackers manipulate employees, even senior staff, with complicated emotional and trickery manipulations to get an organization’s sensitive information. www.infosectrain.com | sales@infosectrain.com 10
DOMAIN 6 Wireless Network Hacking Chatty Technicians If you are using a system or network for your personal jobs at home, you may usually think you are less prone to cyberattacks. That is when you believe everyone who messages or calls you as technical support. For example, you may receive calls from unknown people posing as bank employees, and when they ask for your credentials, you will simply believe them and hand over your credentials to them. That is how attackers can get your sensitive data. www.infosectrain.com | sales@infosectrain.com 11
DOMAIN 6 Wireless Network Hacking Garbage Collecting/Dumpster Diving Have you ever thrown away your credit card statement into a trash bin without shredding it? and left the place with full conviction that attackers would not take that information because it is a garbage area? That is where you went wrong. Attackers who use social engineering techniques usually check the trash around companies for unshredded credit card statements from which they can get your sensitive bank information. www.infosectrain.com | sales@infosectrain.com 12