1 / 14

Domain 6 of CEH: Wireless Network Hacking

Basically, a group of computers connected together with various wires is called a network. Similarly, a group of computers connected together with the help of radio waves in a limited space is called a wireless network.<br><br>https://www.infosectrain.com/courses/ceh-v11-certification-training/<br>

Download Presentation

Domain 6 of CEH: Wireless Network Hacking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CEH v11 DOMAIN 6 Wireless Network Hacking www.infosectrain.com

  2. Domains of CEH DOMAIN 1 Information Security & Ethical Hacking Overview DOMAIN 9 DOMAIN 2 Reconnaissance Techniques 6% Cryptography 21% 6% DOMAIN 3 System hacking phases & Attack Techniques DOMAIN 8 CEH v11 DOMAINS 17% 6% Cloud Computing DOMAIN 7 DOMAIN 4 Network and perimeter hacking 8% 14% Mobile platform, IoT, & OT hacking 16% 6% DOMAIN 6 DOMAIN 5 Web application hacking Wireless network hacking www.infosectrain.com | sales@infosectrain.com 01

  3. DOMAIN 6 Wireless Network Hacking In this blog, we will discuss the 6th domain of CEH, which is‘Wireless Network Hacking’ What is a Wireless Network? Basically, a group of computers connected together with various wires is called a network. Similarly, a group of computers connected together with the help of radio waves in a limited space is called a wireless network. One of the best advantages of using a wireless network is the devices within a network can move from one location/area to another, yet they can share the data and stay connected with the services in the network. The second and best advantage of using a wireless network is that installing it is very cheap and faster than installing a wired network. www.infosectrain.com | sales@infosectrain.com 02

  4. DOMAIN 6 Wireless Network Hacking Advantages of using a wireless network There are various advantages of using a wireless network. A few of them are: > Accessibility Wireless networks do not require any wired connection so that users can communicate and connect even when they are not at the same location. For example, we can access our office networks without cables and adapters just by using wireless networks. > Cost-effective Using wireless networks is cost-effective because installing them is way cheaper than installing wired networks. > Flexible In this pandemic, without these wireless networks, there wouldn’t have been any possibility of Work From Home. In my opinion, the flexibility of wireless networks is the only thing that is saving the corporate world. Even though there are many advantages, there is one big disadvantage that may entirely ruin the reputation of wireless networks, and that is security. Yes, though these wireless networks are cost-effective, flexible, and accessible from anywhere, they are less secure when compared to wired networks. Wireless networks are easy to attack, so we must be very conscious while using them. When you are using a wireless network, try to avoid public connections. For example, assume you went to a mall, and for Wi-Fi, we will register as a guest user on the public network. This can attract many attackers. A pro-life tip Instead of logging in as a guest user, using your mobile data is a safer way. www.infosectrain.com | sales@infosectrain.com 03

  5. DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: > Kismet > Wi-Fi phisher > inSSIDer > Aircrack-ng www.infosectrain.com | sales@infosectrain.com 04

  6. DOMAIN 6 Wireless Network Hacking Kismet Kismet is a packet sniffer, network detector, and intrusion detection system for 802.11 LANs. Kismet works for Bluetooth, SDRs, Wi-Fi, and other wireless protocols. The main job of Kismet is to gather the data packets traveling in its environment and use them to detect hidden Wi-Fi networks so that attackers can exploit them. www.infosectrain.com | sales@infosectrain.com 05

  7. DOMAIN 6 Wireless Network Hacking Wi-Fi phisher Wi-Fi phisher is a tool used by attackers to install automated phishing attacks against Wi-Fi networks to obtain user credentials. Wi-Fi phisher is a social engineering attack that doesn’t require brute force, unlike any other attacking method. www.infosectrain.com | sales@infosectrain.com 06

  8. DOMAIN 6 Wireless Network Hacking inSSIDer inSSIDer is a popular Wi-Fi scanner for Microsoft Windows, and OS X. InSSIDer can function as a Wi-Fi scanner, and it can find open wireless access points, measure the signal strength, and save a log with GPS data. www.infosectrain.com | sales@infosectrain.com 07

  9. DOMAIN 6 Wireless Network Hacking Aircrack-ng Aircrack-ng is one of the finest password cracking tools. Aircrack-ng analyses the network packets and cracks the network password. FMS, PTW, Korek, and other WEP password attacks are supported by Aircrack-ng. www.infosectrain.com | sales@infosectrain.com 08

  10. DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: > Social Engineering > Chatty technicians > Garbage collecting/dumpster diving www.infosectrain.com | sales@infosectrain.com 09

  11. DOMAIN 6 Wireless Network Hacking Tools used for Wireless Hacking: Social Engineering Social engineering is nothing other than a cybersecurity threat, a type of intrusion that takes advantage of the weakness in your human workforce or security system to gain access to the company’s network. Hackers manipulate employees, even senior staff, with complicated emotional and trickery manipulations to get an organization’s sensitive information. www.infosectrain.com | sales@infosectrain.com 10

  12. DOMAIN 6 Wireless Network Hacking Chatty Technicians If you are using a system or network for your personal jobs at home, you may usually think you are less prone to cyberattacks. That is when you believe everyone who messages or calls you as technical support. For example, you may receive calls from unknown people posing as bank employees, and when they ask for your credentials, you will simply believe them and hand over your credentials to them. That is how attackers can get your sensitive data. www.infosectrain.com | sales@infosectrain.com 11

  13. DOMAIN 6 Wireless Network Hacking Garbage Collecting/Dumpster Diving Have you ever thrown away your credit card statement into a trash bin without shredding it? and left the place with full conviction that attackers would not take that information because it is a garbage area? That is where you went wrong. Attackers who use social engineering techniques usually check the trash around companies for unshredded credit card statements from which they can get your sensitive bank information. www.infosectrain.com | sales@infosectrain.com 12

  14. www.infosectrain.com | sales@infosectrain.com

More Related