840 likes | 1.01k Views
Week #4. CMGT/441 Intro. to Information Systems Security Management. Hacking Wireless Networks. Philip Robbins – December 19, 2013. Information Technology University of Phoenix Kapolei Learning Center. 1. Topics Understanding Wireless Technology & Standards Tools
E N D
Week #4 CMGT/441 Intro. to Information Systems Security Management Hacking Wireless Networks Philip Robbins – December 19, 2013 Information TechnologyUniversity of Phoenix Kapolei Learning Center 1
Topics • Understanding Wireless Technology & Standards • Tools • Hacking WEP, WPA, WPA2 • Uncovering SSIDs • Bypassing MAC Address Filtering • De-Authentication & Mis-Association • Review Q&A • Quiz #4 Hacking Wireless Networks 2
Understanding Wireless Standards • IEEE 802.11 • IEEE came up the 802.11 standard for wireless ethernet. • OSI Layers 1 & 2 • 79 channels, 2.4 to 2.4835 GHz (USA) • Half Duplex • CSMA/CA (Avoidance) v.s. CSMA/CD (Detection) • Modulation Techniques 4
Understanding Wireless Standards • Center Frequency & Channels for 2.4 GHz 5
Understanding Wireless Standards • 4 Way Handshake 6
Understanding Wireless Standards • 802.11 Standards 7
Tools • Alfa AWUSO36H WiFi Network Adapter 9
Tools • Alfa AWUSO36H WiFi Network Adapter 10
Tools • Alfa AWUSO36H WiFi Network Adapter 30dBm = 1W 11
Tools • Netgear Wireless Router 12
Tools • Netgear Wireless Router TARGET AP 13
Tools • Netgear Wireless Router TARGET 192.168.1.1 14
Tools / Configuration “password” 15
Tools / Configuration Forgot the password for your router? …or your neighbors? 16
Tools / Configuration “password” WEP CONFIGURATION 17
Tools / Configuration Authentication? 19
Tools / Configuration WPA CONFIGURATION 20
Tools / Configuration “password” 22
Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use. 4… 1 3 2 http://www.backtrack-linux.org/downloads/ 23
Tools 24
Tools 25
Tools 26
Tools 27
Tools AirSnort replacement. 28
Understanding Wireless Technology • Wi-Fi Protected Access (WPA) • Touted as a step up from WEP • Weak passphrases renders the protection inadequate • False sense of security • Network Sniffers • TKIP v.s. AES 29
Cracking WPA 30
Cracking WPA 31
Cracking WPA 32
r Cracking WPA 33
r Cracking WPA 34
Cracking WPA 35
r Cracking WPA 36
r Cracking WPA 37
Cracking WPA 38
r Cracking WPA 39
r Cracking WPA 40
Cracking WPA 41
Cracking WPA 42
Cracking WPA Can take a few hours to go through 1+ million keys… 43
Cracking WPA 44
Cracking WPA 45
Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 46
Understanding Wireless Technology • Wired Equivalent Privacy (WEP) • Confidentiality • Access Control • Data Integrity • In reality, none of these are actually enforced! 47
Understanding Wireless Technology • Wired Equivalent Privacy (WEP) Keystream 40 bits 24 bits 64-bit Keyspace (2^64 keys) 128-bit Keyspace (2^128 keys) Stream Cipher using XOR 48
Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 49
Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 50