1 / 10

Chapter 10

Chapter 10. Wireless Network Hacking. Authentication & Cracking Techniques. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP key WEP: RC4 64-bit or 128-bit 40-bit or 104-bit with 24-bit IV

yamin
Download Presentation

Chapter 10

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 10 Wireless Network Hacking

  2. Authentication & Cracking Techniques • Authentication Techniques • 1. Open System: no security techniques • 2. Shared-Key: uses hashed string challenge with WEP key • WEP: RC4 64-bit or 128-bit • 40-bit or 104-bit with 24-bit IV • Open to FMS (Fluhrer, Marntin, Shamir) attack • WPA: TKIP for encryption • WPA2: AES for encryption

  3. TKIP • Per packet key • mixing • rekeying mechanism • message integrity check (MIC) • IV increased to 48 bits • Over 500 Trillion keystreams possible • IV are hashed

  4. Wireless Hacking Tools • Wardriving, Warwalking, Warflying, etc. • Aircrack: Windows and Linux • WEPCrack: Linux • AirSnort: Linux • NetStumbler: Windows • Includes GPS to map WAPs • Kismet: Linux

  5. Sniffing for SSID • http://www.youtube.com/watch?v=jETwvEDaJeQ • http://www.youtube.com/watch?v=6RIUOoMdkv8 • http://www.youtube.com/watch?v=BaDUw8WZx5A

  6. MAC Filters / MAC Spoofing • Used to bypass MAC filtering on WAP • Tools • SMAC

  7. Rogue APs • Rogue WAP • Evil Twin / AP Masquerading • Tools to generate fake WAPs • Fakeap • Netstumbler • MiniStumbler

  8. Wireless Hacking Techniques • Eavesdropping / Sniffing • DoS • AP Masquerading / Spoofing • MAC Spoofing • Planting Rogue Aps • http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html

  9. Securing Wireless • Change default settings • Use WEP / WPA encryption • Enable firewall settings • Reduce WLAN transmitter power • Disable remote administration

  10. Cracking WPA / WPA2 • http://www.youtube.com/watch?v=u-dqi23oaS8

More Related