100 likes | 267 Views
Chapter 10. Wireless Network Hacking. Authentication & Cracking Techniques. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP key WEP: RC4 64-bit or 128-bit 40-bit or 104-bit with 24-bit IV
E N D
Chapter 10 Wireless Network Hacking
Authentication & Cracking Techniques • Authentication Techniques • 1. Open System: no security techniques • 2. Shared-Key: uses hashed string challenge with WEP key • WEP: RC4 64-bit or 128-bit • 40-bit or 104-bit with 24-bit IV • Open to FMS (Fluhrer, Marntin, Shamir) attack • WPA: TKIP for encryption • WPA2: AES for encryption
TKIP • Per packet key • mixing • rekeying mechanism • message integrity check (MIC) • IV increased to 48 bits • Over 500 Trillion keystreams possible • IV are hashed
Wireless Hacking Tools • Wardriving, Warwalking, Warflying, etc. • Aircrack: Windows and Linux • WEPCrack: Linux • AirSnort: Linux • NetStumbler: Windows • Includes GPS to map WAPs • Kismet: Linux
Sniffing for SSID • http://www.youtube.com/watch?v=jETwvEDaJeQ • http://www.youtube.com/watch?v=6RIUOoMdkv8 • http://www.youtube.com/watch?v=BaDUw8WZx5A
MAC Filters / MAC Spoofing • Used to bypass MAC filtering on WAP • Tools • SMAC
Rogue APs • Rogue WAP • Evil Twin / AP Masquerading • Tools to generate fake WAPs • Fakeap • Netstumbler • MiniStumbler
Wireless Hacking Techniques • Eavesdropping / Sniffing • DoS • AP Masquerading / Spoofing • MAC Spoofing • Planting Rogue Aps • http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html
Securing Wireless • Change default settings • Use WEP / WPA encryption • Enable firewall settings • Reduce WLAN transmitter power • Disable remote administration
Cracking WPA / WPA2 • http://www.youtube.com/watch?v=u-dqi23oaS8