Wireless Security
Wireless Security
Wireless Security
BY
C H E TA N S O N I , C D A C - M O H A L I
CYBER SECURITY EXPERT
“ W E A R E E N L I G H T E N M E N T T O S O M E , N I G H T M A R E T O O T H E R S .”
Are you protected from hackers from public Wi-Fi
2) Why do we need?
Facilitates mobility – You can use lengthy wires instead, but someone
might trip over them.
3) Why security?
Attacker may hack a victim’s personal computer and steal private data
or may perform some illegal activities or crimes using the victim’s
machine and ID.
Maximum
Standard Frequency rate Modulation method
802.11 2.4 GHz 1 or 2 Mbps FHSS/DSSS
802.11a 5 GHz 54 Mbps OFDM
802.11b 2.4 GHz 11 Mbps DSSS
802.11g 2.4 GHz 54 Mbps OFDM
802.11n 2.4 GHz 600 Mbps OFDM
802.15 2.4 GHz 2 Mbps FHSS
802.16 (WiMAX) 10–66 GHz 120 Mbps OFDM
802.20 (Mobile Wireless Access Working Below 3.5 1 Mbps OFDM
Group) GHz
Bluetooth 2.4 GHz 12 Mbps Gaussian frequency shift keying
(GFSK)
HiperLAN/2 5 GHz 54 Mbps OFDM
802.11 Overview
• Encryption:-
– 40 / 64 bits (40+24 = 64)
– 104 / 128 bits (104+24 = 128)
– 232 / 256 bits (232 + 40 = 256)
24 bits are used for IV (Initialization vector).
Key Renewal:
You can choose a Key Renewal period, which instructs the device how
often it should change encryption keys. The default is 3600 seconds.
How to break WPA/WPA2 Encryption
Encryption Attributes
A service set identifier (SSID) is the name used to identify a WLAN, much
the same way a workgroup is used on a Windows network.
Many vendors have SSIDs set to a default value that companies never
change.
For example, Cisco APs use the default SSID “tsunami.” shows some
default SSIDs as of this writing, but this list changes often, sometimes
daily.
Default SSIDs
1. War Driving
2. Rogue Access Points
3. AP Misconfiguration
4. MAC Spoofing
5. Ad-Hoc Associations
6. Unauthorized Associations
7. Client Mis-association
Wireless Threats: Integrity Attacks
1. Eavesdropping
2. Honeypot Access Point
3. Traffic Analysis
4. Cracking WEP key
5. Evil Twin AP
6. Session Hijacking
7. MITM (Man in the Middle Attack)
Wireless Threats: Availability Attacks
1. PSK Cracking
2. LEAP Cracking
3. VPN Login Cracking
4. Domain Login Cracking
5. Identity Theft
6. Shared Key Guessing
7. Password Speculation
8. Application Login Theft
Wireless Hacking Methodology
GPS Mapping
InSSIDer
NetSurveyor
Vistumbler
NetStumbler
WirelessMon
Kismet
Wi-Fi Hopper
Wavestumbler
iStumbler
Wi-Finder
AirRadar
Attacking Tools/Packages
• airmon – a tool that can help you set your wireless adapter into monitor
mode (mon0)
• airodump – a tool for capturing packets from a wireless router (otherwise
known as an AP)
• aireplay – a tool for forging ARP requests
• airbase – Used to create fake AP.
• aircrack – a tool for decrypting WEP keys
and many more….
Aircrack-ng
As a security professional, your job is to protect a network and make it difficult for
attackers to break in. You might like to believe you can completely prevent
attackers from breaking in, but unfortunately, this goal is impossible.
AirSnort was the first widely used WEP-cracking program and woke up
nonbelievers who thought WEP was enough protection for a WLAN.
Aircrack NG took up where AirSnort (and the slightly older WEPCrack) left off.
Defend – when you are using WEP
Use longer WEP encryption keys, which makes the data analysis task
more difficult.
If your WLAN equipment supports 128-bit WEP keys.
Change your WEP keys frequently. There are devices that support
"dynamic WEP" which is off the standard but allows different WEP
keys to be assigned to each user.
Use a VPN for any protocol, including WEP, that may include sensitive
information.
Aircrack-ng
Reaver
Pixiewps
Wifite
Wireshark
Oclhashcat
Fern Wifi Cracker
Wash
Crunch
MAC Spoofing Attack
Commands -
Ifconfig wlan0 down
Ifconfig wlan0 hw ether 00:11:22:33:44:55
Ifconfig wlan0 up
================
==============
Important Terms
REQUIREMENTS –
Mail at [email protected]