Wireless Hacking and Penetratin Testing
Wireless Hacking and Penetratin Testing
Wireless Hacking and Penetratin Testing
Presented By
Harshad Shah
Global Cyber Security Response Team
GCSRT Line of Business (LOB)
Education
Cyber Security
IT-Enabled Services
Key Point:
(i)WIFI-
Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11
specification to create a wireless local-area network that may be secure, such as
an office network, or public, such as a coffee shop
(ii)Cellular-
Most often associated with wireless phones, a cellular network uses connected
transmitters, or cells, that enable the user to move about while remaining in
contact with the network
Module1-(i)What is Wireless Technology?
Module1-(i)What is Wireless Technology?
(iii)Bluetooth-
While both Wi-Fi and cellular networks enable connections to anywhere in
the world, Bluetooth is much more local, with the stated purpose of
"replacing the cables connecting devices," according to the official
Bluetooth website
(iv)WiMAX-
While over-the-air data is fast becoming the realm of cellular providers,
dedicated wireless broadband systems also exist, offering fast Web surfing
without connecting to cable or DSL. One well-known example of wireless
broadband is WiMAX, offered by providers such as Clear or Skyriver.
Although WiMAX can potentially deliver data rates of more than 30
megabits per second, providers offer average data rates of 6 Mbps and
often deliver less, making the service significantly slower than hard-
wired broadband.
Module1-(ii)How Wireless System Communicate?
Module2-Brief Introduction to IEEE 802.11 Standard for
Wireless Technology
Key Point:
(i)Bandwidth-
If you've ever wondered why it takes so long to download certain Web
pages or other files to your computer, it's all determined by the bandwidth
of the connection between your computer and your Internet Service
Provider
Demo-Wireless Geographical Fraud Demo
Demo Time
Key Point :
Interfaces-
Lo-Loopback-
loopback interface is a virtual interface that resides on a router.
It is not connected to any other device. Loopback interfaces are
very useful because they will never go down, unless the entire
router goes down
Eth0 ethernet cable(Wired Connection)
Wlan0-Wireless Local Area Network(Wireless)
Mac Address-
Module3-(ii)Learn About Mac Address and Finding Mac
Address of Access Point
Mac Address-
Finding Mac Address of Access Point
SSID-
#iwlist wlan0 scanning<run this Command in
Backtrack)
SSID stands for Service Set Identifier
BSSID Basic Service Set Identifier
Demo Time-
#iwlist wlan0 scanning<run this Command in
Backtrack)
Showning SSID/BSSID/Beacon Frame/Access Point
Module4-Brief Introduction to Wireless Network
Key Point:
command#iwconfig
command#iwconfig wlan0 up <to bring Interface up>
command#iwconfig wlan0 <see the Current status of Interface
Command#iwlist wlan0 scanning <you fill list of Network in your
Infrastructure
Module5-Brief Introduction to Signal and Electromagnetic
Wave and RF(Radio Frequency Wave)
(i)Signal
In electronics, a signal is an electric current or electromagnetic field used to
convey data from one place to another
Module5-Brief Introduction to Signal and Electromagnetic
Wave and RF(Radio Frequency Wave)
(ii)Electromagnetic Wave:
Electromagnetic radiation (EM radiation or EMR) is a fundamental
phenomenon of electromagnetism, behaving as waves and also as particles
called photons which travel through space carrying radiant energy. In a
vacuum, it propagates at the speed of light, normally in straight lines
Module5-Brief Introduction to Signal and Electromagnetic
Wave and RF(Radio Frequency Wave)
Key Point:
(i)Router-
When a data packet comes in one of the lines, the router reads the
address information in the packet to determine its ultimate destination.
Then, using information in its routing table or routing policy
Module6-Configuring Wireless Router
AD-HOC Network
AD-HOC Network
Module8-Brief Introduction to Wireless Hacking and
Penetration Testing
Key Point:
Key Point:
Key Point:
Key Point:
Key Point:
Key Point:
What is Sniffing?
wireless sniffer is a type of packet analyzer. A packet analyzer (also known as packet sniffer) is
a piece of software or hardware designed to intercept data as it is transmitted over a network
and decode the data into a format that is readable for humans.
Diagnosing and investigating network problems
Monitoring network usage, activity, and security
Discovering network misuse, vulnerabilities, malware, and attack attempts
Filtering network traffic
Identifying configuration issues and network bottlenecks
Module12-Brief Introduction to Wireshark and Tshark
What is Wireshark?
wireless sniffer is a type of packet analyzer. A packet analyzer (also known as packet sniffer) is
a piece of software or hardware designed to intercept data as it is transmitted over a network
and decode the data into a format that is readable for humans.
Diagnosing and investigating network problems
Monitoring network usage, activity, and security
Module12-Brief Introduction to Wireshark and Tshark
Wireshark<Demo Time>
Capturing Packet with Wireshark
Module13-ByPass Mac Security
Key Point:
Module15-What is WEP based Authentiction and how to crack WEP
based Authentication
Key Point:
WEP has three settings: Off (no security), 64-bit (weak security), 128-
bit (a bit better security). WEP is not difficult to crack, and using it
reduces performance slightly.
If you run a network with only the default security, where WEP is
turned off, any of your neighbors can immediately log on to your
network and use your Internet connection.
For wireless devices to communicate, all of them must use the same
WEP setting. (40-bit and 64-bit WEP encryption are the same thing —
40-bit devices can communicate with 64-bit devices..
Module15-What is WEP based Authentiction and how to crack WEP
based Authentication
Module16-What is WPA/WPA2-PSK based authentication and how to
crack WPA/WPA2-PSK based Authentication
Key Point:
Module16-What is WPA/WPA2-PSK based authentication and how to
crack WPA/WPA2-PSK based Authentication
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security
protocols and security certification programs developed by the Wi-Fi Alliance to secure
wireless computer networks
WPA-
The WPA protocol implements much of the IEEE 802.11i standard.
Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for WPA. WEP used
a 40-bit or 104-bit encryption key that must be manually entered on wireless access points
and devices and does not change. TKIP employs a per-packet key, meaning that it
dynamically generates a new 128-bit key for each packet and thus prevents the types of
attacks that compromised WEP.
Module17-What is WPA/WPA2-PSK based authentication and how to
crack WPA/WPA2-PSK based Authentication
WPA2
WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi
Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it introduces
CCMP, a new AES-based encryption mode with strong security.
WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark.
Encryption protocol
CCMP (Counter Cipher Mode with block chaining message authentication code Protocol)
An AES-based encryption mechanism that is stronger than TKIP. Used by WPA2. Among
informal names are "AES" and "AES-CCMP". According to the 802.11n specification,
Module17-What is WPA/WPA2-PSK based authentication and how to
crack WPA/WPA2-PSK based Authentication
WPA2-PSK
Cracking WPA/WPA2-PSK
Issue18-Man-in-the-middle Attack over Wireless Network
Kick off any Wireless Network which are inside or outside doesn't
matter.
Session Hijacking -
In computer science, session hijacking, sometimes also known as cookie hijacking is the
exploitation of a valid computer session—sometimes also called a session key—to gain
unauthorized access to information or services in a computer system.
Module22-Session Hijacking Technique Over Wireless Network
Session Hijacking
Demo time<Implement Session Hijacking on wireless
Network
Module23-Introduction to Radius Server
RADIUS Server
Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is
often used by ISPs and enterprises to manage access to the Internet or internal networks,
wireless networks, and integrated e-mail services.
Module23-Introduction to Radius Server
RADIUS Server
Thank You
Presented By
Harshad Shah
Global Cyber Security Response Team
Few of the achievements listed below
Successfully cracked many complex cyber crime cases and practically have
demonstrated the loop hole in the cyber space in most of the top media
channels, like TV9, Suvarna News 24X7, Public TV, News 9 and etc...
Successfully restored the BBMP & BJP website , which was hacked
Why GCSRT?
Well Trained & experienced team that are always put through
continuous Training practices to effectively handle today’s IT demand