By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking.

13
By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking

Transcript of By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking.

ByVamseedhar Vuppu005228822

The Secrets of Wireless Hacking

Agenda

• 802.11 Wireless Standard• Encryption Schemes• Wardriving• Tools used for wardriving• Attacking 802.11networks• Tools used• Defenses• Conclusion

802.11 wireless standard

• IEEE 802.11is a set of standards for WLAN

Different 802.11 Standards

Encryption Schemes

• WEP(Wired Equivalent Privacy)

- First scheme for securing 802.11

• WAP AND WAP2(Wi-Fi Protected Access)

- Standard schemes used today

• WAP-PSK (Pre-shared key)

- Used in home and small office networks

Wardriving Tools

• Tools used in different platforms

NetStumbler

• Tool used in windows

Attacking 802.11 networks

• Note: Hacking other’s network without the permission of network owner is illegal [2].

• Penetration Testing tools are used

• Powerful Tool is BackTrack2

-Linux live distribution for pen testing

-Voted as #1 tool for pen testing[3]

-more than 300 security tools

Backtrack2

Defenses

• Minimize signal exposure

• SSID (Network name)

- Broadcasting SSID

- Not broadcasting SSID

• Unique SSID

Conclusion

• I suggest everyone to implement WPA-PSK encryption with strong passphrases and unique SSID for their networks.

• In future we can expect a strong encryption scheme than WPA that will come into existence

References

• Gast, M. (2002). 802.11 Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates.

• Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing

• BackTrack (2007). Retrieved December 4, 2007, from http://www.remote-exploit.org/backtrack.html

Questions

?