by vamseedhar vuppu 005228822 the secrets of wireless hacking
TRANSCRIPT
Agenda
• 802.11 Wireless Standard• Encryption Schemes• Wardriving• Tools used for wardriving• Attacking 802.11networks• Tools used• Defenses• Conclusion
Encryption Schemes
• WEP(Wired Equivalent Privacy)
- First scheme for securing 802.11
• WAP AND WAP2(Wi-Fi Protected Access)
- Standard schemes used today
• WAP-PSK (Pre-shared key)
- Used in home and small office networks
Attacking 802.11 networks
• Note: Hacking other’s network without the permission of network owner is illegal [2].
• Penetration Testing tools are used
• Powerful Tool is BackTrack2
-Linux live distribution for pen testing
-Voted as #1 tool for pen testing[3]
-more than 300 security tools
Defenses
• Minimize signal exposure
• SSID (Network name)
- Broadcasting SSID
- Not broadcasting SSID
• Unique SSID
Conclusion
• I suggest everyone to implement WPA-PSK encryption with strong passphrases and unique SSID for their networks.
• In future we can expect a strong encryption scheme than WPA that will come into existence
References
• Gast, M. (2002). 802.11 Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates.
• Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing
• BackTrack (2007). Retrieved December 4, 2007, from http://www.remote-exploit.org/backtrack.html