by vamseedhar vuppu 005228822 the secrets of wireless hacking

13
By Vamseedhar Vuppu 005228822 The Secrets of Wireless Hacking

Upload: theodora-sutton

Post on 27-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

ByVamseedhar Vuppu005228822

The Secrets of Wireless Hacking

Agenda

• 802.11 Wireless Standard• Encryption Schemes• Wardriving• Tools used for wardriving• Attacking 802.11networks• Tools used• Defenses• Conclusion

802.11 wireless standard

• IEEE 802.11is a set of standards for WLAN

Different 802.11 Standards

Encryption Schemes

• WEP(Wired Equivalent Privacy)

- First scheme for securing 802.11

• WAP AND WAP2(Wi-Fi Protected Access)

- Standard schemes used today

• WAP-PSK (Pre-shared key)

- Used in home and small office networks

Wardriving Tools

• Tools used in different platforms

NetStumbler

• Tool used in windows

Attacking 802.11 networks

• Note: Hacking other’s network without the permission of network owner is illegal [2].

• Penetration Testing tools are used

• Powerful Tool is BackTrack2

-Linux live distribution for pen testing

-Voted as #1 tool for pen testing[3]

-more than 300 security tools

Backtrack2

Defenses

• Minimize signal exposure

• SSID (Network name)

- Broadcasting SSID

- Not broadcasting SSID

• Unique SSID

Conclusion

• I suggest everyone to implement WPA-PSK encryption with strong passphrases and unique SSID for their networks.

• In future we can expect a strong encryption scheme than WPA that will come into existence

References

• Gast, M. (2002). 802.11 Wireless Networks:The Definitive Guide. Sebastopol:O’Reilly & Associates.

• Hurley, C., & Rogers, R., & Thornton, F., & Connelly, D., & Baker, B. (2007). Wardriving & Wireless Penetration Testing. Rockland: Syngress Publishing

• BackTrack (2007). Retrieved December 4, 2007, from http://www.remote-exploit.org/backtrack.html

Questions

?