![Page 1: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/1.jpg)
CHAPTER 10
Wireless Network Hacking
![Page 2: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/2.jpg)
Authentication & Cracking Techniques
Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge
with WEP key WEP: RC4 64-bit or 128-bit
40-bit or 104-bit with 24-bit IV Open to FMS (Fluhrer, Marntin, Shamir) attack
WPA: TKIP for encryption WPA2: AES for encryption
![Page 3: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/3.jpg)
TKIP
Per packet key mixing rekeying mechanism message integrity check (MIC)
IV increased to 48 bits Over 500 Trillion keystreams possible IV are hashed
![Page 4: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/4.jpg)
Wireless Hacking Tools
Wardriving, Warwalking, Warflying, etc.
Aircrack: Windows and Linux
WEPCrack: Linux
AirSnort: Linux
NetStumbler: Windows Includes GPS to map WAPs
Kismet: Linux
![Page 5: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/5.jpg)
Sniffing for SSID
http://www.youtube.com/watch?v=jETwvEDaJeQ
http://www.youtube.com/watch?v=6RIUOoMdkv8
http://www.youtube.com/watch?v=BaDUw8WZx5A
![Page 6: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/6.jpg)
MAC Filters / MAC Spoofing Used to bypass MAC filtering on WAP Tools
SMAC
![Page 7: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/7.jpg)
Rogue APs Rogue WAP Evil Twin / AP Masquerading
Tools to generate fake WAPs Fakeap Netstumbler MiniStumbler
![Page 8: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/8.jpg)
Wireless Hacking Techniques
Eavesdropping / Sniffing DoS AP Masquerading / Spoofing MAC Spoofing Planting Rogue Aps
http://news.yahoo.com/blogs/upgrade-your-life/banking-online-not-hacked-182159934.html
![Page 9: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/9.jpg)
Securing Wireless
Change default settings
Use WEP / WPA encryption
Enable firewall settings
Reduce WLAN transmitter power
Disable remote administration
![Page 10: Wireless Network Hacking. Authentication Techniques 1. Open System: no security techniques 2. Shared-Key: uses hashed string challenge with WEP](https://reader036.vdocuments.site/reader036/viewer/2022082711/56649eff5503460f94c14989/html5/thumbnails/10.jpg)
Cracking WPA / WPA2 http://
www.youtube.com/watch?v=u-dqi23oaS8