Presentation is loading. Please wait.

Presentation is loading. Please wait.

CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.

Similar presentations


Presentation on theme: "CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless."— Presentation transcript:

1 CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless Networks Philip Robbins – December 19, 2013

2 2 Hacking Wireless Networks Topics Understanding Wireless Technology & Standards Tools Hacking WEP, WPA, WPA2 Uncovering SSIDs Bypassing MAC Address Filtering De-Authentication & Mis-Association Review Q&A Quiz #4

3 3

4 4 Understanding Wireless Standards IEEE 802.11 – IEEE came up the 802.11 standard for wireless ethernet. – OSI Layers 1 & 2 – 79 channels, 2.4 to 2.4835 GHz (USA) – Half Duplex – CSMA/CA (Avoidance) v.s. CSMA/CD (Detection) – Modulation Techniques

5 5 Understanding Wireless Standards – Center Frequency & Channels for 2.4 GHz

6 6 Understanding Wireless Standards – 4 Way Handshake

7 7 Understanding Wireless Standards – 802.11 Standards

8 8

9 9 Tools Alfa AWUSO36H WiFi Network Adapter

10 10 Tools Alfa AWUSO36H WiFi Network Adapter

11 11 Tools Alfa AWUSO36H WiFi Network Adapter 30dBm = 1W

12 12 Tools Netgear Wireless Router

13 13 Tools Netgear Wireless Router TARGET AP

14 14 Tools Netgear Wireless Router TARGET 192.168.1.1

15 15 Tools / Configuration “password”

16 16 Tools / Configuration Forgot the password for your router? …or your neighbors?

17 17 Tools / Configuration “password” WEP CONFIGURATION

18 18 Tools / Configuration

19 19 Tools / Configuration Authentication?

20 20 Tools / Configuration WPA CONFIGURATION

21 21 Tools / Configuration

22 22 Tools / Configuration “password”

23 23 Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use. http://www.backtrack-linux.org/downloads/ 1 2 3 4…

24 24 Tools

25 25 Tools

26 26 Tools

27 27 Tools

28 28 Tools AirSnort replacement.

29 29 Understanding Wireless Technology Wi-Fi Protected Access (WPA) – Touted as a step up from WEP – Weak passphrases renders the protection inadequate – False sense of security – Network Sniffers – TKIP v.s. AES

30 30 Cracking WPA

31 31 Cracking WPA

32 32 Cracking WPA

33 33 r Cracking WPA

34 34 r Cracking WPA

35 35 Cracking WPA

36 36 r Cracking WPA

37 37 r Cracking WPA

38 38 Cracking WPA

39 39 r Cracking WPA

40 40 r Cracking WPA

41 41 Cracking WPA

42 42 Cracking WPA

43 43 Cracking WPA Can take a few hours to go through 1+ million keys…

44 44 Cracking WPA

45 45 Cracking WPA

46 46 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

47 47 Understanding Wireless Technology Wired Equivalent Privacy (WEP) – Confidentiality – Access Control – Data Integrity – In reality, none of these are actually enforced!

48 48 Understanding Wireless Technology Wired Equivalent Privacy (WEP) Stream Cipher using XOR Keystream 64-bit Keyspace (2^64 keys) 128-bit Keyspace (2^128 keys) 40 bits24 bits

49 49 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

50 50 Understanding Wireless Technology Wired Equivalent Privacy (WEP)

51 51 Understanding Wireless Technology Wired Equivalent Privacy

52 52 Cracking WEP

53 53 Cracking WEP

54 54 Cracking WEP

55 55 Cracking WEP

56 56 Cracking WEP

57 57 Cracking WEP

58 58 Cracking WEP 1 2 3

59 59 Bypassing MAC filtering

60 60 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a.802.11 b.802.11a c.802.11b d.802.11X

61 61 Review Questions Question #1 Which IEEE standard defines authentication and authorization in wireless networks? a.802.11 b.802.11a c.802.11b d.802.11X

62 62 Review Questions Question #2 Which IEEE standard defines wireless technology? a.802.3 b.802.5 c.802.11 d.All 802 standards

63 63 Review Questions Question #2 Which IEEE standard defines wireless technology? a.802.3 b.802.5 c.802.11 d.All 802 standards

64 64 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA

65 65 Review Questions Question #3 Which wireless encryption standard offers the best security? a.WPA2 b.WEP c.SSL d.WPA

66 66 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength

67 67 Review Questions Question #4 What information can be gathered by wardriving? a.SSIDs of wireless networks b.Whether encryption is enabled c.Whether SSL is enabled d.Signal strength

68 68 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory

69 69 Review Questions Question #5 What is a known weakness of wireless SSIDs? a.They’re broadcast in cleartext b.They’re difficult to configure c.They use large amounts of bandwidth d.They consume an excessive amount of computer memory

70 70 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a.802.11a b.802.11b c.802.11i d.802.11

71 71 Review Questions Question #6 Wi-Fi Protected Access (WPA) was introduced in which IEEE 802 standard? a.802.11a b.802.11b c.802.11i d.802.11

72 72 Review Questions Question #7 What protocol was added to 802.11i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS

73 73 Review Questions Question #7 What protocol was added to 802.11i to address WEP’s encryption vulnerability? a.MIC b.TKIP c.TTL d.EAP-TLS

74 74 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE

75 75 Review Questions Question #8 Disabling SSID broadcasts must be configured on the computer and the AP. True or False? a.TRUE b.FALSE

76 76 Review Questions Question #9 The operating frequency range of 802.11a is 2.4 GHZ. True or False? a.TRUE b.FALSE

77 77 Review Questions Question #9 The operating frequency range of 802.11a is 2.4 GHZ. True or False? a.TRUE b.FALSE

78 78 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)

79 79 Review Questions Question #10 What TKIP enhancement addressed the WEP vulnerability of forging packets? a.Extended Initialization Vector (IV) with sequencing rules b.Per-packet key mixing c.Rekeying mechanism d.Message Integrity Check (MIC)

80 80 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA

81 81 Review Questions Question #11 Which EAP method requires installing digital certificates on both the server and client? a.EAP-TLS b.PEAP c.EAP-SSL d.EAP-CA

82 82 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)

83 83 Review Questions Question #12 (last one) Which spread spectrum method divides bandwidth into a series of frequencies called tones? a.Frequency-hopping spread spectrum (FHSS) b.Direct sequence spread spectrum (DSSS) c.Spread spectrum frequency tonation (SSFT) d.Orthogonal frequency division multiplexing (OFDM)

84 84 Questions? philiprobbins@email.phoenix.edu www2.hawaii.edu/~probbins https://www.dorkatron.com/docs/CMGT441/


Download ppt "CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless."

Similar presentations


Ads by Google