Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Awareness Chapter 5 Wireless Network Security.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Securing a Wireless Network
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Wireless Networking 102.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Ch. 5 – Access Points. Overview Access Point Connection.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless Networking and Security
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Assignment 3: Networking Components LTEC 4550 Jose L Ortiz Jr.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Encryption: WEP and cracking it. Eric Shea.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Protecting Your Wireless Network Protecting Your Wireless Network University of Tasmania School Of Computing 2007.
Wireless Networking & Security Greg Stabler Spencer Smith.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Chap1: Is there a Security Problem in Computing?.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
Wireless Network Security
Wireless Hacking.
Wireless Security Ian Bodley.
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Presentation transcript:

Wardriving 7/29/2004 The “Bad Karma Gang”

Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake

What is War Driving? Definition: Driving through a neighborhood with a wireless- enabled notebook computer in search for wireless access points (APs) Driving through a neighborhood with a wireless- enabled notebook computer in search for wireless access points (APs) Purpose: Analyze Wireless LANs & show which APs are open Analyze Wireless LANs & show which APs are open Product: Wireless Access Point Map Wireless Access Point Map Origin: “ War dialing ” “ War dialing ”

Some Results of War Driving -Source: Wigle.Net- -WiFiMaps.com- Nui’s House Access point WWWD4 (World Wide War Drive) June 12-19, ,000 APs submitted worldwide Wireless Access Point Maps Nowel & Budge WiGLE

Legal Background ActivityLegalityLaw Scan access points Not illegal Intentional access of a computer without authorization Illegal Computer Fraud and Abuse Act Alteration of communication on ISP network without authorization Illegal Electronic Communications Protection Act Interception of communications as they’re going through the air Illegal Wiretap Act

Footprinting Address range, namespace acquisition Scanning Find promising points of entry Anatomy of a Hack (Hacking Exposed 4 th Edition) Enumeration Find user accounts and poorly protected shares Gaining Access Informed attempts to access target Escalating Privilege Gain complete control of system War driving Process Pilfering Gain access to trusted systems Covering Tracks Hide system privileges Creating Back Doors Ensure ability to regain access at will Denial of Service Create ability to disable target LegalIllegal

Possible Risks War driving = not illegal Beyond war driving = illegal Encryption key cracking Encryption key cracking Free internet access Free internet access Identity exposure and theft Identity exposure and theft Network resource utilization Network resource utilization Data theft Data theft Denial-of-service Denial-of-service Other hacking activities Other hacking activities Confidentiality Integrity Availability

GPS Mouse Notebook computer Power Cable GPS Software Display network sniffing software (e.g. Netstumbler) Text to speech software "new network found. ssid is thd- wireless. channel 6. network open." Typical Wardriving Setup

Netstumbler Screenshot

For the thrifty and adventurous wardriver… Build a “Cantenna”

Protection of Wireless Networks Use Wired Equivalency Privacy (WEP) Network card encrypts “payload” using RC4 cipher Receiving station decrypts upon arrival Only works between stations. No longer applies once payload enters wired side of network Users should change default password and Service Set Identifier Users should change keys often Physically locate access point to avoid “spilling” signal off premises Install hardware or software firewall Use passwords for sensitive folders and files Users should perform wardriving test

Experiment: War Driving Seattle * Doonesbury, December, 2002.

Wardriving: Been there, done that? * “War Kayaking”, Summer, 2003.

War Driving Experiments

Experiment 1: Open door Opened SBG1000 wireless Internet gateway Meant to disable 16 bit encryption Discovered traffic in logs when home computers off

Experiment 2: Tools of the trade + + = Access

My house Results: Access Gained

Results 29 Available networks in 2 short hours All available from parked car on crowded streets Colorful names for wireless routers hotstuff, red libre, eatshitanddie hotstuff, red libre, eatshitanddie most use manufacturer name most use manufacturer name Only 3 required a key of any kind

The “Bad Karma Gang” -Social Engineer Alumni Relations- Discussion