Wireless LAN Security Understanding and Preventing Network Attacks.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Ethical Hacking Module XV Hacking Wireless Networks.
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Overview How to crack WEP and WPA
Network Attacks. Topics Objectives Rogue Devices Rogue Infrastructure Hardware Placement Data Theft & Malicious Insertion Security Feature Weaknesses.
Wireless Monitoring and Protection. Topics Objectives Protocol Analyzers WIPS Common WIDS/WIPS Features Conclusion.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Introduction to Site Surveys Matt Larsen, CEO Skybeam.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Site Surveys: An Introduction PersonalTelco- Play Date VIII June 4th, 2005 Matthew West.
Wireless Insecurity.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Confidential and Proprietary Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze Leo Walsh, GSNA Professional Jefferson Wells.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
Wireless Networks Tamus, Zoltán Ádám
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
Presented by: Dr. Munam Ali Shah
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Tools Training materials for wireless trainers.
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
Retina Network Security Scanner
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
WarDriving 101. THE HISTORY Society would not coin the term WarDriving until the year 2000 when a Berkeley computer consultant, Peter Shipley, presented.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Chapter 5 LANs and WLANs.
WIRELESS INTRUSION DETECTION SYTEMS
TERMINOLOGY Define: WPAN
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
NETW 05A: APPLIED WIRELESS SECURITY Unauthorized Access
Instructor Materials Chapter 9: Testing and Troubleshooting
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Securing A Wireless Network
Wireless Fidelity 1 1.
Wireless Network Security
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Local Area Network (WLAN)
GYAN GANGA COLLEGE OF TECHNOLOGY, JABALPUR
Wireless Hacking.
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Hacking Wireless Networks
Wireless Security.
802.11b Wireless Network Security
Wireless Network Security
Presentation transcript:

Wireless LAN Security Understanding and Preventing Network Attacks

Objectives Demonstrate how to recognize, perform, and prevent attacks Discuss the impact of these attacks on an organization

Topics Wireless LAN Auditing Tools Wardriving Freeway discovery applications NetStumbler, Kismet and KisMAC Wireless Zero Configuration Wireless Client Utilities Gathering information Conclusion

in a nutshell Link-layer protocol, IEEE Wi-Fi and Wi-Fi Alliance Spectrum Ad-hoc mode (peer-to-peer), Infrastructure mode (with AP) Packets (source, destination, BSSID) –Data –Management (Beacons, Deauthentication) –Control (RTS, CTS)

Wireless LAN Auditing Tools Auditing is the act of verifying that the configuration of the network is in compliance with policies and provides adequate protection from attackers of both the malicious and unintentional natures. Auditing procedures include penetration testing, configuration verification and other device and system-specific measures.

Cont… Few examples of auditing tools are: –Wireless LAN Discovery Tools –Wireless Protocol Analyzers –Antennas and WLAN Equipment –Password Capture and Decrypt –Hijacking Tools –RF Jamming Tools –Etc..

Wardriving Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a Wi-Fi-equipped computer, such as a laptop or a PDA. Software for wardriving is freely available on the Internet, notably, NetStumbler for Windows, Kismet for Linux, and KisMac for Macintosh. Source :

NetStumbler NetStumbler (also known as Network Stumbler),written by Marius Milner, is a tool for Windows that facilitates detection of Wireless LANs using the b, a and g WLAN standards. It runs on Microsoft Windows operating systems from Windows 98 on up to Windows Vista. More information about Netstumbler can be found at A trimmed-down version called MiniStumbler is available for the handheld Windows CE operating system. source:

Cont… When NetStumbler finds an access point, it display the following information: –MAC Address –SSID –Access Point name –Channel –Vendor –Security (WEP on or off) –Signal Strength –GPS Coordinates (if GPS is attached)

Cont… Sample output from NetStumbler

Kismet Kismet, written by Mike Kershaw, is an wireless packet analyzer. It runs on the Linux operating system and works with most wireless cards that are supported under Linux. kismetwireless.net is a large source of information about the use of Kismet and war driving.

Cont… Some features of Kismet are: –Multiple Packet sources –Channel hopping –IP block detection –Hidden SSID Decloaking –Manufatcurer Identification –Detection of Netstumbler clients –Runtime decoding of WEP packets. –etc

KisMAC KisMAC is a wireless network discovery tool for Mac OS. It has a wide range of features, similar to those of Kismet and it is more powerful than Kismet. More information can be found by searching for KisMAC at google.com

Wireless Zero Configuration Wireless Zero Configuration (WZC), also known as Wireless Auto Configuration, or WLAN AutoConfig. It is a service that dynamically selects a wireless network to connect to based on a user's preferences and various default settings. It is included with modern versions of Microsoft Windows. More information about WZC can be found at search with the keyword wireless auto configuration.

Cont… WZC Available Networks

Wireless Client Utility Software Wireless Client Utility Software is used to perform site surveys and, in effect, network discovery. These software tools gives the information that include list of available networks, Security (WEP on or off) and the channels that are using.

Wireless Client Utility Hardware The most common tools used in wireless LAN discovery are: –Laptops and table PCs. –Handheld and PDAs. –Wi-Fi Finders. –Antennas and wireless LAN Equipment.

Gathering Information Auditors and attackers use various processes to gather information about a network. The various methods include: Social engineering Search Engines Public Records Garbage Collection

Social Engineering Some well-known targets for this type of attack are: –Help Desk –On-site contractors –Employees

Conclusions A Wireless network administrator or Auditor should understand how to secure his or her wireless devices over time withstanding new vulnerabilities and attacks. Explained some available Freeware discovery applications.