Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378.

Slides:



Advertisements
Similar presentations
Brute Force Attack Against Wi-Fi Protected Setup
Advertisements

Overview How to crack WEP and WPA
Mark Clements Program Leader Computer Networking Why Engineering at Medway?
Conventional Encryption: Algorithms
Wireless Cracking By: Christopher Zacky.
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Modeling Wi-Fi Protected Setup Brute-Force Mitigations Using Markov Chains Progress Summary Lloyd Jones Progress Summary Lloyd Jones.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Minimum Spanning Network: Brute Force Solution
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Linux Deploy This application is open source software for quick and easy installation of the operating system (OS) GNU/Linux on your Android device. The.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CMGT/441 Intro. to Information Systems Security Management Information Technology University of Phoenix Kapolei Learning Center Week #4 1 Hacking Wireless.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Pen testing to ensure your security
By Vamseedhar Vuppu The Secrets of Wireless Hacking.
Wi-Fi Setup. "Wi-Fi has quickly become one of the most pervasive wireless technologies, but users have told us they want it to be easier to set up and.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
1/28/2010 Network Plus Wireless Protocols Wireless Printer Setup WPS Used to automatically configure printers for Wireless operation Requires WPS compatibility.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Modeling Wi-Fi Protected Setup Brute-Force Mitigations Using Markov Chains Lloyd Jones.
Peter Peerdeman Introduction Overview Wireless security Fon network Security scenarios Conclusion Wireless security Fon network Security.
1 TCP/IP based TML for ForCES Protocol Hormuzd Khosravi Furquan Ansari Jon Maloy 61 st IETF Meeting, DC.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Setting Wireless Network At Home By: Parveen Sharma.
Modern Approaches to Wi-Fi Attacks: Attacker View BY KONRAD JĘDRZEJCZYK.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
Welcome to Early Bird Class
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Filip Chytrý Everyone of you in here can help us improve online security....
Wireless LAN Concepts. Wireless LAN Standards.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
W/BO project Wi-Fi over AIBO RÉANT Gilles French Erasmus student.
Seminar On Ethical Hacking Submitted To: Submitted By:
Penetration Testing: Concepts,Attacks and Defence Stratagies
Working at a Small-to-Medium Business or ISP – Chapter 8
Secure Software Confidentiality Integrity Data Security Authentication
Presented By: Rohit Maurya
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Week 1 – Taster Session dmuhackers DMU Hackers.
Only For Education Purpose
Wireless Hacking.
Breaking WPS with Reaver
Convergence IT Services Pvt. Ltd
Chapter 1 Key Security Terms.
Presentation transcript:

Ethical Hacking of Wireless Routers Faizan Zahid CS-340 Nida Noor CS-378

Introduction  “ Ethical Hacking ” - to ensure reliability and performance of security mechanisms  To hack the wireless networks by exploiting the vulnerabilities in the WiFi routers  Securing it by removing security flaws

Main Idea  Knowing the existing flaws and loopholes in the wireless networks  Cracking them to find out how to make future networks more reliable and secure  Reducing the risk of vulnerabilities.  Creating our system more robust and safe.

Tools involved  Linux Backtrack - it provides great support for networking and security.  Wireless router with WPS functionality  Reaver (an open source tool for implementing brute force attack)  Determination & Patience

STEPS

Step 1  Install Linux Backtrack

Step 2  Put your WLAN adapter in monitor mode

Step 3  Implement Reaver brute force attack to crack PIN Step 4  Find the target BSSID of the router

Time spent  4 to 10 hours approximately  8 Digit numeric key  Total 11,000 keys permutations possible

How to secure ? Project Solution & Scope  Disable WPS functionality in router  Do not buy routers supporting Wi-Fi `Protected Setup (WPS )

Let’s see it in action

Thank you!