802.11 sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Intro to InfoSec Communication Protocols Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless Weaponry The Shmoo Group. Intro a.k.a. WTF is Shmoo? Howdy! Who’s who up here? What the hell are we gabbing about? “Who’s Shmoo?” takes too long.
Packet Sniffing - By Aarti Dhone.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
Wireless Security.
MASNET GroupXiuzhen ChengFeb 8, 2006 CSCI388 Project 1 Crack the WEP key Liran Ma Department of Computer Science The George Washington University
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
COEN 252 Computer Forensics
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
Communication Protocols.  A network is just a bunch of devices communication.  There are all sorts of protocols out there today being used: 3GPP/GSM/SS7,
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
CHAPTER 9 Sniffing.
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
Setting Wireless Network At Home By: Parveen Sharma.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 The Main Event Battle Of the Sniffers. ● The Champion – Ethereal: Network Analyzer ● The Challenger – Ettercap: Network Security Suite.
Sniffer, tcpdump, Ethereal, ntop
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
6MoN plus geographically distributed dual stack network monitoring #TNC16 | #IIT-CNR | #6MoN Speaker: Abraham Gebrehiwot.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
Packet Sniffing Hans Kokx
Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York ATTACK TOOLS & SECURITY POLICIES Shambhu Upadhyaya 1.
Wireless Tools Joel Jaeggli For AIT Wireless Security Workshop.
[blank page for bug work-around]
Some Important Network Characteristics for Security
Wireless Network Security
Advanced Penetration testing
Wireless Hacking.
Advanced Penetration testing
IP-Spoofing and Source Routing Connections
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Advanced Penetration testing
Presentation transcript:

sniffing Team #1

Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium in wireless network, it’s easy to collect data.

Tools Network analyzers –Active : NetStumber.. –Passive : airsnort, kismet… Packet sniffers –kismet, ethereal, tcpdump… We used kismet and ethereal

Sniffing - kismet

Sniffing - ethereal

Result by kismet Many APs do not serve any security method. –even Netspot, too Many packets are also not protected by any cipher.

Defense by air cracker Use WEP as possible Use SSL/TLS when you send password or something important –Huge sites like naver serve secure login for a default option. DON’T use wireless internet when doing important thing –e.g. secret work in the office 

Further works How to use ethereal effectively? –Using collected data dump directly is too dangerous. –Analyzing the ratio of each protocol is possible Analyze the data collected by kismet

Thanks