1 / 7

NETW 05A: APPLIED WIRELESS SECURITY Denial of Service

NETW 05A: APPLIED WIRELESS SECURITY Denial of Service. By Mohammad Shanehsaz February 22, 2005. Objectives. Explain how the following types of DoS RF jamming Data flooding Client hijacking. RF Jamming. Use of high-power, narrowband RF transmitter and antenna will stop a wireless LAN

Download Presentation

NETW 05A: APPLIED WIRELESS SECURITY Denial of Service

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETW 05A: APPLIED WIRELESS SECURITY Denial of Service By Mohammad Shanehsaz February 22, 2005

  2. Objectives • Explain how the following types of DoS • RF jamming • Data flooding • Client hijacking

  3. RF Jamming • Use of high-power, narrowband RF transmitter and antenna will stop a wireless LAN • High powered signal generation devices are inexpensive and simple to assemble and use • Microwave ovens, 2.4GHz phones, Bluetooth devices, and Wi-Fi devices can cause unintentional RF jamming • No defense other than physical security of the premises can prevent RF jamming attacks

  4. Data Flooding • Deny authorized users bandwidth on the wireless LAN by: - using traffic generation software one of which is Tamosoft’s Commview ( www.tamosoft.com ) • Inexpensive • Easy to use - Downloading extremely large files from high bandwidth internet sites over the wireless LAN - Pull or push a file to or from an internal server on the LAN

  5. Hijacking • This is a situation in which an unauthorized user takes control of an authorized user’s wireless LAN connection. • It is done at layer 2 for DOS and at layer 3 for attacking purposes. • In order to hijack a wireless user, one must use an access point that replicates the functions being performed by an authorized access point. • Using a jamming device will force users to roam. • Next the layer 3 connection is established by running DHCP server.

  6. Hijacking tools • Forced roaming through RF jamming(layer2) - Bluetooth devices -Narrowband transmitters • Access Point software ( layer2 ) -ZoomAir AP ( Windows ) -Cqure AP ( Linux ) • Rogue DHCP Service ( layer3 ) -Kerio’s WinRoute ( www.kerio.com )

  7. Resources • CWSP certified wireless security professional, from Mc Graw Hill

More Related