1 / 9

Wireless Networking Concepts

Wireless Networking Concepts. By: Forrest Finkler Computer Science 484 Networking Concepts. Summary. What is a Wireless Network Methods of Securing Wireless Networks WEP (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) MAC (Media Access Control) Address Filtering

danae
Download Presentation

Wireless Networking Concepts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts

  2. Summary • What is a Wireless Network • Methods of Securing Wireless Networks • WEP (Wired Equivalent Privacy) • WPA (Wi-Fi Protected Access) • MAC (Media Access Control) Address Filtering • Security Flaws of Wireless Data Networks • How to Bypass Security

  3. What is a wireless network • Wireless Networks Connect Computers Together and Allow Data to Travel Wirelessly Between an Access Point and a Client

  4. What is a wireless network • Wireless Networks Use Access Points and Clients to Communicate With Each Other • Radio Communications • 2.4 GHz (b, g, n) or 5 GHz(a, n) band • 11Mbps (b), 54Mbps (g, a)128 Mbps (n) • Allows for movement (roaming) between access points

  5. Securing Wireless Networks • WEP (Introduced in 1999) • 64 or 128 bit • 64 Bit • Uses a 40 bit key • 10 Hexadecimal Numbers “F2C7BB35B9” • 10 Hex * 4 bits per number = 40 bits • 40 bits + 24 IV = 64 bits • 128 Bit • Uses a 104 bit key • 24 Hexadecimal Numbers “2B204A3F1042643E480FDD655E” • 24 Hex * 4 bits per number = 108 bits • 104 bits + 24 IV = 128 bits

  6. Securing Wireless Networks • Wi-Fi Protected Access • WPA or WPA2 • WPA • 128-bit key and a 48-bit IV • Uses Temporal Key Integrity Protocol (TKIP) • Better Security Through Dynamic Keys • Based on 802.11i Draft Standards • WPA2 • 128-bit key and a 48-bit IV • Uses Advanced Encryption Standard (AES) • Uses a Matrix of Bits and Rounds (mathematical operations) to Authenticate Clients • Based on 802.11i

  7. Securing Wireless Networks • Media Access Control Address Filtering • MAC Addresses • MAC Addresses are 48 bits and are Unique to Each NIC • Typical MAC Address “00:0F:66:2A:A5:D5” • Weaknesses • MAC Addresses are Easily Spoofed Using Software • A Very Weak Security Measure Only Should be Used in Conjunction With WEP or WPA

  8. How to bypass WLAN security • MAC Address Spoofing (<20 seconds) • ifdown eth0 • ifconfig eth0 hw ether 00:80:FF:FF:98:F5 • ifup eth0 • WEP Cracking (2 min-30 min) • Kismet (captures raw packets(need 20,000 to 500,000 IV’s)) • Aircrack (decrypts packets and finds WEP key) • WPA Cracking (15 min-∞) • Only Crackable if Using a PSK • Brute Force Attack

  9. Questions?

More Related