1 / 84

CMGT/441 Intro. to Information Systems Security Management

Week #4. CMGT/441 Intro. to Information Systems Security Management. Hacking Wireless Networks. Philip Robbins – December 19, 2013. Information Technology University of Phoenix Kapolei Learning Center. 1. Topics Understanding Wireless Technology & Standards Tools

ion
Download Presentation

CMGT/441 Intro. to Information Systems Security Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week #4 CMGT/441 Intro. to Information Systems Security Management Hacking Wireless Networks Philip Robbins – December 19, 2013 Information TechnologyUniversity of Phoenix Kapolei Learning Center 1

  2. Topics • Understanding Wireless Technology & Standards • Tools • Hacking WEP, WPA, WPA2 • Uncovering SSIDs • Bypassing MAC Address Filtering • De-Authentication & Mis-Association • Review Q&A • Quiz #4 Hacking Wireless Networks 2

  3. 3

  4. Understanding Wireless Standards • IEEE 802.11 • IEEE came up the 802.11 standard for wireless ethernet. • OSI Layers 1 & 2 • 79 channels, 2.4 to 2.4835 GHz (USA) • Half Duplex • CSMA/CA (Avoidance) v.s. CSMA/CD (Detection) • Modulation Techniques 4

  5. Understanding Wireless Standards • Center Frequency & Channels for 2.4 GHz 5

  6. Understanding Wireless Standards • 4 Way Handshake 6

  7. Understanding Wireless Standards • 802.11 Standards 7

  8. 8

  9. Tools • Alfa AWUSO36H WiFi Network Adapter 9

  10. Tools • Alfa AWUSO36H WiFi Network Adapter 10

  11. Tools • Alfa AWUSO36H WiFi Network Adapter 30dBm = 1W 11

  12. Tools • Netgear Wireless Router 12

  13. Tools • Netgear Wireless Router TARGET AP 13

  14. Tools • Netgear Wireless Router TARGET 192.168.1.1 14

  15. Tools / Configuration “password” 15

  16. Tools / Configuration Forgot the password for your router? …or your neighbors? 16

  17. Tools / Configuration “password” WEP CONFIGURATION 17

  18. Tools / Configuration 18

  19. Tools / Configuration Authentication? 19

  20. Tools / Configuration WPA CONFIGURATION 20

  21. Tools / Configuration 21

  22. Tools / Configuration “password” 22

  23. Tools Backtrack 5r3 Ubuntu Linux Distribution providing a comprehensive collection of security-related tools for digital forensics and pen testing use. 4… 1 3 2 http://www.backtrack-linux.org/downloads/ 23

  24. Tools 24

  25. Tools 25

  26. Tools 26

  27. Tools 27

  28. Tools AirSnort replacement. 28

  29. Understanding Wireless Technology • Wi-Fi Protected Access (WPA) • Touted as a step up from WEP • Weak passphrases renders the protection inadequate • False sense of security • Network Sniffers • TKIP v.s. AES 29

  30. Cracking WPA 30

  31. Cracking WPA 31

  32. Cracking WPA 32

  33. r Cracking WPA 33

  34. r Cracking WPA 34

  35. Cracking WPA 35

  36. r Cracking WPA 36

  37. r Cracking WPA 37

  38. Cracking WPA 38

  39. r Cracking WPA 39

  40. r Cracking WPA 40

  41. Cracking WPA 41

  42. Cracking WPA 42

  43. Cracking WPA Can take a few hours to go through 1+ million keys… 43

  44. Cracking WPA 44

  45. Cracking WPA 45

  46. Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 46

  47. Understanding Wireless Technology • Wired Equivalent Privacy (WEP) • Confidentiality • Access Control • Data Integrity • In reality, none of these are actually enforced! 47

  48. Understanding Wireless Technology • Wired Equivalent Privacy (WEP) Keystream 40 bits 24 bits 64-bit Keyspace (2^64 keys) 128-bit Keyspace (2^128 keys) Stream Cipher using XOR 48

  49. Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 49

  50. Understanding Wireless Technology • Wired Equivalent Privacy (WEP) 50

More Related