SlideShare a Scribd company logo
ethical hacking in wireless-hacking1.ppt
Technology - wireless
 Describe equipment and technologies operating in the
radio frequency (RF) spectrum between 3 Hz and 300 GHz.
 Examples of wireless equipment include cell phones,
AM/FM radios, wireless networking devices, and radar
systems.
 Most wireless networking equipment operates in a smaller
portion of the RF spectrum, between 2.4 GHz and 66 GHz.
Components of a Wireless Network
 Wireless network interface cards (WNICs), which
transmit and receive wireless signals, and
 access points (APs), which are the bridge between
wired and wireless networks
 Wireless networking protocols, such as Wi-Fi
Protected Access (WPA)
 A portion of the RF spectrum, which replaces wire as
the connection medium
Access Points
 An access point (AP) is a radio transceiver that
connects to a network via an Ethernet cable and
bridges a wireless LAN (WLAN) with a wired network.
 An AP is where RF channels are configured.
 APs are what hackers look for when they drive around
with an antenna and a laptop computer scanning for
access.
NetStumbler
NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates
detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.
It runs on Microsoft Windows operating systems from Windows 2000 to Windows
XP.
Service Set Identifiers
 A service set identifier (SSID) is the name used to
identify a WLAN, much the same way a workgroup is
used on a Windows network.
 An SSID is configured on the AP as a unique, 1-to 32-
character, case-sensitive alphanumeric name.
 The AP usually beacons (broadcasts) the SSID several
times a second so that users who have WNICs can see a
display of all WLANs within range of the AP’s signal.
Vendor Default SSIDs
3Com 3Com, comcomcom, 101
Apple Airport Network
Belkin (54G) Belkin54g
Cisco tsunami
Compaq COMPAQ
D-Link WLAN, default
Dell wireless
Intel Intel, 101, XLAN, 195, Intel Gateway
Linksys linksys, wireless, linksys-g
Microsoft MSHOME
Netgear Wireless, Netgear
SMC WLAN, BRIDGE, SMC
Symantec 101
U.S. Robotics WLAN, USR9106, USR5450, USR8022, USR8054
dd-wrt
 DD-WRT is Linux-based firmware for wireless
routers and access points .
 dd-wrt Linux embedded OS that replaces the
embedded OS used on hundreds of routers from
Linksys, D-Link, Netgear, Belkin, Microsoft, U.S.
Robotics, Dell, Buffalo, and many others.
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Disable SSID Broadcasting
• Can use a passive wireless sniffer, such as Kismet
• Kismet is a network detector, packet sniffer, and intrusion
detection system for 802.11 wireless LANs.
• Kismet will work with any wireless card which supports
raw monitoring mode, and can sniff 802.11a, 802.11b,
802.11g, and 802.11n traffic.
• Kismet is a very powerful wireless sniffing tool that is
found in Kali Linux. This is an open-source tool very
familiar to ethical hackers, computer network security
professionals and penetration testers
 Unlike NetStumbler, which can pick up only broadcasted
SSIDs, Kismet can detect SSIDs in WLAN client traffic.
Understanding Wireless Network
Standards
Standard Frequency
Maximum
rate Modulation method
802.11 2.4 GHz 1 or 2 Mbps FHSS/DSSS
802.11a 5 GHz 54 Mbps OFDM
802.11b 2.4 GHz 11 Mbps DSSS
802.11g 2.4 GHz 54 Mbps OFDM
802.11n 2.4 GHz 600 Mbps OFDM
802.15 2.4 GHz 2 Mbps FHSS
802.16 (WiMAX) 10–66 GHz 120 Mbps OFDM
802.20 (Mobile Wireless Access Working
Group)
Below 3.5
GHz
1 Mbps OFDM
Bluetooth 2.4 GHz 12 Mbps Gaussian frequency shift keying
(GFSK)
HiperLAN/2 5 GHz 54 Mbps OFDM
Signal Modulation
 data to be moved over radio waves, it must be
modulated on the carrier signal or channel.
 Modulation defines how data is placed on a carrier
signal.
 spread spectrum modulation means data is spread
across a large-frequency bandwidth instead of
traveling across just one frequency band.
 In other words, a group of radio frequencies is
selected, and the data is “spread” across this group.
Spread spectrum, the most widely used WLAN
technology, uses the following methods:
 Frequency-hopping spread spectrum (FHSS): Data hops to
other frequencies to avoid interference that might occur
over a frequency band. This hopping from one frequency to
another occurs at split-second intervals and makes it
difficult for an intruder or attacker to jam the
communication channel.
 Direct sequence spread spectrum (DSSS): DSSS differs
from FHSS, in that it spreads data packets simultaneously
over multiple frequencies instead of hopping to other
frequencies.
 Orthogonal frequency division multiplexing (OFDM): The
bandwidth is divided into a series of frequencies called
tones, which allows a higher throughput (data transfer
rate) than FHSS and DSSS do.
Understanding Wardriving
 detect access points that haven’t been secured.
 most APs have no passwords or security measures, so
wardriving can be quite rewarding for hackers.
 As of this writing, wardriving isn’t illegal; using the
resources of networks discovered with wardriving is, of
course, a different story.
How It Works
 To conduct wardriving, an attacker or a security tester simply drives around
with a laptop computer containing a WNIC, an antenna, and software that
scans the area for SSIDs. Not all WNICs are compatible with scanning software,
so you might want to look at the software requirements first before purchasing
the hardware.
 Antenna prices vary, depending on their quality and the range they can cover.
Some are as small as a cell phone’s antenna, and some are as large as a bazooka,
which you might have seen in old war films. The larger ones can sometimes
return results on networks miles away from the attacker. The smaller ones
might require being in close proximity to the AP.
 Most scanning software detects the company’s SSID, the type of security
enabled, and the signal strength, indicating how close the AP is to the attacker.
Because attacks against WEP are simple and attacks against WPA are possible,
any 802.11 connection not using WPA2 should be considered inadequately
secured. The following sections introduce some tools that many wireless
hackers and security professionals use.
NetStumbler
 For Windows that enables detecting WLANs
 Verifying the WLAN configuration
 Detecting other wireless networks that might be
interfering with a WLAN
 Detecting unauthorized APs that might have been
placed on a WLAN
 Another feature of NetStumbler is its capability to
interface with a GPS, enabling a security tester or
hacker to map out locations of all WLANs the software
detects.
NetStumbler
 When the program identifies an AP’s signal, it logs the
SSID, MAC address of the AP, manufacturer of the AP,
channel on which the signal was heard, strength of the
signal, and whether encryption is enabled (but not a
specific encryption type).
Kismet
 free and runs on Linux, BSD UNIX, Mac OS X, and even Linux
PDAs. The software is advertised as being more than just a
wireless network detector.
 Kismet is also a sniffer and an intrusion detection system and
 Wireshark- and Tcpdump-compatible data logging
 Compatible with AirSnort and AirCrack
 Network IP range detection
 Detection of hidden network SSIDs
 Graphical mapping of networks
 Manufacturer and model identification of APs and clients
 Detection of known default AP configurations
Understanding Wireless Hacking
 Hacking a wireless network isn’t much different from
hacking a wired LAN.
 Many of the port-scanning and enumeration tools
you’ve learned about can be applied to wireless
networks.
Tools of the Trade
 A wireless hacker usually has a laptop computer, a
WNIC, an antenna, sniffers (Tcpdump or Wireshark,
for example), tools such as NetStumbler or Kismet,
and lots of patience.
 After using NetStumbler or Kismet to determine the
network name, SSID, MAC address of the AP, channel
used, signal strength, and which type of encryption is
enabled, a security tester is ready to continue testing.
Tools of the Trade
 Wireless routers that perform DHCP functions can pose a big security risk. If a
wireless computer is issued an IP address, a subnet mask, and DNS information
automatically, attackers can use all the skills they learned in hacking wired
networks on the wireless network.
 If DHCP isn’t used, attackers simply rely on Wireshark or Tcpdump to sniff
packets passing through the wireless network to gather this IP configuration
information. (As a security professional, you should recommend disabling
DHCP on wireless networks and assigning IP addresses to wireless stations
manually.)
 They can then configure the WNIC with the correct IP information. What do
attackers or security testers do if WEP or WPA is enabled on the AP? Several
tools address this issue. AirCrack NG and WEPCrack, are what prompted
organizations to replace WEP with the more secure WPA as their
authentication method.
AirCrack NG
 As a security professional, your job is to protect a network and make it difficult for
attackers to break in. You might like to believe you can completely prevent
attackers from breaking in, but unfortunately, this goal is impossible.
 AirCrack NG (included on the BackTrack files or available free at
www.aircrack-ng.org) is the tool most hackers use to access WEP-enabled
WLANs.
 AirCrack NG replaced AirSnort, a product created by wireless security researchers
Jeremy Bruestle and Blake Hegerle, who set out to prove that WEP encryption was
faulty and easy to crack.
 AirSnort was the first widely used WEP-cracking program and woke up
nonbelievers who thought WEP was enough protection for a WLAN.
 AirCrack NG took up where AirSnort (and the slightly older WEPCrack) left off.
Countermeasures for Wireless Attacks
 Many countermeasure, such as using certificates on all wireless
devices, are time consuming and costly.
 If you approach securing a wireless LAN as you would a wired
LAN, you’ll have a better chance of protecting corporate data and
network resources. Would you allow users to have access to
network resources simply because they plugged their NICs into
the company’s switch or hub? Of course not. Then why would
you allow users to have access to a wireless LAN simply because
they have WNICs and know the company’s SSID?
 If a company must use wireless technology, your job is to make it
as secure as possible. Be sure wireless users are authenticated
before being able to access any network resources. Here are some
additional guidelines to help secure a wireless network:
Countermeasures for Wireless Attacks
 honeypots, which are hosts or networks available to the public that entice
hackers to attack them instead of a company’s real network.
 To make it more difficult for wardrivers to discover your WLAN, you can use
Black Alchemy Fake AP (available free at ww.blackalchemy.to/project/fakeap/).
As its name implies, this program creates fake APs, which keeps war-drivers so
busy trying to connect to nonexistent wireless networks that they don’t have
time to discover your legitimate AP.
 There are measures for preventing radio waves from leaving or entering a
building so that wireless technology can be used only by people in the facility.
One is using a certain type of paint on the walls, but this method isn’t foolproof
because some radio waves can leak out if the paint isn’t applied correctly.
 Use a router to filter unauthorized MAC and IP addresses and prevent them
from having network access. (can spoof)

More Related Content

PPTX
PPT
Wireless usb
PPTX
Wireless technology
PDF
Wireless Fidelity (WiFi)
PPTX
PPTX
Wlan security
PPT
Computer virus
PPTX
Millimeter wave mobile communication for 5G cellular.
Wireless usb
Wireless technology
Wireless Fidelity (WiFi)
Wlan security
Computer virus
Millimeter wave mobile communication for 5G cellular.

What's hot (20)

PPT
Wi fi protected access
PPTX
Wireless network
PPTX
Security in IoT
PPTX
WiFi Technology
PPTX
Wi-max Technology PPT
PPT
What Is WiMax
PPT
Wireless security presentation
PPTX
MALWARE AND ITS TYPES
PPT
Wifi Security
PDF
New Cisco Access Points
PPTX
Latest wireless technology
PPTX
Mobile Phone Seizure Guide by Raghu Khimani
PPTX
Storage area network
PDF
What is botnet?
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PPTX
Wireless technology - Wi-Fi
PPTX
Wireless network security
PPTX
Wifi ppt
PPTX
Free space optical communication(final)
Wi fi protected access
Wireless network
Security in IoT
WiFi Technology
Wi-max Technology PPT
What Is WiMax
Wireless security presentation
MALWARE AND ITS TYPES
Wifi Security
New Cisco Access Points
Latest wireless technology
Mobile Phone Seizure Guide by Raghu Khimani
Storage area network
What is botnet?
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Wireless technology - Wi-Fi
Wireless network security
Wifi ppt
Free space optical communication(final)

Similar to ethical hacking in wireless-hacking1.ppt (20)

PDF
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
PPT
Wireless Security Basics
PPT
Lecture9999999999999999900000000000000000000000000000000
PPT
Wireless LAN Deployment Best Practices
PDF
WiFi Intrustion Detection from WireShark SharkFest
PPTX
DevLink - WiFu: You think your wireless is secure?
PPTX
Wardriving & Kismet Introduction
PPTX
Wireless Penetration Testing
PDF
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
PPTX
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
PDF
Hacker tool talk: kismet
PPTX
Demystifying Wireless Security Using Open Source Options
PPTX
Wardriving
PDF
DGRZETICH_TDC531_Presentation
PPTX
Wireless_Networks_Paragraph_Style_Final.pptx
PDF
Ch 11: Hacking Wireless Networks
PDF
Attacking Automatic Wireless Network Selection
PDF
Wireless Technology
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Wireless Security Basics
Lecture9999999999999999900000000000000000000000000000000
Wireless LAN Deployment Best Practices
WiFi Intrustion Detection from WireShark SharkFest
DevLink - WiFu: You think your wireless is secure?
Wardriving & Kismet Introduction
Wireless Penetration Testing
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Hacker tool talk: kismet
Demystifying Wireless Security Using Open Source Options
Wardriving
DGRZETICH_TDC531_Presentation
Wireless_Networks_Paragraph_Style_Final.pptx
Ch 11: Hacking Wireless Networks
Attacking Automatic Wireless Network Selection
Wireless Technology
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008

More from Jayaprasanna4 (20)

PDF
web programming javascriptconditionalstatements.pdf
PDF
hyper text markup language ppt-100605011058-phpapp02.pdf
PPTX
web essentials - simple message flow and loo.pptx
PPTX
web essentials - Working principle of a Website.pptx
PPTX
software project in MONTE CARLO SIMULATION.pptx
PPT
Cost effort in softwrae project management.ppt
PDF
software project management cocomomodel.pdf
PPT
software project management Activity planning.ppt
PDF
software project management montecarloscheduleanalysis.pdf
PPT
casestudy on distributionnetworkformichaelshardwaregroupgate.ppt
PPT
ethical hacking-mobile hacking methods.ppt
PDF
Human computer Interaction ch1-the human.pdf
PPT
computer Networks Error Detection and Correction.ppt
PPT
HUman computer Interaction Socio-organizational Issues.ppt
PPT
human computer Interaction cognitive models.ppt
PPT
World wide web and Hyper Text Markup Language
PPT
CI-Monte-Carlo.ppt
PPT
Activity planning.ppt
PPT
Cost effort.ppt
PPT
Activity planning.ppt
web programming javascriptconditionalstatements.pdf
hyper text markup language ppt-100605011058-phpapp02.pdf
web essentials - simple message flow and loo.pptx
web essentials - Working principle of a Website.pptx
software project in MONTE CARLO SIMULATION.pptx
Cost effort in softwrae project management.ppt
software project management cocomomodel.pdf
software project management Activity planning.ppt
software project management montecarloscheduleanalysis.pdf
casestudy on distributionnetworkformichaelshardwaregroupgate.ppt
ethical hacking-mobile hacking methods.ppt
Human computer Interaction ch1-the human.pdf
computer Networks Error Detection and Correction.ppt
HUman computer Interaction Socio-organizational Issues.ppt
human computer Interaction cognitive models.ppt
World wide web and Hyper Text Markup Language
CI-Monte-Carlo.ppt
Activity planning.ppt
Cost effort.ppt
Activity planning.ppt

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Digital Logic Computer Design lecture notes
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
web development for engineering and engineering
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Model Code of Practice - Construction Work - 21102022 .pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT 4 Total Quality Management .pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Digital Logic Computer Design lecture notes
Operating System & Kernel Study Guide-1 - converted.pdf
Sustainable Sites - Green Building Construction
Lesson 3_Tessellation.pptx finite Mathematics
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Internet of Things (IOT) - A guide to understanding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
web development for engineering and engineering
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Structs to JSON How Go Powers REST APIs.pdf
CYBER-CRIMES AND SECURITY A guide to understanding

ethical hacking in wireless-hacking1.ppt

  • 2. Technology - wireless  Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz.  Examples of wireless equipment include cell phones, AM/FM radios, wireless networking devices, and radar systems.  Most wireless networking equipment operates in a smaller portion of the RF spectrum, between 2.4 GHz and 66 GHz.
  • 3. Components of a Wireless Network  Wireless network interface cards (WNICs), which transmit and receive wireless signals, and  access points (APs), which are the bridge between wired and wireless networks  Wireless networking protocols, such as Wi-Fi Protected Access (WPA)  A portion of the RF spectrum, which replaces wire as the connection medium
  • 4. Access Points  An access point (AP) is a radio transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN (WLAN) with a wired network.  An AP is where RF channels are configured.  APs are what hackers look for when they drive around with an antenna and a laptop computer scanning for access.
  • 5. NetStumbler NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP.
  • 6. Service Set Identifiers  A service set identifier (SSID) is the name used to identify a WLAN, much the same way a workgroup is used on a Windows network.  An SSID is configured on the AP as a unique, 1-to 32- character, case-sensitive alphanumeric name.  The AP usually beacons (broadcasts) the SSID several times a second so that users who have WNICs can see a display of all WLANs within range of the AP’s signal.
  • 7. Vendor Default SSIDs 3Com 3Com, comcomcom, 101 Apple Airport Network Belkin (54G) Belkin54g Cisco tsunami Compaq COMPAQ D-Link WLAN, default Dell wireless Intel Intel, 101, XLAN, 195, Intel Gateway Linksys linksys, wireless, linksys-g Microsoft MSHOME Netgear Wireless, Netgear SMC WLAN, BRIDGE, SMC Symantec 101 U.S. Robotics WLAN, USR9106, USR5450, USR8022, USR8054
  • 8. dd-wrt  DD-WRT is Linux-based firmware for wireless routers and access points .  dd-wrt Linux embedded OS that replaces the embedded OS used on hundreds of routers from Linksys, D-Link, Netgear, Belkin, Microsoft, U.S. Robotics, Dell, Buffalo, and many others.
  • 11. Disable SSID Broadcasting • Can use a passive wireless sniffer, such as Kismet • Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. • Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. • Kismet is a very powerful wireless sniffing tool that is found in Kali Linux. This is an open-source tool very familiar to ethical hackers, computer network security professionals and penetration testers  Unlike NetStumbler, which can pick up only broadcasted SSIDs, Kismet can detect SSIDs in WLAN client traffic.
  • 12. Understanding Wireless Network Standards Standard Frequency Maximum rate Modulation method 802.11 2.4 GHz 1 or 2 Mbps FHSS/DSSS 802.11a 5 GHz 54 Mbps OFDM 802.11b 2.4 GHz 11 Mbps DSSS 802.11g 2.4 GHz 54 Mbps OFDM 802.11n 2.4 GHz 600 Mbps OFDM 802.15 2.4 GHz 2 Mbps FHSS 802.16 (WiMAX) 10–66 GHz 120 Mbps OFDM 802.20 (Mobile Wireless Access Working Group) Below 3.5 GHz 1 Mbps OFDM Bluetooth 2.4 GHz 12 Mbps Gaussian frequency shift keying (GFSK) HiperLAN/2 5 GHz 54 Mbps OFDM
  • 13. Signal Modulation  data to be moved over radio waves, it must be modulated on the carrier signal or channel.  Modulation defines how data is placed on a carrier signal.  spread spectrum modulation means data is spread across a large-frequency bandwidth instead of traveling across just one frequency band.  In other words, a group of radio frequencies is selected, and the data is “spread” across this group.
  • 14. Spread spectrum, the most widely used WLAN technology, uses the following methods:  Frequency-hopping spread spectrum (FHSS): Data hops to other frequencies to avoid interference that might occur over a frequency band. This hopping from one frequency to another occurs at split-second intervals and makes it difficult for an intruder or attacker to jam the communication channel.  Direct sequence spread spectrum (DSSS): DSSS differs from FHSS, in that it spreads data packets simultaneously over multiple frequencies instead of hopping to other frequencies.  Orthogonal frequency division multiplexing (OFDM): The bandwidth is divided into a series of frequencies called tones, which allows a higher throughput (data transfer rate) than FHSS and DSSS do.
  • 15. Understanding Wardriving  detect access points that haven’t been secured.  most APs have no passwords or security measures, so wardriving can be quite rewarding for hackers.  As of this writing, wardriving isn’t illegal; using the resources of networks discovered with wardriving is, of course, a different story.
  • 16. How It Works  To conduct wardriving, an attacker or a security tester simply drives around with a laptop computer containing a WNIC, an antenna, and software that scans the area for SSIDs. Not all WNICs are compatible with scanning software, so you might want to look at the software requirements first before purchasing the hardware.  Antenna prices vary, depending on their quality and the range they can cover. Some are as small as a cell phone’s antenna, and some are as large as a bazooka, which you might have seen in old war films. The larger ones can sometimes return results on networks miles away from the attacker. The smaller ones might require being in close proximity to the AP.  Most scanning software detects the company’s SSID, the type of security enabled, and the signal strength, indicating how close the AP is to the attacker. Because attacks against WEP are simple and attacks against WPA are possible, any 802.11 connection not using WPA2 should be considered inadequately secured. The following sections introduce some tools that many wireless hackers and security professionals use.
  • 17. NetStumbler  For Windows that enables detecting WLANs  Verifying the WLAN configuration  Detecting other wireless networks that might be interfering with a WLAN  Detecting unauthorized APs that might have been placed on a WLAN  Another feature of NetStumbler is its capability to interface with a GPS, enabling a security tester or hacker to map out locations of all WLANs the software detects.
  • 18. NetStumbler  When the program identifies an AP’s signal, it logs the SSID, MAC address of the AP, manufacturer of the AP, channel on which the signal was heard, strength of the signal, and whether encryption is enabled (but not a specific encryption type).
  • 19. Kismet  free and runs on Linux, BSD UNIX, Mac OS X, and even Linux PDAs. The software is advertised as being more than just a wireless network detector.  Kismet is also a sniffer and an intrusion detection system and  Wireshark- and Tcpdump-compatible data logging  Compatible with AirSnort and AirCrack  Network IP range detection  Detection of hidden network SSIDs  Graphical mapping of networks  Manufacturer and model identification of APs and clients  Detection of known default AP configurations
  • 20. Understanding Wireless Hacking  Hacking a wireless network isn’t much different from hacking a wired LAN.  Many of the port-scanning and enumeration tools you’ve learned about can be applied to wireless networks.
  • 21. Tools of the Trade  A wireless hacker usually has a laptop computer, a WNIC, an antenna, sniffers (Tcpdump or Wireshark, for example), tools such as NetStumbler or Kismet, and lots of patience.  After using NetStumbler or Kismet to determine the network name, SSID, MAC address of the AP, channel used, signal strength, and which type of encryption is enabled, a security tester is ready to continue testing.
  • 22. Tools of the Trade  Wireless routers that perform DHCP functions can pose a big security risk. If a wireless computer is issued an IP address, a subnet mask, and DNS information automatically, attackers can use all the skills they learned in hacking wired networks on the wireless network.  If DHCP isn’t used, attackers simply rely on Wireshark or Tcpdump to sniff packets passing through the wireless network to gather this IP configuration information. (As a security professional, you should recommend disabling DHCP on wireless networks and assigning IP addresses to wireless stations manually.)  They can then configure the WNIC with the correct IP information. What do attackers or security testers do if WEP or WPA is enabled on the AP? Several tools address this issue. AirCrack NG and WEPCrack, are what prompted organizations to replace WEP with the more secure WPA as their authentication method.
  • 23. AirCrack NG  As a security professional, your job is to protect a network and make it difficult for attackers to break in. You might like to believe you can completely prevent attackers from breaking in, but unfortunately, this goal is impossible.  AirCrack NG (included on the BackTrack files or available free at www.aircrack-ng.org) is the tool most hackers use to access WEP-enabled WLANs.  AirCrack NG replaced AirSnort, a product created by wireless security researchers Jeremy Bruestle and Blake Hegerle, who set out to prove that WEP encryption was faulty and easy to crack.  AirSnort was the first widely used WEP-cracking program and woke up nonbelievers who thought WEP was enough protection for a WLAN.  AirCrack NG took up where AirSnort (and the slightly older WEPCrack) left off.
  • 24. Countermeasures for Wireless Attacks  Many countermeasure, such as using certificates on all wireless devices, are time consuming and costly.  If you approach securing a wireless LAN as you would a wired LAN, you’ll have a better chance of protecting corporate data and network resources. Would you allow users to have access to network resources simply because they plugged their NICs into the company’s switch or hub? Of course not. Then why would you allow users to have access to a wireless LAN simply because they have WNICs and know the company’s SSID?  If a company must use wireless technology, your job is to make it as secure as possible. Be sure wireless users are authenticated before being able to access any network resources. Here are some additional guidelines to help secure a wireless network:
  • 25. Countermeasures for Wireless Attacks  honeypots, which are hosts or networks available to the public that entice hackers to attack them instead of a company’s real network.  To make it more difficult for wardrivers to discover your WLAN, you can use Black Alchemy Fake AP (available free at ww.blackalchemy.to/project/fakeap/). As its name implies, this program creates fake APs, which keeps war-drivers so busy trying to connect to nonexistent wireless networks that they don’t have time to discover your legitimate AP.  There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people in the facility. One is using a certain type of paint on the walls, but this method isn’t foolproof because some radio waves can leak out if the paint isn’t applied correctly.  Use a router to filter unauthorized MAC and IP addresses and prevent them from having network access. (can spoof)