WIRELESS HACKING
 INTRODUCTION
 WHY?
 HOW?
 PREVENTION
 Wireless networking technology is becoming
increasingly popular but at the same time has
introduced many security issues.
 The popularity in wireless technology is driven by
two primary factors - convenience and cost.
 It works on standard IEEE 802.11 group.
 Service Set Identification
 Your router broadcasts the name of your network(SSID)
and allows others to connect wirelessly to your network.
 This feature can also b disabled.
 If you choose to disable your SSID broadcasting you will
need to setup a profile in your wireless n/w management
s/w on your wireless clients using SSID you have
chosen..
 802.11a
Frequency - 2.4000 GHz to 2.2835GHz
 802.11b
Frequency - 5.15-5.35GHz to 5.725-5.825GHz
 802.11g
Frequency - 2.4GHz
 2.4 Ghz wifi spectrum
 5 Ghz wifi spectrum
 WEP
 WPA
 WPA/PSK
 Abbreviation for Wired Equivalent Privacy.
 IEEE chose to employ encryption at the data link
layer according to RC4 encryption algorithm.
 Breakable even when configured correctly…
 Can b broken in as small as 3 min..
 Stands for Wi-Fi Protected Access.
 Hashing algorithm is used in WPA.
 Created to provide stronger security than WEP.
 Still able to be cracked if a short password is
used.
 If a long password is used, these protocol
are virtually uncrackable.
 Even with good passwords , unless you
really know what your doing, wireless
networks can be hacked…
 Strongest now-a-days.
 Theoretically un-breakable.
 But yet is somehow possible to crack it…
 When a user uses wireless internet they generate
data called “packets”.
 Packets are transmitted between the transmitting
medium and the wireless access point via radio
waves whenever the device is connected with the
access point.
 Depending on how long the device is connected, it
can generate a certain number of packets per day.
 The more users that are connected to one access
point, the more packets are generated.
HOW TO CRACK??
And this is
my
“FAKE
AP”
I am
“CLIENT”
Hi! I am
“HACKER”
Send “DEAUTH” packet
to attack the client
Client associates
to the FAKE AP.
YES!!!
 You must locate the wireless signal
 This can be done by using your default Windows
tool “View Available Wireless Network”
 More useful tools include NetStumbler and
Kismet. Kismet has an advantage over the other
because it can pick up wireless signals that are
not broadcasting their SSID.
 Once you located a wireless network you can
connect to it unless it is using authentication or
encryption.
 If it is using authentication or encryption then the
next step would be to use a tool for sniffing out
and cracking WEP keys.
 Once any of the tools has recovered enough
packets it will then go to work on reading the
captured information gathered from the packets
and crack the key giving you access.
 Other tools (such as CowPatty) can use dictionary
files to crack hard WPA keys.
 Kismet : War-driving with passive mode scanning
and sniffing 802.11a/b/g, site survey tools
 Airfart : Wireless Scanning and monitoring
 BackTrack: Linux Base Os to crack WEP
 Airjack : MITM Attack and DoS too
 WEPCrack : Cracking WEP
Find Router MAC
Change Your MAC
Find User’s MAC
Change MAC
according To User’s
MAC
 Using Following command we can get password
of WEP network
• ifconfig
• iwconfig
• macchanger
• airmon-ng
• airdump-ng
• airreplay-ng
• aircrack-ng
ifconfig – interface configuration tool similar but more
powerful than ipconfig
iwconfig – interface wireless configuration tool
macchanger – allows you to change the mac address of the
card (Spoofing)
airmon-ng – puts the card into monitor mode (promiscuous
mode) allows the card to capture packets
airdump-ng – capturing and collecting packets
aireplay-ng – used to deauthenticate and generate traffic
aircrack-ng – used to crack WEP and WPA
 This case study presents an overview of wireless
setups identified between November 22 2010 and
October 3 2011. The study covers 2,133 wireless
networks of both consumer and corporate
customers.
Wireless hacking
Wireless hacking
 Don’t broadcast your SSID . This is usually
done during the setup of your wireless router.
 Change the default router login to something
else.
 If your equipment supports it, use WPA or
WPA/PSK because it offers better encryption
which is still able to be broken but much harder.
 Always check for updates to your router.
 Turn off your router or access point when not
using it.
 There is no such thing as 100% percent security
when using wireless networks but at least with
these few simple steps you can make it harder for
the average person to break into your network.
Wireless hacking

More Related Content

PDF
Wi-fi Hacking
PPTX
PDF
Wireless Hacking
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PPTX
WiFi Secuiry: Attack & Defence
PPTX
WEP/WPA attacks
PPTX
Wi-FI Hacking
PPTX
Wireless Penetration Testing
Wi-fi Hacking
Wireless Hacking
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
WiFi Secuiry: Attack & Defence
WEP/WPA attacks
Wi-FI Hacking
Wireless Penetration Testing

What's hot (20)

PDF
Wireless Cracking using Kali
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wireless Network Security
PPT
Wi fi protected access
PPT
Proxy Server
PPTX
Wi fi security
PPTX
Introduction of firewall slides
PPTX
Ssh (The Secure Shell)
PDF
Wireless Networking Security
PPTX
Network Security
PPT
Firewall protection
PPTX
Firewall
PPT
PPTX
Wpa2 psk security measure
PPTX
Wpa vs Wpa2
PPTX
Firewall security in computer network
PPTX
Trojans and backdoors
PPT
Wireshark - presentation
PDF
TLS/SSL Internet Security Talk
Wireless Cracking using Kali
Wi-Fi security – WEP, WPA and WPA2
Wireless Network Security
Wi fi protected access
Proxy Server
Wi fi security
Introduction of firewall slides
Ssh (The Secure Shell)
Wireless Networking Security
Network Security
Firewall protection
Firewall
Wpa2 psk security measure
Wpa vs Wpa2
Firewall security in computer network
Trojans and backdoors
Wireshark - presentation
TLS/SSL Internet Security Talk

Similar to Wireless hacking (20)

PPTX
Wireless hacking
PPT
How to hack wireless internet connections
PPT
Hack wireless internet connections or wifi
PPT
Howtohackwirelessinternetconnections 100105124156-phpapp01
PPTX
Wireless Security null seminar
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
PPTX
Exploiting WiFi Security
PPTX
DevLink - WiFu: You think your wireless is secure?
PPTX
Hacking Wireless Networks : Null Delhi (November)
PPTX
WiFi security
PDF
Hacking Wireless Networks by Mandeep Singh Jadon
PDF
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
PPTX
Wireless security by mujajhid rana
PPTX
Wifi cracking
PPTX
Wi fi hacking
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
PPT
4 wifi security
PPT
How To Hack Wireless Internet Connections
PPTX
Wireless v2
Wireless hacking
How to hack wireless internet connections
Hack wireless internet connections or wifi
Howtohackwirelessinternetconnections 100105124156-phpapp01
Wireless Security null seminar
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Exploiting WiFi Security
DevLink - WiFu: You think your wireless is secure?
Hacking Wireless Networks : Null Delhi (November)
WiFi security
Hacking Wireless Networks by Mandeep Singh Jadon
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wireless security by mujajhid rana
Wifi cracking
Wi fi hacking
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008
4 wifi security
How To Hack Wireless Internet Connections
Wireless v2

Recently uploaded (20)

DOCX
Get More Leads From LinkedIn Ads Today .docx
PDF
Dominate the Explore Page Level Me Up...
PDF
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
PDF
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
PDF
Social Media Marketing Company In Nagpur
PPTX
Smart Card Face Mask detection soluiondr
PDF
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
PDF
Your Breakthrough Starts Here Make Me Popular
PDF
Presentation-Popular-Culture-in-the-Philippines.pdf
PDF
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
DOC
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
PDF
A guide to using Social Media For Business
PDF
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
PDF
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
PDF
Organizational Culture and Leadership Style as Predictors of Organizational C...
PPTX
Mindfulness_and_Coping_Workshop in workplace
PDF
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
PDF
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
PDF
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
PPTX
Philippine-Pop-Culture.pptx.hhtps.com.ph
Get More Leads From LinkedIn Ads Today .docx
Dominate the Explore Page Level Me Up...
DIGITAL MARKETING CONTENTS INCLUDING DEFINTIONS AND IMPORTANTS
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
Social Media Marketing Company In Nagpur
Smart Card Face Mask detection soluiondr
49f97d4d-be4b-40d1-88f7-06f1460c2238.pdf
Your Breakthrough Starts Here Make Me Popular
Presentation-Popular-Culture-in-the-Philippines.pdf
Optimizing Customer Lifetime Value (CLV) Prediction Models in Retail Banking ...
ASU毕业证学历认证,圣三一拉邦音乐与舞蹈学院毕业证留学本科毕业证
A guide to using Social Media For Business
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
The Effect of Internships on Career Preparedness as Perceived by Criminology ...
Organizational Culture and Leadership Style as Predictors of Organizational C...
Mindfulness_and_Coping_Workshop in workplace
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
Buy Verified Cryptocurrency Accounts - Lori Donato's blo.pdf
Effectiveness of Good Corporate Governance and Corporate Social Responsibilit...
Philippine-Pop-Culture.pptx.hhtps.com.ph

Wireless hacking

  • 2.  INTRODUCTION  WHY?  HOW?  PREVENTION
  • 3.  Wireless networking technology is becoming increasingly popular but at the same time has introduced many security issues.  The popularity in wireless technology is driven by two primary factors - convenience and cost.  It works on standard IEEE 802.11 group.
  • 4.  Service Set Identification  Your router broadcasts the name of your network(SSID) and allows others to connect wirelessly to your network.  This feature can also b disabled.  If you choose to disable your SSID broadcasting you will need to setup a profile in your wireless n/w management s/w on your wireless clients using SSID you have chosen..
  • 5.  802.11a Frequency - 2.4000 GHz to 2.2835GHz  802.11b Frequency - 5.15-5.35GHz to 5.725-5.825GHz  802.11g Frequency - 2.4GHz
  • 6.  2.4 Ghz wifi spectrum  5 Ghz wifi spectrum
  • 8.  Abbreviation for Wired Equivalent Privacy.  IEEE chose to employ encryption at the data link layer according to RC4 encryption algorithm.  Breakable even when configured correctly…  Can b broken in as small as 3 min..
  • 9.  Stands for Wi-Fi Protected Access.  Hashing algorithm is used in WPA.  Created to provide stronger security than WEP.  Still able to be cracked if a short password is used.
  • 10.  If a long password is used, these protocol are virtually uncrackable.  Even with good passwords , unless you really know what your doing, wireless networks can be hacked…
  • 11.  Strongest now-a-days.  Theoretically un-breakable.  But yet is somehow possible to crack it…
  • 12.  When a user uses wireless internet they generate data called “packets”.  Packets are transmitted between the transmitting medium and the wireless access point via radio waves whenever the device is connected with the access point.
  • 13.  Depending on how long the device is connected, it can generate a certain number of packets per day.  The more users that are connected to one access point, the more packets are generated.
  • 15. And this is my “FAKE AP” I am “CLIENT” Hi! I am “HACKER” Send “DEAUTH” packet to attack the client Client associates to the FAKE AP. YES!!!
  • 16.  You must locate the wireless signal  This can be done by using your default Windows tool “View Available Wireless Network”  More useful tools include NetStumbler and Kismet. Kismet has an advantage over the other because it can pick up wireless signals that are not broadcasting their SSID.
  • 17.  Once you located a wireless network you can connect to it unless it is using authentication or encryption.  If it is using authentication or encryption then the next step would be to use a tool for sniffing out and cracking WEP keys.
  • 18.  Once any of the tools has recovered enough packets it will then go to work on reading the captured information gathered from the packets and crack the key giving you access.  Other tools (such as CowPatty) can use dictionary files to crack hard WPA keys.
  • 19.  Kismet : War-driving with passive mode scanning and sniffing 802.11a/b/g, site survey tools  Airfart : Wireless Scanning and monitoring  BackTrack: Linux Base Os to crack WEP  Airjack : MITM Attack and DoS too  WEPCrack : Cracking WEP
  • 20. Find Router MAC Change Your MAC Find User’s MAC Change MAC according To User’s MAC
  • 21.  Using Following command we can get password of WEP network • ifconfig • iwconfig • macchanger • airmon-ng • airdump-ng • airreplay-ng • aircrack-ng
  • 22. ifconfig – interface configuration tool similar but more powerful than ipconfig iwconfig – interface wireless configuration tool macchanger – allows you to change the mac address of the card (Spoofing) airmon-ng – puts the card into monitor mode (promiscuous mode) allows the card to capture packets airdump-ng – capturing and collecting packets aireplay-ng – used to deauthenticate and generate traffic aircrack-ng – used to crack WEP and WPA
  • 23.  This case study presents an overview of wireless setups identified between November 22 2010 and October 3 2011. The study covers 2,133 wireless networks of both consumer and corporate customers.
  • 26.  Don’t broadcast your SSID . This is usually done during the setup of your wireless router.  Change the default router login to something else.  If your equipment supports it, use WPA or WPA/PSK because it offers better encryption which is still able to be broken but much harder.  Always check for updates to your router.  Turn off your router or access point when not using it.
  • 27.  There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.