SlideShare a Scribd company logo
Wireless Security
Hide yo kids, Hide yo Wi-Fi
Scope
Home Wi-fi
Public Wireless Usage
Home Wi-Fi
Wireless Threats
• Exposing your home network
due to low security
• Unauthorized Access, Denial
of Service
• Packet Sniffing
• Rouge AP
• War Driving
• Man in the Middle attacks
• Stolen Information
(Credentials, Bank Info, etc.)
Securing your Home Wifi
• Encrypt your Wi-Fi
• List of router default
passwords
• WEPS vs. WPS vs. WPA/2
• WEPS and WPS easily
cracked
• TKIP is depreciated
• WPA can have handshake
stolen and be brute forced
(rainbow tables)
• Use STRONG
PASSWORDS
SSID
• Always Change from the
Default SSID
• Do not include any
identifying information
• Apt #, Name, DOB,
Router info etc.
• Make it Hidden
MAC Filtering
• A MAC address identifies the
individual piece of equipment
connected to your network.
• You can set up to allow only
certain MAC’s onto your
network
• *WARNING* THIS CAN BE
SPOOFED
Finding Your MAC
Address
iOS
• Settings ->
• General ->
• About ->
• Wi-Fi Address
• Android
• Setting ->
• Wireless and Networks->
• Wi-Fi->
• Advanced
Finding Your MAC
Address (cont.)
OSX
• ifconfig
• en0 -> ether
Windows
• ipconfig
• Physical address
Linux (Mint)
• ifconfig
• hwaddr
Guest Network
• Creates a network separate
from your normal Wi-Fi
network. Removes access to
file shares, network locations
and devices.
• Still needs to be secured.
• Some router have an insecure
implementation of guest
networks
Firmware
• Always ensure your firmware
is up to date
• Your router can be
attacked and added to a
botnet
• News Article
Who’s on your network?
• Monitor your home network.
• How many devices are
connected to it?
• Wifi monitoring tools:
• Xirrus
• OpenNMS
• Often right on your Wi-Fi
router
Additional Measures
• Decrease your Wi-Fi signal
strength
• Anti Wi-Fi Paint?
• I have a feeling this will
mess with cell phone
reception as well, but
YMMV
Public Wi-Fi
3 Common Attacks
• Rouge AP
• Evil Twin
• Man in the middle
• Pineapple
• Packet Sniffing
• Wireshark
• Airpcap
• Mobile Charging Stations
Christmas Shopping
Rouge AP
• Evil Twin
• Some creates a Wi-fi
hotspot with the same
name as the trusted
public hotspot
• You connect to it
• You are networked with
the attacker
Rouge AP
• Man in the Middle
• Usually starts as an evil
twin attack
• Rather than attack you
machine directly, attacker
forwards all your network
traffic to wherever you
wanted it to go.
• Attack can intercept,
decrypt or alter your
packets
• Stolen credentials, cc
numbers etc.
Rouge AP - Pineapple
• Combines Evil Twin, Man in
the Middle and a whole lot
more into one piece of
Hardware
• Karma
• Your device probes for a
trusted hotspot, Karma
says “that’s me!” and you
connect
• SSL stripping
(https://scotthelme.co.uk/wifi-
pineapple-karma-sslstrip)
• Mitigated with HSTS, but
new attacks are being
developed to beat this.
Beef
Packet Sniffing
• Captures PCAP (packet
capture) files
• These can be analyzed to
pull out very relevant
information
• MAC/IP addresses
• Credentials
• Websites visited
• Geolocation tags
• Basically anything that
is passed over the
network
• 100% passive attack
Packet Sniffing
• Wireshark example
Not really wireless, but…
• Phony Mobile Charging
Stations
• “Juice Jacking”
• Attacker sets up computer
with multiple charge
cables attached
• When you plug in, the
computer attempts to rip
everything it can from
inside your phone
Mitigation Techniques
Device Settings
• Forget Wireless Connections
• Turn off wifi when not in use
• Turn off file/print share
• Browser extensions to force
SSL
• Enable your Host-based
firewall if you have one
Things you can do
• Always Verify the name of your public
network
• Avoid logging into any websites while on
public Wi-Fi (Social media, financial, etc.)
• Try not avoid public networks
• Use your cell phone
• If you cant, be sure they are
password protected or that are
unencrypted/weak encryption
• Always check for SSL connections!
• USE A VPN!
• Ensure OS is up to date.
VPN options
Paid
• KeepSolid
• NordVPN
• Hidemyass
Free
• AnchorFree
• SpotFLux
• Beware of free or ad driven VPN.
Nothing is ever free.
Implement your own
• This does expose your network to the
internet
• OpenVPN
Thank you for coming!
Please fill out a survey, check out the other Free Geek Courses, and feel free to give
suggestions on other topics you would like to see or ways to improve current
classes!

More Related Content

DOC
Remote monitoring system
PPTX
Demystifying Wireless Security Using Open Source Options
PPTX
CSCI 1100 Group 1 project 1
PPTX
Uncommon MiTM in uncommon conditions
PPTX
Session810 ken huang
PPTX
Google wi fi
KEY
Edu camp presentation 13/4/12
PPT
Wifi Cracking - Step by Step Using Backtracks Tool
Remote monitoring system
Demystifying Wireless Security Using Open Source Options
CSCI 1100 Group 1 project 1
Uncommon MiTM in uncommon conditions
Session810 ken huang
Google wi fi
Edu camp presentation 13/4/12
Wifi Cracking - Step by Step Using Backtracks Tool

What's hot (20)

PPT
Bluetooth IN OUR life
PPTX
Overview on QUBEE Pocket Wi-Fi
PDF
DataSheet-Tely
PPTX
How to create a Wi-Fi hotspot using your?
PPT
Threats to Mobile Computing
PPTX
44CON @ IPexpo - You're fighting an APT with what exactly?
PPTX
Hacking routers as Web Hacker
PPTX
QUBEE modems
PDF
wifi-y3dips-stmik_mdp_slides
PDF
Get started with Sigfox - IoT Shifts 2015
PPT
How it Works
PPT
Bluetooth technology by shamshad
PDF
Datasheet EnGenius EZ Hotspot Extender
PDF
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
PDF
Cctv mtnl config
PPTX
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
PDF
Logging into the Network!
PPTX
Near field communication
PDF
OSGi Service Platform in Home Control, Entertainment and Communications Appli...
PPTX
Wireless networks
Bluetooth IN OUR life
Overview on QUBEE Pocket Wi-Fi
DataSheet-Tely
How to create a Wi-Fi hotspot using your?
Threats to Mobile Computing
44CON @ IPexpo - You're fighting an APT with what exactly?
Hacking routers as Web Hacker
QUBEE modems
wifi-y3dips-stmik_mdp_slides
Get started with Sigfox - IoT Shifts 2015
How it Works
Bluetooth technology by shamshad
Datasheet EnGenius EZ Hotspot Extender
44CON London 2015 - Smart Muttering; a story and toolset for smart meter plat...
Cctv mtnl config
ZyXEL MWC 2014 Small Business Gateway (SBG) Product Scope and Features
Logging into the Network!
Near field communication
OSGi Service Platform in Home Control, Entertainment and Communications Appli...
Wireless networks
Ad

Similar to Wireless v2 (20)

PPTX
Wireless hacking
PPTX
DevLink - WiFu: You think your wireless is secure?
PPTX
Wireless hacking
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
WiFi security
PDF
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
PPTX
05 wi fi network security
PPTX
Wi-Fi Hacking with the help of various tools.pptx
PDF
IT infrastructure security 101
PDF
Wireless security
PDF
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
PPT
Howtohackwirelessinternetconnections 100105124156-phpapp01
PPT
How to hack wireless internet connections
PDF
WiFi Intrustion Detection from WireShark SharkFest
PPT
Hack wireless internet connections or wifi
PPTX
Wireless Security
DOCX
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
PDF
Wi-Fi Hotspot Attacks
PPTX
Tingling wireless security
PPTX
Public Wi-Fi security 101
Wireless hacking
DevLink - WiFu: You think your wireless is secure?
Wireless hacking
PACE-IT, Security+3.4: Summary of Wireless Attacks
WiFi security
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
05 wi fi network security
Wi-Fi Hacking with the help of various tools.pptx
IT infrastructure security 101
Wireless security
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Howtohackwirelessinternetconnections 100105124156-phpapp01
How to hack wireless internet connections
WiFi Intrustion Detection from WireShark SharkFest
Hack wireless internet connections or wifi
Wireless Security
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Wi-Fi Hotspot Attacks
Tingling wireless security
Public Wi-Fi security 101
Ad

More from Joshua Johnston (7)

PPTX
Free geek class on Data privacy
PPTX
Holiday scams
PPTX
IoT -Internet of Things
PPTX
FreeGeek -Cryptocurrency and Blockchain
PPTX
Holiday scams
PPTX
Home computing security
PDF
Intro to firewalls
Free geek class on Data privacy
Holiday scams
IoT -Internet of Things
FreeGeek -Cryptocurrency and Blockchain
Holiday scams
Home computing security
Intro to firewalls

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
The various Industrial Revolutions .pptx
PDF
project resource management chapter-09.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Chapter 5: Probability Theory and Statistics
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Getting Started with Data Integration: FME Form 101
PDF
Hybrid model detection and classification of lung cancer
PPT
What is a Computer? Input Devices /output devices
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
STKI Israel Market Study 2025 version august
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Modernising the Digital Integration Hub
Module 1.ppt Iot fundamentals and Architecture
Programs and apps: productivity, graphics, security and other tools
Hindi spoken digit analysis for native and non-native speakers
The various Industrial Revolutions .pptx
project resource management chapter-09.pdf
Getting started with AI Agents and Multi-Agent Systems
O2C Customer Invoices to Receipt V15A.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Chapter 5: Probability Theory and Statistics
August Patch Tuesday
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence
Getting Started with Data Integration: FME Form 101
Hybrid model detection and classification of lung cancer
What is a Computer? Input Devices /output devices
NewMind AI Weekly Chronicles – August ’25 Week III
STKI Israel Market Study 2025 version august
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf

Wireless v2

  • 1. Wireless Security Hide yo kids, Hide yo Wi-Fi
  • 4. Wireless Threats • Exposing your home network due to low security • Unauthorized Access, Denial of Service • Packet Sniffing • Rouge AP • War Driving • Man in the Middle attacks • Stolen Information (Credentials, Bank Info, etc.)
  • 5. Securing your Home Wifi • Encrypt your Wi-Fi • List of router default passwords • WEPS vs. WPS vs. WPA/2 • WEPS and WPS easily cracked • TKIP is depreciated • WPA can have handshake stolen and be brute forced (rainbow tables) • Use STRONG PASSWORDS
  • 6. SSID • Always Change from the Default SSID • Do not include any identifying information • Apt #, Name, DOB, Router info etc. • Make it Hidden
  • 7. MAC Filtering • A MAC address identifies the individual piece of equipment connected to your network. • You can set up to allow only certain MAC’s onto your network • *WARNING* THIS CAN BE SPOOFED
  • 8. Finding Your MAC Address iOS • Settings -> • General -> • About -> • Wi-Fi Address • Android • Setting -> • Wireless and Networks-> • Wi-Fi-> • Advanced
  • 9. Finding Your MAC Address (cont.) OSX • ifconfig • en0 -> ether Windows • ipconfig • Physical address Linux (Mint) • ifconfig • hwaddr
  • 10. Guest Network • Creates a network separate from your normal Wi-Fi network. Removes access to file shares, network locations and devices. • Still needs to be secured. • Some router have an insecure implementation of guest networks
  • 11. Firmware • Always ensure your firmware is up to date • Your router can be attacked and added to a botnet • News Article
  • 12. Who’s on your network? • Monitor your home network. • How many devices are connected to it? • Wifi monitoring tools: • Xirrus • OpenNMS • Often right on your Wi-Fi router
  • 13. Additional Measures • Decrease your Wi-Fi signal strength • Anti Wi-Fi Paint? • I have a feeling this will mess with cell phone reception as well, but YMMV
  • 15. 3 Common Attacks • Rouge AP • Evil Twin • Man in the middle • Pineapple • Packet Sniffing • Wireshark • Airpcap • Mobile Charging Stations
  • 17. Rouge AP • Evil Twin • Some creates a Wi-fi hotspot with the same name as the trusted public hotspot • You connect to it • You are networked with the attacker
  • 18. Rouge AP • Man in the Middle • Usually starts as an evil twin attack • Rather than attack you machine directly, attacker forwards all your network traffic to wherever you wanted it to go. • Attack can intercept, decrypt or alter your packets • Stolen credentials, cc numbers etc.
  • 19. Rouge AP - Pineapple • Combines Evil Twin, Man in the Middle and a whole lot more into one piece of Hardware • Karma • Your device probes for a trusted hotspot, Karma says “that’s me!” and you connect • SSL stripping (https://scotthelme.co.uk/wifi- pineapple-karma-sslstrip) • Mitigated with HSTS, but new attacks are being developed to beat this.
  • 20. Beef
  • 21. Packet Sniffing • Captures PCAP (packet capture) files • These can be analyzed to pull out very relevant information • MAC/IP addresses • Credentials • Websites visited • Geolocation tags • Basically anything that is passed over the network • 100% passive attack
  • 23. Not really wireless, but… • Phony Mobile Charging Stations • “Juice Jacking” • Attacker sets up computer with multiple charge cables attached • When you plug in, the computer attempts to rip everything it can from inside your phone
  • 25. Device Settings • Forget Wireless Connections • Turn off wifi when not in use • Turn off file/print share • Browser extensions to force SSL • Enable your Host-based firewall if you have one
  • 26. Things you can do • Always Verify the name of your public network • Avoid logging into any websites while on public Wi-Fi (Social media, financial, etc.) • Try not avoid public networks • Use your cell phone • If you cant, be sure they are password protected or that are unencrypted/weak encryption • Always check for SSL connections! • USE A VPN! • Ensure OS is up to date.
  • 27. VPN options Paid • KeepSolid • NordVPN • Hidemyass Free • AnchorFree • SpotFLux • Beware of free or ad driven VPN. Nothing is ever free. Implement your own • This does expose your network to the internet • OpenVPN
  • 28. Thank you for coming! Please fill out a survey, check out the other Free Geek Courses, and feel free to give suggestions on other topics you would like to see or ways to improve current classes!