Preview

Wifi Hacking

Powerful Essays
Open Document
Open Document
3190 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wifi Hacking
The Art of casual WiFi hacking
Jeremy Martin, CISSP-ISSAP, NSA-IAM/IEM, CEH – jeremy@infosecwriter.com It is a cloudy Friday night and I am in the listening to another episode of 2600’s “Off the hook” radio when the interruption of the phone catches my attention. I had been expecting the call from my colleague, because I needed help with some new proof-ofconcept ideas for a penetration test I have the following week. During the conversation, we eagerly decided to head out for the night to Wardrive in the area. Wardriving is always a good excuse to test new programs and ideas. We position both laptops for optimal WiFi signal, easy access to the GPS devices, and secure them for the least amount of movement while driving. Right before we leave, we make sure the power converter is turned on, and the systems are plugged in. To cover all our bases, one laptop runs Windows XP Pro, NetStumbler, and Cain&Able while the second system has Suse 9.2 Linux with Kismet, Airsnort, Aircrack, and Void11. Using two devices with such different environments improves success while surveying WiFi in an area or “footprinting” them. Here is where the fun begins. After driving for a few miles, we enter a well lit street in the business section of town, and hear the ping of live access points every few seconds. Even though we have been doing this for years, we are both amazed at the percentage of companies that employ WiFi that do not implement any sort of encryption. This allows us to park and let Kismet do what it does best... passively listen to network traffic running over the 802.11 signal. We are able to map several subnets and gather other interesting information being broadcast to the public. At the end of the night, we were able to gather over 127 WiFi hotspots after only driving seventeen miles round trip. With this type of information gathered, playtime for hackers begins.

Wardriving
Also referred to as “Geek’s catch and release fishing”, is the act of driving around and

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although the Zigbee protocol implements the Advanced Encryption Standard (AES) protocol the initial key exchange is not protected against sniffing. The network keys are often exchanged in plain text or are encoded using the default factory key. Consequently, if an attacker were to sniff the initial exchange of packets, that attacker would be able to gain access to the network keys and the entire network. The difficulty with this type of attack is that the key exchange only occurs when a new node registers with the network. After this initial exchange all packets are encoded. The trick for these types of attacks, is forcing the network to enter an initialization state. This can be accomplished by creating RF interference that will result in dropped packets. After a certain number of dropped packets a wireless node will think that it has lost connection to the network and will try to reconnect. Then when this occurs the network key can be sniffed. These types of attacks have been carried out by a large number of security researchers [6, 7, 8, 9,…

    • 734 Words
    • 3 Pages
    Good Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Mixed vendor incompatibilities, sometimes misconfigured ssids, 2 layer wireless protocol analyzers can lead to a revealing of the ssid…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    "Six Things That Block Your Wi-Fi, and How to Fix Them." PCWorld. N.p., 20 Jan.…

    • 3783 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    hobo Essay Example

    • 850 Words
    • 4 Pages

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    entities, materials, or equipment are necessarily the best available for the ..... WLAN Security Best Practices .......................................................................................8-1 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Foundation Schools

    • 4532 Words
    • 15 Pages

    Scenario: Global Communications. (n.d.). Retrieved April 9, 2008 from University of Phoenix MMPBL500r3Gap Analysis Global Communications https://ecampus.phoenix.edu/secure/resource/resource.asp…

    • 4532 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Losing Sensitive Items

    • 354 Words
    • 2 Pages

    SKL you have just given your enemy the ability to intercept all secure radio transmissions between any two operators in your area…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    3. What application and tools can be used to perform this initial reconnaissance and probing step?…

    • 681 Words
    • 3 Pages
    Good Essays

Related Topics