WIRELESS LAN SECURITY (IEEE b) A Thesis. Submitted to the Department of Computer Science and Engineering. BRAC University.
|
|
|
- Justin Wheeler
- 10 years ago
- Views:
Transcription
1 WIRELESS LAN SECURITY (IEEE b) A Thesis Submitted to the Department of Computer Science and Engineering of BRAC University By Iftheker Mohammad Student ID: & Mohammad Ashik Elahi Student ID: In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Computer Science May 2008
2 2 DECLARATION I hereby declare that this thesis is based on the results found by myself. Materials of work found by other researcher are mentioned by reference. This thesis, neither in whole nor in part, has been previously submitted for any degree. Signature of Supervisor Signature of Authors
3 3 ACKNOWLEDGMENTS Special thanks to Sadia Hamid Kazi, Senior Lecturer, BRAC University for guide us to complete this work and give us time out of her busy schedules to consider this work. We also acknowledge Risat Mahmud Pathan, Senior Lecturer, BRAC University as giving us the preliminary idea of wireless network.
4 4 ABSTRACT There is much regulatory and standards work in the area of network security, especially in wireless network. The wireless LAN standard IEEE b provides a mechanism for authentication and encryption. This paper describes the security of Wireless Local Area Networks based on the IEEE standard. Such networks are also known as Wi-Fi Networks or WLANs. We have analyzed different tools that used, to attack a wireless network. We have successfully detect different types of attack and found some flaws in WLAN. We conclude this research with several recommendations that will help improve security at a wireless deployment site.
5 5 TABLE OF CONTENTS Page TITLE... 1 DECLARATION ACKNOWLEDGEMENTS...3 ABSTRACT...4 TABLE OF CONTENTS LIST OF TABLES...6 LIST OF FIGURES...6 CHAPTER I INTRODUCTION 1.1 Overview of WLAN How does WLAN work?...8 CHAPTER II METHODOLOGY 2.1 Working Methods Analyzed Tools.. 9 CHAPTER III ANALYZING WI-FI NETWORK TRAFFIC 3.1 Overview Information about Data frame Information about Control frames Information about Management frames Frame formats. 14 CHAPTER IV WLAN SECURITY ISSUE 4.1 Overview Wireless LAN sniffing.16
6 NetSstumbler Kismat WLAN MAC ADDRESS SPOOFING Obfuscating network presence Bypassing access control lists: Authenticated user impersonation Fake Access Point Wired Equivalent Privacy (WEP) AirSnort Man in the middle attack AirJack CHAPTER V SECURITY FLAWS DETECTACTION 5.1 NetStumbler detection Wellenreiter detection FakeAP detection AirSnort detection Airjack detection..26 CHAPTER VI CONCLUSION 6.1 Conclusion.. 28 LIST OF TABLES 1.1 Characteristics of different version of wireless network protocols XOR Byte Comparison Payload string of different version of NetStumbler 21 LIST OF FIGURES 3.1 Basic WLAN MAC Frames Format Basic WLAN Frame sequence number Control frame field Management frame field Information available from an analysis of Wi-Fi frames Size 13
7 7 3.6 Basic protocols and flow of frames when connecting to an access point Parking Lot attacker in WLAN A rouge Access point Man in the middle attack Denial of service using AirJack.20 REFERENCES...29 NOTES
8 8 CHAPTER I INTRODUCTION 1.1 Overview of WLAN: Wireless LAN [1] is a member of the IEEE 802 family of specifications for Local Area Networks which allows computers to get connected to a network through wireless. And because of wireless is a shared medium, everything that is transmitted or received over a wireless network can be intercepted. Table 1.1 Characteristics of different version of wireless network protocols. A survey had found that about 70% of wireless network have no security at all. Among them IEEE b [2] is the most popular and widely used protocol in wireless arena. So, we choose b and it s really important to ensure security in WLAN. 1.2 How does WLAN work? There are two basic modes of operation specified in the standard. The most commonly used mode is the infrastructure mode. The infrastructure mode allows for either one of the entities to be an access point. In ad-hoc mode all entities are considered clients. Ad-hoc mode may also be referred to as independent mode. Stations in ad-hoc mode participate in an ad-
9 9 hoc network, likewise if they are in infrastructure mode they participate in an infrastructure network. Interface of a client or access point contains a radio and an antenna. To avoid interference and allow networks to operate in the same locations, IEEE specifies groups of frequencies that may be utilized by a network. CHAPTER II Methodology 2.1 Working Methods: Our Methodology of solving the security problems are as follows: Setup a Lab environment.(ap, Valid client, attacker.) Analyzing well-known attacking tools. Trace data sent and received by attacking tools. Analyze captured frame to detect attacks type. Give solution based on that recognized attacks. We had configured and Access Point, one valid client and an attacker. We also successfully transferred and received a fixed amount of data between the AP and the client. Attacker use different tools to gain access to AP and meanwhile we trace the data coming in and going out from AP. 2.2 Analyzed Tools: Tools we have used are: analyzed tools Tehereal for tracing data sent by attacking tools Wireshark to sniff network NetStumbler to test WLAN sniffing Kismet to test passive sniffing Wellenreiter for WLAN MAC spoofing AirSnrot for WEP cracking AirJack to test Man-In-the-Middle attack
10 10 CHAPTER III Analyzing Wi-Fi Network Traffic 3.1 Overview Every packet transmitted in Wi-Fi networks contains bits of information used to maintain the various layers of the communication. Although packets may be encrypted in Wi-Fi networks, they still have plaintext headers. The headers are valuable to anyone analyzing the network. The entire MAC (Media Access Control) frame displayed in the above figure is easily available to user-space tools in Linux. All packets in a Wi-Fi network conform to the MAC frame format. The Frame Control field specifies which type of payload the MAC frame transports. There are three main types of packets and many subtypes. Data Frames Carry Higher Level Protocol data. Control Frames RTS, CTS, ACK etc. RTS stands for Request to send. That means When Source want to send data to destination RTS frame is sent. CTS stand for clear to send. When the destination wants to say the source that, it is ready to receive. Management Frames Beacon, Probe, Association, Authentication, Deauthentication etc. Fig. 3.1 Basic WLAN MAC Frame Format [3] In this frame 2 bytes sequence number is important.
11 11 Fig. 3.2 Basic WLAN Frame sequence number The IEEE dedicated two bytes of every frame for sequence control fields: four bits for a fragment number and 12 bits for a sequence number. When management or data frames need to be fragmented they are transmitted in portions with a constant sequence number and incrementing fragment numbers for each portion of the packet. We will again focus on sequence number in FakeAP detection, Man-In-Middle attack detection. 3.2 Information about Data frame [3] WEP or WPA encryption: B14 = 1 Type of payload: E.g. if the destination address is the broadcast address, and the size of the payload is 68 bytes, then it is very likely to be an Address Resolution Protocol (ARP) request. Only data packets with Frame Capability: ToDS = 1 and FromDS = 1, are transmitted. MAC address of access point: In MAC header: Address 1, 2 or 3. MAC address of mobile stations: In MAC header: Address 1, 2, 3 or 4. MAC address of wired stations: In MAC header: Address 1, 2, 3 or 4.
12 Information about Control frames [3] Fig. 3.3 Control frame field. Network is part of a WDS: ToDS = 1 and FromDS = 1. Network is in ad-hoc mode: ToDS = 0 and FromDS = 0; and Type = Data. NeNetwork is in infrastructure mode: ToDS = 1 or FromDS = 1; and Type = Data. 3.4 Information about Management frames [3] Some management frames transmit many parameters about the network. The beacon frame is one of them. Access points will broadcast beacon frames to inform stations that they are available. The frames provide enough information for a client to be able to join the network. However management frames are strictly used to administer the network connections. They do not send any data from the application layer. Fig. 3.4 Management frame field.
13 13 Network is in ad-hoc mode: B0 = 0 and B1 = 1. WEP is required: B4 = 1. Beacon interval: is the time between each transmitted beacon frame (typically100*1024µs = 100ms). Service Set Identity (SSID) [4]: a string of maximum 32 bytes/ characters that gives a human readable identification of a Wi-Fi network. It also serves another purpose to group together multiple access points to form a network of collaborating access points (AP). Supported rates: a list of supported transmit rates in the network. Extended supported rates: other supported rates. Channel: the channel the network is operating on. Network is in infrastructure mode: B0 = 1 and B1 = 0. Fig. 3.5 Information available from an analysis of Wi-Fi frames Size
14 14 Fig. 3.6 this figure illustrates the basic protocols and flow of frames when connecting to an access point First the client will detect access points either by sending a probe request and receiving a probe response, or purely by looking at the beacon frames frequently transmitted by an access point. Upon discovery, the client may try to authenticate to the access point. If successfully authenticated, the client may try to associate with the access point by sending an association request. If permitted by the access point the client will receive a positive association response. WEP is skipped here (open system authentication is used), and the real authentication is performed after association. 3.5 Frame formats: In wireless network communication there are two types of frame available. Long preamble: Compatible with legacy IEEE* systems operating at 1 and 2 Mbps (Megabits per second) PLCP with long preamble is transmitted at 1 Mbps regardless of transmit rate of data frames. Total Long Preamble transfer time is a constant at 192 Micro sec. Short preamble: is transmitted at 1 Mbps and header at 2 Mbps. Total short Preamble transfer time is a constant at 96 micro seconds. Short preamble more efficient than long preamble. The preamble is used to communicate to the receiver that the data is on its way. Technically speaking, it is the first portion of the Physical Layer Convergence Protocol (PLCP). Each preamble have atmost 2312 bytes of payload. The payload allows the receiver to acquire the wireless signal and synchronize itself with the transmitter.
15 15 CHAPTER IV WLAN Security Issue 4.1 Overview: The pictures below shows you a small scenario, where the attacker can take position. As it is a wireless network, an attacker can took position in anywhere the network available. It can be an individual try to gain access to AP, or may be a fake AP try to be the part of a network. Fig. 4.1 Parking Lot attacker in WLAN Fig. 4.2 a rouge Access point
16 Wireless LAN sniffing: Sniffing is much easier to do in wireless network. One doesn t needs to be physically connected to the network to sniff. Generally sniffing is done by a sniffing program which copies of a network packet sent by machine A intended to be received by machine B. There are two types of sniffing tools; one is active sniffer and other one passive sniffer. Active sniffer uses probe request frames on each channel where it is able to detect wireless activity (to avoid blocking the discovery process on frequencies that are not in use). When an AP comes within range of the client and receives a probe request frame it will typically respond with a probe response frame containing the network ESSID. Passive sniffer utilizes a completely passive method of WLAN discovery known as radio frequency monitoring (RFMON). A client with a wireless card that is configured in RFMON mode will be able to capture all RF signals on the channels to which it is configured to listen. While in RFMON mode, wireless clients are unable to transmit any frames; their cards are only able to receive, and therefore capture traffic. This limits the client to reporting only current or recorded network traffic NetSstumbler: A good example of active sniffer is NetSstumbler. NetStumber is a very popular tool for Windows users, utilizing active scanning through the use of probe requests sent to a broadcast address with a broadcast BSSID and an unspecified ESSID (length of 0). The probe requests are difficult to identify definitively as NetStumbler activity since NetStumbler utilizes the active scanning method described in the IEEE specifications without anomalous characteristics Kismat: Kismet [5] detects the presence of wireless networks, including those with hidden SSIDs. It can discover and report the IP range used for a particular wireless network, as well as its signal and noise levels. Kismet can also capture or sniff all network management data packets for an available wireless network. Kismet works by putting the wireless client adapter into RF monitor mode. While in socalled rfmon mode, the wireless client is not (and cannot be) associated with any access point. Instead, it listens to all wireless traffic. Consequently, your wireless card cannot maintain a functional network connection while under Kismet control.
17 WLAN MAC address spoofing : The phrase MAC address spoofing [6] in this context relates to an attacker altering the Manufacturer assigned MAC address to any other value. Nearly all cards in use permit their MAC addresses to be altered, often with full support and drivers from the manufacturer. Using Linux open-source drivers, a user can change their MAC address with the ifconfig tool. Windows users are commonly permitted to change their MAC address by selecting the properties of their network card drivers in the network control panel applet. An attacker may choose to alter their MAC address for several reasons, including obfuscating their presence on a network, to bypass access control lists, or to impersonate an already authenticated user. Each is explained in greater detail as follows: Obfuscating network presence: An attacker might choose to change their MAC address in an attempt to evade network intrusion detection systems (NIDS). A common example is an attacker executing a brute- force attack script with a random MAC address for each successive connection attempt Bypassing access control lists: Used as a basic form of access control on WLANs, administrators typically have the option to configure access points or neighboring routers to permit only registered MAC addresses to communicate on the network. An attacker could circumvent this form of access control by passively monitoring the network and generate a list of MAC addresses that are authorized to communicate. With the list of authorized MAC addresses in hand, an attacker is free to set their MAC address to any of the authorized addresses, bypassing the intended security mechanism Authenticated user impersonation: Certain hardware WLAN security authentication devices rely on matching user authentication credentials to the source MAC address of a client. After a user has successfully authenticated, the security gateway permits traffic based on a dynamic list of authorized MAC addresses. An attacker wishing to avoid the security of the device, s/he only needs to monitor the network activity for an authorized client s MAC address. Then alter their MAC address to match the authenticated client before communicating on the network.
18 Fake Access Point: FakeAP [7] is a Perl script that utilizes the HostAP client drivers and a dictionary word list to generate beacon frames in an attempt to fool NetStumbler, Kismet and other wireless LAN discovery applications. In order to make the generated traffic appear valid, FakeAP supports changing transmit signal strength and MAC addresses for each unique SSID advertisement. The authors of FakeAP were resourceful in their MAC address generation code, using a list of allocated OUIs [8] with three trailing random octets to generate a MAC address that will escape the anomalous MAC prefix detection method described above. 4.5 Wired Equivalent Privacy (WEP): WEP [9] is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. WEP incorporates two main types of protection: a secret key and encryption. The secret key is a simple 5- or 13- character password that is shared between the access point and all wireless network users. This key is all-important to WEP in that it is also used in the encryption process to uniquely scramble each packet of information with a unique password. This ensures that if a hacker cracks one packets key, he won t be able to view every packet s information. To do this, WEP defines a method to create a unique secret key for each packet using the 5- or 13-characters of the pre-shared key and three more psuedo-randomly selected characters picked by the wireless hardware. For example, let s assume that our pre-shared key was games. This word would then be merged with abc to create a secret key of abcgames, which would be used to encrypt the packet. The next packet would still use games, but concatenate it this time with xyz to create a new secret key of xyzgames. This process would randomly continue during the transmission of data. This changing part of the secret key is called the Initialization Vector because it initializes the encryption process for each packet of data sent.there exists some WEP cracking software to crack WEP. Normally it will take hours to check and crack WEP secret key depending on how many bits it used to encrypt. An example of a WEP cracking tool is AirSnort. It is important to understand the basics of XOR when discussing RC4 and WEP because it is used in the encryption process to create the encrypted data. XOR is just a simple binary comparison between two bytes that produces another byte as a result of a simple process. In short, it takes each corresponding bit in a byte and compares them by asking Is this bit different from that bit? If the answer is yes, the result is 1; otherwise it is a 0. Figure illustrates below.
19 19 Original bit XOR bit Resulting bit Table 4.1 XOR Byte Comparison AirSnort: The most commonly used tool for WEP key extraction is the Linux program AirSnort. An intruder using AirSnort would surreptitiously collect wireless network traffic of the target network. When enough frames have been collected from the network, AirSnort can determine the WEP key of the network by examining the weak frames. It usually takes only a few hours to collect enough frames. Manufacturers have released updated firmware that addresses the transmission of such weak frames; however, a network remains vulnerable if a client continues to use an outdated wireless network adapter. 4.6 Man in the middle attack: Assume that station B was authenticated with C, a legitimate AP. Attacker X is a laptop with two wireless cards. Through one card, he will present X as an AP. Attacker X sends De-authentication frames to B using the C s MAC address as the source, and the BSSID he has collected. B gets de-authenticated and begins a scan for an AP and may find X on a channel different from C. There is a race condition between X and C. If B associates with X, the MITM attack succeeded. X will re-transmit the frames it receives from B to C, and the frames it receives from C to B after suitable modifications.
20 20 The package of tools called AirJack: Fig. 4.3 Man in the middle attack. Includes a program called monkey_jack that automates the MITM attack. This is programmed well so that the odds of it winning in the race condition mentioned above are improved. Attacker on machine X inserts himself between two hosts B and C by (i) poisoning B so that ARP poisoning: Fig Denial of service using AirJack
21 AirJack: AirJack is a suite of tools that is designed as a proof-of-concept to establish layer 1 man- in-the-middle attacks against networks. Included in this toolset is wlan-jack, a tool to perform a denial-of-service attack against users on a target wireless network; it works by sending spoofed de-authenticate frames to a broadcast address, purportedly from the network access point s MAC address. Using the wlan-jack tool is simple; an attacker only has to be in range of the clients on the wireless network to be effective. This tool works because the clients that receive the de-authenticate frames believe they have been sent from the access point they are currently associated with. Since wlan-jack has to spoof the MAC address of the target access point, we have the opportunity to identify this traffic as anomalous based on sequence number analysis. 5.1 NetStumbler detection CHAPTER V Security Flaws Detectaction In a posting to the Kismet Wireless mailing list on March , Mike Craik first identified a unique pattern that can be used to identify NetStumbler traffic. LLCencapsulated frames generated by NetStumbler will use an organizationally unique identifier (OUI) of 0x00601d and protocol identifier (PID) of 0x0001. NetStumber also uses a data payload size of 58 bytes containing a unique string that can be used to identify the version of NetStumbler. NetStumble Payload String Flurble gronk bloopit, bnip Frundletrune All your b are belong to us intentionally blank 1 Table 5.1 Payload string of different version of netstumbler It is possible to detect NetStumbler by analyzing the probe requests coming from clients with above like format. So,
22 22 "If probe request frame = (wlan.fc.type_subtype = 0x08 and llc.oui = 0x00601d and llc.pid = 0x0001) and (data[14:4] = 69:6e:74:65 and data[18:4] = 6E:74:69:6f and data[22:4] = 6e:61:6c:6c and data[26:4] = 79:20:62:6c and data[30:4] = 61:6e:6b:20) then NetStumbler detected". The following detect is taken from NetStumbler version using a Windows 2000 host for discovery using ethereal [10]. IEEE Type/Subtype: Data (32) Frame Control: 0x0908 Version: 0 Type: Data frame (2) Subtype: 0 Flags: 0x9 DS status: Frame is entering DS (To DS: 1 From DS: 0) (0x01) = Fragments: No fragments = Retry: Frame is being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 258 BSS Id: 00:50:18:07:13:92 (ADVANCED_07:13:92) Source address: 00:02:2d:52:cb:27 (Agere_52:cb:27) Destination address: 00:50:18:07:13:92 (ADVANCED_07:13:92) Fragment number: 0 Sequence number: 3057 Logical-Link Control DSAP: SNAP (0xaa) IG Bit: Individual SSAP: SNAP (0xaa) CR Bit: Command Control field: U, func = UI (0x03) = Unnumbered Information = Unnumbered frame Organization Code: Unknown (0x00601d) Protocol ID: 0x0001 Data (58 bytes)
23 c 6c f All your e c 6f 6e b are belong f e fe ca ba ab to us ad de 0f d0 4f OECEFF 5.2 Wellenreiter detection: There are several tools to do the MAC spoofing attack. Among them Wellenreiter [11] is most useful and popular among Linux users. Wellenreiter is a Perl/Gtk+ application for use on Linux systems. Wellenreiter only supports network discovery through RFMON packet capture, but includes some additional features using a second network card, including ESSID brute- forcing and automatic network association. It is through these features that we are able to identify Wellenreiter-generated traffic. When an ESSID brute-force attack is initiated, Wellenreiter will use the Linux "iwconfig" program to temporarily set its ESSID to "this_is_used_for_wellenreiter". The MAC address will also be set to a random values between 0x00 and 0xFF and then prepends a leading value of 0x00 to avoid generating MAC addresses that conflict with reserved and multicast space. A trace of Wellenreiter v1.6 traffic attempting to brute-force the ESSID of an access point appears as follows: scornik:~ $ tethereal r wellenreiter.dmp n R wlan.fc eq 0x :03:b7:47:e2:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :03:b7:47:e2:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :84:b9:5a:ce:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :84:b9:5a:ce:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :0e:ef:e0:3d:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :0e:ef:e0:3d:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :a6:8b:cd:f1:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :a6:8b:cd:f1:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :8a:7c:29:56:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :8a:7c:29:56:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :df:f7:a1:8a:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request :df:f7:a1:8a:40 -> ff:ff:ff:ff:ff:ff IEEE Probe Request scornik:~ $ In this example every second probe request frame appears to be coming from a different MAC address, all destined to the broadcast address. If we compare the
24 24 MAC address prefixes to the allocated OUI listing by the IEEE we discover that only one of the five MAC prefixes is listed as being allocated by the IEEE. With this information, we can detect anomalous MAC addresses based on their prefix information. With a current list of allocated OUIs from the IEEE, we can monitor network activity and identify the OUIs for MAC addresses that are not presently allocated. Unfortunately, a clever attacker can easily circumvent this detection technique. Since the list of allocated OUIs is publicly available, an attacker could modify their randomization procedure to build a hash of allocated prefixes and randomly select an allocated OUI, and then append a random 24-bit value for the remaining three octets of the MAC address. This technique was first demonstrated in the FakeAP tool that generates multiple SSID beacon frames with varying MAC addresses, power output, and SSID values in an effort to fool network discovery applications into thinking they have discovered a plethora of wireless networks. Fortunately, we can detect the presence of FakeAP and other, more devious WLAN attack tools through WLAN sequence number analysis. 5.3 FakeAP detection We can detect FakeAP activity by monitoring the sequence number value for sequential increments with changing source MAC address, BSSID and SSID values. In an environment with a dense deployment of wireless access points, we would typically see multiple beacon frames from varying source addresses containing different SSID names; using FakeAP, we will see similar activity as it cycles through its dictionary list of SSID values and random MAC address generation procedure. The firmware of the Prism wireless NIC will be indifferent to changing wireless parameters, however, maintaining a sequential order to the sequence number value. The following packet capture was generated in a lab environment using FakeAP v0.3.1, with the output from tethereal trimmed for brevity: scornik:~ $ tethereal r fakeap.dmp n R wlan.fc eq 0x0080 IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:02:b3:cb:28:64 (00:02:b3:cb:28:64) BSS Id: 00:02:b3:cb:28:64 (00:02:b3:cb:28:64) Fragment number: 0 Sequence number: 2055 IEEE wireless LAN management frame
25 25 Tagged parameters (22 bytes) Tag Number: 0 (SSID parameter set) Tag interpretation: macro IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:02:a5:a5:75:a5 (00:02:a5:a5:75:a5) BSS Id: 00:02:a5:a5:75:a5 (00:02:a5:a5:75:a5) Fragment number: 0 Sequence number: 2056 IEEE wireless LAN management frame Tagged parameters (26 bytes) Tag Number: 0 (SSID parameter set) Tag interpretation: breathing IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:02:a5:a5:75:a5 (00:02:a5:a5:75:a5) BSS Id: 00:02:a5:a5:75:a5 (00:02:a5:a5:75:a5) Fragment number: 0 Sequence number: 2057 IEEE wireless LAN management frame Tagged parameters (26 bytes) Tag Number: 0 (SSID parameter set) Tag interpretation: breathing IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:02:2d:7d:c5:5f (00:02:2d:7d:c5:5f) BSS Id: 00:02:2d:7d:c5:5f (00:02:2d:7d:c5:5f) Fragment number: 0 Sequence number: 2058 IEEE wireless LAN management frame Tagged parameters (29 bytes) Tag Number: 0 (SSID parameter set) Tag interpretation: intercession scornik:~ $ Here we can see that, we see unique source MAC addresses, BSSIDs and SSIDs that would normally appear as traffic generated by multiple WLAN access points. If we examine the sequence number parameter, however, we see a sequential pattern that indicates that this traffic is being generated by a single host and not multiple access points.
26 AirSnort detection: Examining AirSnort s source code revealed that it uses a simple algorithm to determine if a frame is weak. Weak frames are then added to a pool to be analyzed later by another algorithm to determine the WEP key. The weak frame detection algorithm relies on simple pattern matching of the initialization vector (IV) of the frame. The IV itself consists of three bytes. AirSnort considers a frame weak if the first byte of the IV has a value between 2 and 16 inclusive and the second byte has a value of 255. Each three-byte pattern is only added once to the pool. Creating decoys for AirSnort is a simple task. The decoy frames contain mostly valid data except that the IV is a randomly generated number that matches the criteria described above. Also, at least one byte of encrypted data should be randomly generated. AirSnort requires only a few such frames and would cease capturing frames when the key has been extracted. Our implementation used sequential numbers for the third byte while the first byte and encrypted data are a single random byte each. Other required fields are also filled in. First, the frame is marked as an encrypted data frame. The BSSID is the actual one configured by the user and the source address is also set from this value. The destination is randomized since it is ignored by AirSnort. To prevent degradation of the network, the decoy frames can only be sent intermittently at a user-controlled rate. Given that the system only has to protect the valid network from intrusion, the decoys are broadcasted only on the valid channel. 5.5 Airjack detection: In order to detect anomalies in sequence numbers, we need to first establish a pattern of legitimate sequence number activity for each MAC address we wish to monitor. In the following detect, the sequence numbers for the legitimate source MAC 00:e0:63:82:19:c6 are in the range Knowing this pattern, we can easily identify the deauthenticate frames as being illegitimate, although they purport to have originated from the source MAC 00:e0:63:82:19:c6. This packet capture was generated in a lab environment using AirJack [12] v0.6.2-alpha. iftheker:~ $ tethereal r airjack.dmp n R wlan.sa eq 00:e0:63:82:19:c6 IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6)
27 BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2966 IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2967 IEEE Type/Subtype: Probe Response (5) Destination address: 00:60:1d:f0:91:56 (00:60:1d:f0:91:56) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2968 IEEE Type/Subtype: Deauthentication (12) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 1335 IEEE wireless LAN management frame Fixed parameters (2 bytes) Reason code: Previous authentication no longer valid (0x0002) IEEE Type/Subtype: Deauthentication (12) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 1336 IEEE wireless LAN management frame Fixed parameters (2 bytes) Reason code: Previous authentication no longer valid (0x0002) IEEE Type/Subtype: Beacon frame (8) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2969 IEEE
28 28 Type/Subtype: Probe Response (5) Destination address: 00:60:1d:f0:91:56 (00:60:1d:f0:91:56) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2970 IEEE Type/Subtype: Deauthentication (12) Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 1339 IEEE wireless LAN management frame Fixed parameters (2 bytes) Reason code: Previous authentication no longer valid (0x0002) IEEE Type/Subtype: Probe Response (5) Destination address: 00:60:1d:f0:91:56 (00:60:1d:f0:91:56) Source address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 2971 iftheker:~ $ We can quickly identify the frames with sequence numbers in the range of as illegitimate management traffic. 6.1 Conclusion: CHAPTER VI Conclusion Based upon the results from our research efforts and proposed solutions, we feel that it s possible to implement a complete WIDS (Wireless Intrusion Detection System) in the application layer based on fingerprinting known attacking tool s attack pattern. It s almost impossible and not feasible enough to deploy hardware intrusion detection system. Thus our future plan is to analyze more attacking tools, find their pattern and implement software based complete intrusion detection system.
29 29 REFERENCES [1] Jim Geir, Wireless LANs: Implementing Interoperable Networks, MacMillan Technical Publishing, USA, pp , [2] Harold Davis & Richard Mansfield: The Wi-Fi Experience: Everyone's Guide to b Wireless Networking. ISBN: [3] The Handbook of Information Security, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005 [4] Wi-Fi Security by Hallvar Helleseth, Department of Informatics, University of Bergen, June 2006(Thesis for the master of science). [5] Detection of Kismet [6] Joshua Wright, GCIH, CCNA [7] FakeAP. Black Alchemy Weapons Lab. URL: [8] IEEE. IEEE OUI and Company_id Assignments. URL: [9] Attacks on RC4 and WEP; Fluhrer, Mantin and Shamir ; Cryptobytes [10] Ethereal home page - great documentation and source for disassembling all sorts of network protocols - [11] Wellenreiter. Wireless LAN Discovery and Auditing Tool URL: [12] AirJack. Advanced Attack Tools. URL:
30 [NOTES] 30
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection Joshua Wright, GCIH, CCNA [email protected] http://home.jwu.edu/jwright/ 11/8/2002 Abstract Wireless LAN discovery through the
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
MITM Man in the Middle
MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi
Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06
Wireless Traffic Analysis Kelcey Tietjen DF Written Report 10/03/06 Executive Summary Wireless traffic analysis provides a means for many investigational leads for a forensic examination. It can provide
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Hole196 Vulnerability in WPA2
Hole196 Vulnerability in WPA2 1 Hole196 Vulnerability in WPA2 Presenters: Anthony Paladino, Managing Director, Systems Engineering Dr. Kaustubh Phanse, Principal Wireless Architect Md. Sohail Ahmad, Senior
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Vulnerabilities of Wireless Security protocols (WEP and WPA2)
Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security
Group Number: Member Names: Date Assigned: March 23, 2004 Date Due: March 30, 2004 Last Revised: March 22, 2004 ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security Goal: The goal of this lab
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Universiti Teknologi MARA. 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm
Universiti Teknologi MARA 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm Azwan Abdul Satar Thesis submitted in fulfillment of the requirements for Bachelor of Science (Hons) Information Technology
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Wireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Section 1 Wireless Packet Captures & Connection Analysis- A Review
Section 1 Wireless Packet Captures & Connection Analysis- A Review Many of you will have already used many of these tools, or at least had some experience with them in previous CWNP or vendor Wireless
WEP WPA WPS :: INDEX : Introduction :
WEP WPA WPS With clients Without clients :: INDEX : Introduction > Overview > Terms & Definitions [ Step 1 ] : Configuring the network interface [ Step 2 ] : Collecting the network info [ Step 3 ] : Capturing
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
WIRELESS SECURITY TOOLS
WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University [email protected], [email protected] (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
WL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual
WL-5460AP 54Mbps Multi-Function Wireless AP User s Manual 1 Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system,
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network
, pp. 9-18 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.02 An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network 1 Md Waliullah, 2 A B M Moniruzzaman and 3 Md. Sadekur
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
USER GUIDE Cisco Small Business
USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Network Attacks. Common Network Attacks and Exploits
Common and Exploits AGENDA A Few Observations Hacker Resources Attack Categories Some Common Attacks Wireless Specific Attacks Wireless Observations Because of Common Network Layers, Most of the Attacks
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
Long-Range 500mW IEEE 802.11g Wireless USB Adapter. User's Guide
Long-Range 500mW IEEE 802.11g Wireless USB Adapter User's Guide TABLE OF CONTENTS OVERVIEW... 4 UNPACKING INFORMATION... 4 INTRODUCTION TO THE IEEE 802.11G WIRELESS USB ADAPTER... 5 Key Features...5 INSTALLATION
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
