Top Banner
Ethical Hacking CHAPTER 11 – EXPLOITING WIRELESS NETWORKS ERIC VANDERBRG
45

Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

Feb 14, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 1/48

Ethical HackingCHAPTER 11 – EXPLOITING WIRELESS NETWORKS

ERIC VANDERBRG

Page 2: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 2/48

O"#$cti%$&

E'(lain )i*$l$&& t$chn+l+g,

D$&c*i"$ )i*$l$&& n$t)+*king &tan-a*-&

D$&c*i"$ th$ (*+c$&& +. a/th$nticati+n

D$&c*i"$ )a*-*i%ing

D$&c*i"$ )i*$l$&& hacking an- t++l& /&$- ", hack$*& an-&$c/*it, (*+.$&&i+nal&

Page 3: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 3/48

n-$*&tan-ing Wi*$l$&& T$chn+l+g, +* a )i*$l$&& n$t)+*k t+ ./ncti+n2 ,+/ 3/&t ha%$ th$ *ig

ha*-)a*$ an- &+.t)a*$ Wi*$l$&& t$chn+l+g, i& (a*t +. +/* li%$&

Ba", 3+nit+*&

C$ll an- c+*-l$&& (h+n$&

Pag$*&

GPS

R$3+t$ c+nt*+l&

Ga*ag$ -++* +($n$*&

 T)+4)a, *a-i+&

Wi*$l$&& PDA&

Page 4: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 4/48

C+3(+n$nt& +. a Wi*$l$&&N$t)+*k

A )i*$l$&& n$t)+*k ha& +nl, th*$$ "a&ic c+3(+n$nt& Acc$&& P+int 6AP7

Wi*$l$&& n$t)+*k int$*.ac$ ca*- 6WNIC7

Eth$*n$t ca"l$

Page 5: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 5/48

Acc$&& P+int&

An acc$&& (+int 6AP7 i& a t*an&c$i%$* that c+nn$ct& t+ an

Eth$*n$t ca"l$ It "*i-g$& th$ )i*$l$&& n$t)+*k )ith th$ )i*$- n$t)+*k

N+t all )i*$l$&& n$t)+*k& c+nn$ct t+ a )i*$- n$t)+*k

9+&t c+3(ani$& ha%$ WLAN& that c+nn$ct t+ th$i* )i*$-n$t)+*k t+(+l+g,

 Th$ AP i& )h$*$ chann$l& a*$ c+n:g/*$-

An AP $na"l$& /&$*& t+ c+nn$ct t+ a LAN /&ing )i*$l$&&t$chn+l+g,

An AP i& a%aila"l$ +nl, )ithin a -$:n$- a*$a

Page 6: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 6/48

S$*%ic$ S$t I-$nti:$*&6SSID&7 Na3$ /&$- t+ i-$nti., th$ )i*$l$&& l+cal a*$a n$t)+*k

6WLAN7

 Th$ SSID i& c+n:g/*$- +n th$ AP

ni</$ 14 t+ 0!4cha*act$* al(han/3$*ic na3$

Na3$ i& ca&$ &$n&iti%$

Wi*$l$&& c+3(/t$*& n$$- t+ c+n:g/*$ th$ SSID "$.+*$c+nn$cting t+ a )i*$l$&& n$t)+*k

SSID i& t*an&3itt$- )ith $ach (ack$t

I-$nti:$& )hich n$t)+*k th$ (ack$t "$l+ng&

 Th$ AP /&/all, "*+a-ca&t& th$ SSID

Page 7: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 7/48

S$*%ic$ S$t I-$nti:$*&6SSID&7 6c+ntin/$-7

9an, %$n-+*& ha%$ SSID& &$t t+ a -$.a/lt %al/$ thatc+3(ani$& n$%$* chang$

An AP can "$ c+n:g/*$- t+ n+t "*+a-ca&t it& SSID /ntil a.a/th$nticati+n

Wi*$l$&& hack$*& can att$3(t t+ g/$&& th$ SSID

V$*i., that ,+/* cli$nt& +* c/&t+3$*& a*$ n+t /&ing a -$.a

SSID

Page 8: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 8/48

C+n:g/*ing an Acc$&& P+int

C+n:g/*ing an AP %a*i$& -$($n-ing +n th$ ha*-)a*$

9+&t -$%ic$& all+) acc$&& th*+/gh an, W$" "*+)&$*

St$(& .+* c+n:g/*ing a D4Link )i*$l$&& *+/t$*

Ent$* IP a--*$&& +n ,+/* W$" "*+)&$* an- (*+%i-$ ,+/* /&$*l+g+n na3$ an- (a&&)+*-

A.t$* a &/cc$&&./l l+g+n ,+/ )ill &$$ th$ -$%ic$?& 3ain )in-+

Click +n Wi*$l$&& "/tt+n t+ c+n:g/*$ AP +(ti+n& SSID

Wi*$- E</i%al$nt P*i%ac, 6WEP7 k$,&

Page 9: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 9/48

C+n:g/*ing an Acc$&& P+int6c+ntin/$-7

St$(& .+* c+n:g/*ing a D4Link )i*$l$&& *+/t$* 6c+ntin/$-7  T/*n + SSID "*+a-ca&t

Di&a"ling SSID "*+a-ca&t i& n+t $n+/gh t+ (*+t$ct ,+/*WLAN

 +/ 3/&t al&+ chang$ ,+/* SSID

Page 10: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 10/48

Wi*$l$&& NIC&

+* )i*$l$&& t$chn+l+g, t+ )+*k2 $ach n+-$ +* c+3(/t$* 3/&tha%$ a )i*$l$&& NIC

NIC?& 3ain ./ncti+n

C+n%$*ting th$ *a-i+ )a%$& it *$c$i%$& int+ -igital &ignal& th$c+3(/t$* /n-$*&tan-&

 Th$*$ a*$ 3an, )i*$l$&& NIC& +n th$ 3a*k$t

Ch++&$ ,+/*& -$($n-ing +n h+) ,+/ (lan t+ /&$ it

S+3$ t++l& *$</i*$ c$*tain &($ci:c "*an-& +. NIC&

Page 11: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 11/48

n-$*&tan-ing Wi*$l$&& N$t)+*kStan-a*-&

A &tan-a*- i& a &$t +. */l$& .+*3/lat$- ", an +*ganiati+n

In&tit/t$ +. El$ct*ical an- El$ct*+nic& Engin$$*& 6IEEE7

D$:n$& &$%$*al &tan-a*-& .+* )i*$l$&& n$t)+*k&

Page 12: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 12/48

In&tit/t$ +. El$ct*ical an-El$ct*+nic& Engin$$*& 6IEEE7

Stan-a*-&

W+*king g*+/( 6WG7

A g*+/( +. ($+(l$ .*+3 th$ $l$ct*ical an- $l$ct*+nic& in-/&t*that 3$$t t+ c*$at$ a &tan-a*-

S(+n&+* E'$c/ti%$ C+33itt$$ 6SEC7

G*+/( that *$%i$)& an- a((*+%$& (*+(+&al& +. n$) &tan-a*-c*$at$- ", a WG

Stan-a*-& R$%i$) C+33itt$$ 6R$%C+37

R$c+33$n-& (*+(+&al& t+ "$ *$%i$)$- ", th$ IEEE Stan-a*B+a*-

IEEE Stan-a*-& B+a*-

A((*+%$& (*+(+&al& t+ "$c+3$ n$) &tan-a*-&

Page 13: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 13/48

 Th$ >!11 Stan-a*-

 Th$ :*&t )i*$l$&& t$chn+l+g, &tan-a*-

D$:n$- )i*$l$&& c+nn$cti%it, at 1 9"(& an- ! 9"(& )ithin a LAN

A((li$- t+ la,$*& 1 an- ! +. th$ OSI 3+-$l

Wi*$l$&& n$t)+*k& cann+t -$t$ct c+lli&i+n&

Ca**i$* &$n&$ 3/lti(l$ acc$&&Fc+lli&i+n a%+i-anc$ 6CS9AFCA7 i& /&$-

in&t$a- +. CS9AFCD Wi*$l$&& LAN& -+ n+t ha%$ an a--*$&& a&&+ciat$- )ith a (h,&ica

l+cati+n

An a--*$&&a"l$ /nit i& call$- a &tati+n 6STA7

Page 14: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 14/48

 Th$ Ba&ic A*chit$ct/*$ +. >!11

>!11 /&$& a "a&ic &$*%ic$ &$t 6BSS7 a& it& "/il-ing "l+ck

C+3(/t$*& )ithin a BSS can c+33/nicat$ )ith $ach +th$*&

 T+ c+nn$ct t)+ BSS&2 >!11 *$</i*$& a -i&t*i"/ti+n &,&t$3 6DS7a& an int$*3$-iat$ la,$*

An acc$&& (+int 6AP7 i& a &tati+n that (*+%i-$& acc$&& t+ th$ DS

Data 3+%$& "$t)$$n a BSS an- th$ DS th*+/gh th$ AP

Page 15: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 15/48

 Th$ Ba&ic A*chit$ct/*$ +. >!116c+ntin/$-7

IEEE >!11 al&+ -$:n$& th$ +($*ating .*$</$nc, *ang$ +. >!1

In th$ nit$- Stat$&2 it i& !5 t+ !5>08 GH

Each .*$</$nc, "an- c+ntain& chann$l&

A chann$l i& a .*$</$nc, *ang$

 Th$ >!11 &tan-a*- -$:n$& =@ chann$l&

I. chann$l& +%$*la(2 int$*.$*$nc$ c+/l- +cc/*

Page 16: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 16/48

 Th$ Ba&ic A*chit$ct/*$ +. >!116c+ntin/$-7

Oth$* t$*3&

Wa%$l$ngth

*$</$nc,

C,cl$

H$*t +* c,cl$& ($* &$c+n-

Ban-&

Page 17: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 17/48

An O%$*%i$) +. Wi*$l$&& T$chn+l+gi$& In.*a*$- 6IR7

In.*a*$- light can?t "$ &$$n ", th$ h/3an $,$

IR t$chn+l+g, i& *$&t*ict$- t+ a &ingl$ *++3 +* lin$ +. &ight

IR light cann+t ($n$t*at$ )all&2 c$iling&2 +* ++*&

Na**+)"an-

&$& 3ic*+)a%$ *a-i+ "an- .*$</$nci$& t+ t*an&3it -ata

P+(/la* /&$&

C+*-l$&& (h+n$&

Ga*ag$ -++* +($n$*&

Page 18: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 18/48

An O%$*%i$) +. Wi*$l$&& T$chn+l+gi$& 6c+ntin/$-7

S(*$a- S($ct*/3

9+-/lati+n -$:n$& h+) -ata i& (lac$- +n a ca**i$* &ignal Data i& &(*$a- ac*+&& a la*g$4.*$</$nc, "an-)i-th in&t$a-

t*a%$ling ac*+&& #/&t +n$ .*$</$nc, "an-

9$th+-&

Frequency-hopping spread spectrum (FHSS)

Direct sequence spread spectrum (DSSS)

Orthogonal frequency division multiplexing (OFDM)

Page 19: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 19/48

IEEE A--iti+nal >!11 P*+#$ct&

>!11a C*$at$- in 1@@@

O($*ating .*$</$nc, *ang$ chang$- .*+3 !5 GH t+ 8 GH

 Th*+/gh(/t inc*$a&$- .*+3 11 9"(& t+ 85 9"(&

Ban-& +* .*$</$nci$&

L+)$* "an-818 t+ 8!8 GH 9i--l$ "an-8!8 t+ 808 GH

(($* "an-8=8 t+ 8>8 GH

Page 20: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 20/48

IEEE A--iti+nal >!11 P*+#$ct&6c+ntin/$-7

>!11" O($*at$& in th$ !5 GH *ang$

 Th*+/gh(/t inc*$a&$- .*+3 1 +* ! 9"(& t+ 11 9"(&

Al&+ *$.$**$- a& Wi4i 6)i*$l$&& :-$lit,7

All+)& .+* 11 chann$l& t+ (*$%$nt +%$*la((ing &ignal&

E$cti%$l, +nl, th*$$ chann$l& 612 ;2 an- 117 can "$ /&$- in c+3"inati+n)ith+/t +%$*la((ing

Int*+-/c$- Wi*$- E</i%al$nt P*i%ac, 6WEP7

Page 21: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 21/48

IEEE A--iti+nal >!11 P*+#$ct&6c+ntin/$-7

>!11$ It ha& i3(*+%$3$nt& t+ a--*$&& th$ (*+"l$3 +. int$*.$*$nc$

Wh$n int$*.$*$nc$ i& -$t$ct$-2 &ignal& can #/3( t+ an+th$* .*$</$nc,3+*$ </ickl,

>!11g

O($*at$& in th$ !5 GH *ang$

&$& OD9 .+* 3+-/lati+n

 Th*+/gh(/t inc*$a&$- .*+3 11 9"(& t+ 85 9"(&

Page 22: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 22/48

IEEE A--iti+nal >!11 P*+#$ct&6c+ntin/$-7

>!11i Int*+-/c$- Wi4i P*+t$ct$- Acc$&& 6WPA7

C+**$ct$- 3an, +. th$ &$c/*it, %/ln$*a"iliti$& +. >!11"

>!18

A--*$&&$& n$t)+*king -$%ic$& )ithin +n$ ($*&+n?& )+*k&(ac$

Call$- )i*$l$&& ($*&+nal a*$a n$t)+*k 6WPAN7 Bl/$t++th i& a c+33+n $'a3(l$

Page 23: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 23/48

IEEE A--iti+nal >!11 P*+#$ct&6c+ntin/$-7

>!1; A--*$&&$& th$ i&&/$ +. )i*$l$&& 3$t*+(+litan a*$a n$t)+*k& 69AN&7

D$:n$& th$ Wi*$l$&&9AN Ai* Int$*.ac$

It )ill ha%$ a *ang$ +. /( t+ 0 3il$&

 Th*+/gh(/t +. /( t+ 1! 9"(&

>!! A--*$&&$& )i*$l$&& 9AN& .+* 3+"il$ /&$*& )h+ a*$ &itting in t*ain&2

&/")a,&2 +* ca*& t*a%$ling at &($$-& /( t+ 18 3il$& ($* h+/*

Page 24: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 24/48

IEEE A--iti+nal >!11 P*+#$ct&6c+ntin/$-7

Bl/$t++th D$:n$& a 3$th+- .+* int$*c+nn$cting (+*ta"l$ -$%ic$& )ith+/t )i*$&

9a'i3/3 -i&tanc$ all+)$- i& 1 3$t$*&

It /&$& th$ !58 GH .*$</$nc, "an-

 Th*+/gh(/t +. /( t+ 1! 9"(&

Hi($*LAN! E/*+($an WLAN &tan-a*-

It i& n+t c+3(ati"l$ )ith >!11 &tan-a*-&

Page 25: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 25/48

n-$*&tan-ing A/th$nticati+n

An +*ganiati+n that int*+-/c$& )i*$l$&& t$chn+l+g, t+ th$ 3i'inc*$a&$& th$ (+t$ntial .+* &$c/*it, (*+"l$3&

Page 26: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 26/48

 Th$ >!1X Stan-a*-

D$:n$& th$ (*+c$&& +. a/th$nticating an- a/th+*iing /&$*& +n aWLAN

A--*$&&$& th$ c+nc$*n& )ith a/th$nticati+n

Ba&ic c+nc$(t&

P+int4t+4P+int P*+t+c+l 6PPP7

E't$n&i"l$ A/th$nticati+n P*+t+c+l 6EAP7

Wi*$- E</i%al$nt P*i%ac, 6WEP7

Wi4i P*+t$ct$- Acc$&& 6WPA7

Page 27: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 27/48

P+int4t+4P+int P*+t+c+l 6PPP7

9an, ISP& /&$ PPP t+ c+nn$ct -ial4/( +* DSL /&$*& PPP han-l$& a/th$nticati+n ", *$</i*ing a /&$* t+ $nt$* a %ali-

/&$* na3$ an- (a&&)+*-

PPP %$*i:$& that /&$*& att$3(ting t+ /&$ th$ link a*$ in-$$- )h+th$, &a, th$, a*$

Page 28: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 28/48

E't$n&i"l$ A/th$nticati+n P*+t+c+6EAP7

EAP i& an $nhanc$3$nt t+ PPP All+)& a c+3(an, t+ &$l$ct it& a/th$nticati+n 3$th+-

C$*ti:cat$&

K$*"$*+&

C$*ti:cat$

R$c+*- that a/th$nticat$& n$t)+*k $ntiti$& It c+ntain& X8@ in.+*3ati+n that i-$nti:$& th$ +)n$*2 th$ c$*ti:cat

a/th+*it, 6CA72 an- th$ +)n$*?& (/"lic k$,

Page 29: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 29/48

E't$n&i"l$ A/th$nticati+n P*+t+c+6EAP7 6c+ntin/$-7

EAP 3$th+-& t+ i3(*+%$ &$c/*it, +n a )i*$l$&& n$t)+*k& E't$n&i"l$ A/th$nticati+n P*+t+c+l4T*an&(+*t La,$* S$c/*it, 6EAP4TLS

P*+t$ct$- EAP 6PEAP7

9ic*+&+.t PEAP

>!1X c+3(+n$nt&

S/((licant A/th$nticat+*

A/th$nticati+n &$*%$*

Page 30: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 30/48

Wi*$- E</i%al$nt P*i%ac, 6WEP7

Pa*t +. th$ >!11" &tan-a*- It )a& i3(l$3$nt$- &($ci:call, t+ $nc*,(t -ata that t*a%$*&$- a

)i*$l$&& n$t)+*k

WEP ha& 3an, %/ln$*a"iliti$&

W+*k& )$ll .+* h+3$ /&$*& +* &3all "/&in$&&$& )h$n c+3"in$-)ith a Vi*t/al P*i%at$ N$t)+*k 6VPN7

Page 31: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 31/48

Wi4i P*+t$ct$- Acc$&& 6WPA7

S($ci:$- in th$ >!11i &tan-a*-

It i& th$ *$(lac$3$nt .+* WEP

WPA i3(*+%$& $nc*,(ti+n ", /&ing T$3(+*al K$, Int$g*it,P*+t+c+l 6TKIP7

 TKIP i& c+3(+&$- +. .+/* $nhanc$3$nt&

9$&&ag$ Int$g*it, Ch$ck 69IC7

C*,(t+g*a(hic 3$&&ag$ int$g*it, c+-$

9ain (/*(+&$ i& t+ (*$%$nt .+*g$*i$&

E't$n-$- Initialiati+n V$ct+* 6IV7 )ith &$</$ncing */l$&

I3(l$3$nt$- t+ (*$%$nt *$(la,&

Page 32: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 32/48

Wi4i P*+t$ct$- Acc$&& 6WPA76c+ntin/$-7

 TKIP $nhanc$3$nt& 6c+ntin/$-7 P$*4(ack$t k$, 3i'ing

It h$l(& -$.$at )$ak k$, attack& that +cc/**$- in WEP

9AC a--*$&&$& a*$ /&$- in c*$ating an int$*3$-iat$ k$,

R$k$,ing 3$chani&3

It (*+%i-$& .*$&h k$,& that h$l( (*$%$nt attack& that *$li$- +n *$/&ing +l-

k$,&

WPA al&+ a--& an a/th$nticati+n 3$chani&3 i3(l$3$nting>!1X an- EAP

Page 33: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 33/48

n-$*&tan-ing Wa*-*i%ing

Hack$*& /&$ )a*-*i%ing D*i%ing a*+/n- )ith in$'($n&i%$ ha*-)a*$ an- &+.t)a*$ that $na"l$

th$3 t+ -$t$ct acc$&& (+int& that ha%$n?t "$$n &$c/*$-

Wa*-*i%ing i& n+t ill$gal

B/t /&ing th$ *$&+/*c$& +. th$&$ n$t)+*k& i& ill$gal

Wa*,ing

Va*iant )h$*$ an ai*(lan$ i& /&$- in&t$a- +. a ca*

Page 34: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 34/48

H+) It W+*k&

An attack$* +* &$c/*it, t$&t$* &i3(l, -*i%$& a*+/n- )ith th$.+ll+)ing $</i(3$nt

La(t+( c+3(/t$*

Wi*$l$&& NIC

An ant$nna

S+.t)a*$ that &can& th$ a*$a .+* SSID&

N+t all )i*$l$&& NIC& a*$ c+3(ati"l$ )ith &canning (*+g*a3&

Ant$nna (*ic$& %a*, -$($n-ing +n th$ </alit, an- th$ *ang$ th$can c+%$*

Page 35: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 35/48

H+) It W+*k& 6c+ntin/$-7

Scanning &+.t)a*$ can i-$nti.,  Th$ c+3(an,?& SSID

 Th$ t,($ +. &$c/*it, $na"l$-

 Th$ &ignal &t*$ngth

In-icating h+) cl+&$ th$ AP i& t+ th$ attack$*

Page 36: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 36/48

N$tSt/3"l$*

Sha*$)a*$ t++l )*itt$n .+* Win-+)& that $na"l$& ,+/ t+

-$t$ct WLAN& S/((+*t& >!11a2 >!11"2 an- >!11g &tan-a*-&

N$tSt/3"l$* )a& (*i3a*il, -$&ign$- t+

V$*i., ,+/* WLAN c+n:g/*ati+n

D$t$ct +th$* )i*$l$&& n$t)+*k&

D$t$ct /na/th+*i$- AP&

N$tSt/3"l$* i& ca(a"l$ +. int$*.ac$ )ith a GPS

Ena"ling a &$c/*it, t$&t$* +* hack$* t+ 3a( +/t l+cati+n& +.all th$ WLAN& th$ &+.t)a*$ -$t$ct&

Page 37: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 37/48

N$tSt/3"l$* 6c+ntin/$-7

N$tSt/3"l$* l+g& th$ .+ll+)ing in.+*3ati+n

SSID

9AC a--*$&& +. th$ AP

9an/.act/*$* +. th$ AP

Chann$l +n )hich it )a& h$a*-

St*$ngth +. th$ &ignal

Enc*,(ti+n Attack$*& can -$t$ct AP& )ithin a 084.++t *a-i/&

B/t )ith a g++- ant$nna2 th$, can l+cat$ AP& a c+/(l$ +.3il$& a)a,

Page 38: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 38/48

Ki&3$t

An+th$* (*+-/ct .+* c+n-/cting )a*-*i%ing attack& W*itt$n ", 9ik$ K$*&ha)

R/n& +n Lin/'2 BSD2 9AC OS X2 an- Lin/' PDA&

Ki&3$t i& a-%$*ti&$- al&+ a& a &ni$* an- IDS

Ki&3$t can &ni >!11"2 >!11a2 an- >!11g t*ac

Ki&3$t .$at/*$& Eth$*$al4 an- Tc(-/3(4c+3(ati"l$ -ata l+gging

Ai*Sn+*t c+3(ati"l$

N$t)+*k IP *ang$ -$t$cti+n

i 6 i -7

Page 39: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 39/48

Ki&3$t 6c+ntin/$-7

Ki&3$t .$at/*$& 6c+ntin/$-7 Hi--$n n$t)+*k SSID -$t$cti+n

G*a(hical 3a((ing +. n$t)+*k&

Cli$nt4&$*%$* a*chit$ct/*$

9an/.act/*$* an- 3+-$l i-$nti:cati+n +. AP& an- cli$nt&

D$t$cti+n +. kn+)n -$.a/lt acc$&& (+int c+n:g/*ati+n&

X9L +/t(/t

S/((+*t& ! ca*- t,($&

- t -i Wi l H ki

Page 40: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 40/48

n-$*&tan-ing Wi*$l$&& Hacking

Hacking a )i*$l$&& n$t)+*k i& n+t 3/ch -i$*$nt .*+3 hacking a)i*$- LAN

 T$chni</$& .+* hacking )i*$l$&& n$t)+*k&

P+*t &canning

En/3$*ati+n

T l . th T -

Page 41: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 41/48

 T++l& +. th$ T*a-$

E</i(3$nt La(t+( c+3(/t$*

A )i*$l$&& NIC

An ant$nna

Sni$*&

Wi*$l$&& *+/t$*& that ($*.+*3 DHCP ./ncti+n& can (+&$ a "ig&$c/*it, *i&k

 T++l& .+* c*acking WEP k$,&

Ai*Sn+*t

WEPC*ack

Ai S t

Page 42: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 42/48

Ai*Sn+*t

C*$at$- ", J$*$3, B*/$&tl$ an- Blak$ H$g$*l$ It i& th$ t++l 3+&t hack$*& )anting t+ acc$&& WEP4$na"l$- WLAN

/&$

Ai*Sn+*t li3itati+n&

R/n& +nl, +n Lin/'

R$</i*$& &($ci:c -*i%$*&

N+t all )i*$l$&& NIC& ./ncti+n )ith Ai*Sn+*t

WEPC k

Page 43: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 43/48

WEPC*ack

An+th$* +($n4&+/*c$ t++l /&$- t+ c*ack WEP $nc*,(ti+n WEPC*ack )a& *$l$a&$- a"+/t a )$$k "$.+*$ Ai*Sn+*t

It al&+ )+*k& +n NIX &,&t$3&

WEPC*ack /&$& P$*l &c*i(t& t+ ca**, +/t attack& +n )i*$l$&&&,&t$3&

/t/*$ %$*&i+n& a*$ $'($ct$- t+ incl/-$ .$at/*$& .+* attack$*& t+

c+n-/ct "*/t$4.+*c$ attack&

C t . Wi l

Page 44: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 44/48

C+/nt$*3$a&/*$& .+* Wi*$l$&&Attack&

C+n&i-$* /&ing anti4)a*-*i%ing &+.t)a*$ t+ 3ak$ it 3+*$ -ic/lt.+* attack$*& t+ -i&c+%$* ,+/* )i*$l$&& LAN

H+n$,(+t&

ak$a(

Black Alch$3, ak$ AP

Li3it th$ /&$ +. )i*$l$&& t$chn+l+g, t+ ($+(l$ l+cat$- in ,+/*

.acilit, All+) +nl, (*$-$t$*3in$- 9AC a--*$&&$& an- IP a--*$&&$& t+

ha%$ acc$&& t+ th$ )i*$l$&& LAN

C+/nt$*3$a&/*$& .+* Wi*$l$&&

Page 45: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 45/48

C+/nt$*3$a&/*$& .+* Wi*$l$&&Attack& 6c+ntin/$-7

C+n&i-$* /&ing an a/th$nticati+n &$*%$* in&t$a- +. *$l,ing +n a)i*$l$&& -$%ic$ t+ a/th$nticat$ /&$*&

C+n&i-$* /&ing EAP2 )hich all+)& -i$*$nt (*+t+c+l& t+ "$ /&$-that $nhanc$ &$c/*it,

C+n&i-$* (lacing th$ AP in th$ -$3ilita*i$- +n$ 6D97

I. ,+/ /&$ WEP2 c+n&i-$* /&ing 154"it $nc*,(ti+n *ath$* than 5

"it $nc*,(ti+n A&&ign &tatic IP a--*$&&$& t+ )i*$l$&& cli$nt& in&t$a- +. /&ing

DHCP

S/33a*,

Page 46: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 46/48

S/33a*,

IEEE?& 3ain (/*(+&$ i& t+ c*$at$ &tan-a*-& .+* LAN& an-WAN&

>!11 i& th$ IEEE &tan-a*- .+* )i*$l$&& n$t)+*king

Wi*$l$&& t$chn+l+g, -$:n$& h+) an- at )hat .*$</$nc, -t*a%$l& +%$* ca**i$* &+/n- )a%$&

 Th*$$ 3ain c+3(+n$nt& +. a )i*$l$&& n$t)+*k

Acc$&& P+int& 6AP&7

Wi*$l$&& n$t)+*k int$*.ac$ ca*-& 6WNIC&7

Eth$*n$t ca"l$&

S/33a*, 6c+ntin/$-7

Page 47: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 47/48

S/33a*, 6c+ntin/$-7

A &$*%ic$ &$t i-$nti:$* 6SSID7 a&&ign$- t+ an AP

R$(*$&$nt& th$ )i*$l$&& &$g3$nt +. a n$t)+*k .+* )hich th$ A*$&(+n&i"l$

Data 3/&t "$ 3+-/lat$- +%$* ca**i$* &ignal&

DSSS2 HSS2 an- OD9 a*$ th$ 3+&t c+33+n 3+-/lati+n& .+)i*$l$&& n$t)+*k&

Wa*-*i%ing an- )a*,ing

WLAN& can "$ attack$- )ith 3an, +. th$ &a3$ t++l& /&$-hacking )i*$- LANS

S/33a*, 6c+ntin/$-7

Page 48: Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

7/23/2019 Ethicalhacking Chapter11 Exploitingwirelessnetworks 140925143449 Phpapp01

http://slidepdf.com/reader/full/ethicalhacking-chapter11-exploitingwirelessnetworks-140925143449-phpapp01 48/48

S/33a*, 6c+ntin/$-7

C+/nt$*3$a&/*$& incl/-$

Di&a"ling SSID "*+a-ca&t R$na3ing -$.a/lt SSID&

&ing an a/th$nticati+n &$*%$*

Placing th$ AP in th$ D9

&ing a *+/t$* t+ :lt$* an, /na/th+*i$- 9AC an- IP a--*$&&.*+3 n$t)+*k acc$&&