Top Banner
A set of experience over the air [email protected]
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: wifi-y3dips-stmik_mdp_slides

A set of experience over the air

[email protected] 

Page 2: wifi-y3dips-stmik_mdp_slides

ECHOECHOECHOECHO

I d E i C it  f  H k  • IndonEsian Community for Hackers and Open Source •The stressing is still around the hacking stuffs. We're working on the Open Source activities• Ezines, Advisories, News, Forum, , , , ,Mailing list• Founded in 2003Has 13 staff a k a ECHO STAFF• Has 13 staff a.k.a ECHO STAFF

• Has 11116mailing lists member, and 14151 Board Discussions 

bmember (Jan,22 2008)• http://echo.or.id  || http://e‐rdc.org 

[email protected] 

Page 4: wifi-y3dips-stmik_mdp_slides

WIWI FIFIWIWI‐‐FIFI

l kWi‐Fi, is a wireless networking technology used across the globe. Wi‐Fi refers to any system that uses the 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers g(IEEE) and released in 1997. The term Wi‐Fi, which is alternatively spelled WiFi  Wi‐fi  Wifi  or wifi  was spelled WiFi, Wi fi, Wifi, or wifi, was pushed by the Wi‐Fi Alliance, a trade group that pioneered commercialization of the commercialization of the technology.

Wi‐Fi®, Wi‐Fi Alliance®, the Wi‐Fi logo, are registered trademarks of the Wi‐Fi Alliance

[email protected] 

Page 5: wifi-y3dips-stmik_mdp_slides

802 11802 11802.11802.11

f d d f802.11 is a set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public 5 4 pspectrum bands.

[email protected] 

Page 6: wifi-y3dips-stmik_mdp_slides

Why WIWhy WI FIFIWhy WIWhy WI‐‐FIFI

i l b l f•Convenience:  Flexibility of time and location

•Mobility: Access the internet even Mobility: Access the internet even outside their normal work environment

P d i i  P i ll  b  •Productivity: Potentially be more

•Deployment: Requires little more than a single access pointt a a s g e access po t

•Expandability: Serve a suddenly‐increased number of clients 

•Cost.

[email protected] 

Page 7: wifi-y3dips-stmik_mdp_slides

Keep it safe or wide open

Page 8: wifi-y3dips-stmik_mdp_slides

WI WI  FI  SecurityFI  SecurityWI WI ––FI  SecurityFI  SecurityOutsiders can sometimes get into your wireless networks as fast and easilyOutsiders can sometimes get into your wireless networks as fast and easily

Some Security Method• MAC ID filtering MAC ID filtering • Static IP Addressing • WEP encryption 

WPA • WPA  Wi‐Fi Protected Access

• WPA2 • LEAP  Lightweight Extensible Authentication Protocol

• PEAP  Protected Extensible Authentication Protocol• TKIP  Temporal Key Integrity Protocol

• RADIUS  Remote Authentication Dial In User Service

• WAPI  WLAN Authentication and Privacy Infrastructure

• Smart cards, USB tokens, and software tokens

[email protected] 

Page 9: wifi-y3dips-stmik_mdp_slides

3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure

ll d d b d1. All WI‐FI devices need to be secured

2. All Users need to be educated

3 Need to be actively monitored for weaknesses and breaches3. Need to be actively monitored for weaknesses and breaches

http://en.wikipedia.org/wiki/Wireless_security

[email protected] 

Page 10: wifi-y3dips-stmik_mdp_slides

Specific  Steps  to be Specific  Steps  to be relatively relatively SecureSecureSpecific  Steps  to be Specific  Steps  to be relatively relatively SecureSecure

S    h   t k   bli   i    f     (AP)    h   d  1. Secure your home network: enabling security  of your router (AP) , change password, restrict the

2. Protect yourself when using a public hotspot:C l hConnecting to a legitimate hotspot .Use a virtual private network or VPN,Stay away from critical action (bank transaction)

3. Configure for approved connections:  simply configure your device to not automatically connect 

4. Disable sharing: Your Wi‐Fi enabled devices may automatically open themselves to sharing / connecting with other devices. 

5. Install anti‐virus software: makes it more important to have antivirus software installed.

6. Use a personal firewall: a personal firewall program.p p p g

[email protected] 

Page 11: wifi-y3dips-stmik_mdp_slides

A set of popular things

Page 12: wifi-y3dips-stmik_mdp_slides

Hardware HackingHardware HackingHardware HackingHardware Hacking

ild i id i iBuild A Tin Can Waveguide WiFiAntenna

•Using a Can, … and else• Increase the range of your gWireless network

•http://www.turnpoint.net/wireless/cantennahowto.html

•http://wikihost.org/wikis/indonesiainternet/programm/gebo.prg?name=sejarah_internet_indonesia:wajanbolic_e‐goen

[email protected] 

Page 13: wifi-y3dips-stmik_mdp_slides

War DrivingWar DrivingWar DrivingWar Driving

d i i h f hWardriving is the act of searchingfor Wi‐Fi wireless networks by aperson in a moving vehicle using aWi‐Fi‐equipped computer, such as alaptop or a PDA.

(http //en wikipedia org/wiki/Wardriving)(http://en.wikipedia.org/wiki/Wardriving)

Wardrivers are only out to log and collectinformation about the wireless access points, theyfind while driving, without using the networks'

Tools

•Net Stumblerfind while driving, without using the networksservices. • Kismet

• Kismac

• MiniStumbler/PocketWarior• MiniStumbler/PocketWarior

[email protected] 

Page 15: wifi-y3dips-stmik_mdp_slides

WarChalkingWarChalkingWarChalkingWarChalking

Warchalking is the drawing ofWarchalking is the drawing ofsymbols in public places toadvertise an open Wi‐Fi wireless

knetwork.

[email protected] 

Page 16: wifi-y3dips-stmik_mdp_slides

PiggyBackingPiggyBacking l ll lPiggyBackingPiggyBacking (using someone else's wireless Internet access)(using someone else's wireless Internet access)

i b ki d fPiggybacking is a term used to referto the illegal access of a wirelessinternet connection without explicitpermission or knowledge from theowner.

Targets :

Hotspots is a venue that offers Wi‐Fiotspots s a e ue t at o e saccess.

(Café, Restaurants, Campus,Office)

[email protected] 

Page 17: wifi-y3dips-stmik_mdp_slides

List of Abuse & tools

Page 18: wifi-y3dips-stmik_mdp_slides

Another WI  FI AbuseAnother WI  FI AbuseAnother WI  FI AbuseAnother WI  FI Abuse

• DOS

• Injection• Fake Access Point• Fake Access Point• Fake CaptivePortal• EavesDropesEavesDropes

• MAC Spoofing

• Man In The Middle Attack

Page 19: wifi-y3dips-stmik_mdp_slides

Top Top 5 5 WIWI FI  ToolsFI  ToolsTop Top 5 5 WIWI‐‐FI  ToolsFI  Tools

• Kismet A powerful wireless sniffer

• Net Stumbler Free Windows 802.11 Sniffer

•AirCrack h f l bl k l•AirCrack The fastest available WEP/WPA cracking tool

•AirSnort 802.11 WEP Encryption Cracking Tool

• Kismac A GUI passive wireless stumbler for Mac OS XKismac A GUI passive wireless stumbler for Mac OS X

Source: http://sectools.org/[email protected] 

Page 20: wifi-y3dips-stmik_mdp_slides

Maybe yes, Maybe No !

Page 21: wifi-y3dips-stmik_mdp_slides

Taking fun from the Taking fun from the wifiwifi at the Cafeat the CafeTaking fun from the Taking fun from the wifiwifi at the Cafeat the Cafe

•Café with a Hotspot

• Not Free Wifi Access 

•Using Some  eleet RestrictionMac Restriction

Protocol Restriction (All TCP need a session auth)

•Trick It• Change your mac

• Tunnel your connection

• Not Free Wifi Access

[email protected] 

Page 22: wifi-y3dips-stmik_mdp_slides

Taking fun from the Taking fun from the wifiwifi at the at the HotelHotelTaking fun from the Taking fun from the wifiwifi at the at the HotelHotel

• Charge User using their room number

•Using Some  eleet Restriction• Room Number with all 

the settings through Captive Portals

h h•Change the HTTP Request 

• Not Free Wifi Access

[email protected] 

Page 23: wifi-y3dips-stmik_mdp_slides

Will we see it right now in front of our eyes

Page 24: wifi-y3dips-stmik_mdp_slides

DEMODEMODEMODEMO

• War Driving

• WarChalking

• WI‐FI Abuse ?

• WEP CrackingWEP Cracking

[email protected] 

Page 25: wifi-y3dips-stmik_mdp_slides

Discussion