Top Banner
A set of experience over the air [email protected]
25

wifi

Jan 28, 2015

Download

Technology

Ammar WK

y3dips's Wifi [in]security presentation at STMIK MDP Palembang
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: wifi

A set of experience over the air

[email protected] 

Page 2: wifi

ECHOECHOECHOECHO

I d E i C it  f  H k  • IndonEsian Community for Hackers and Open Source •The stressing is still around the hacking stuffs. We're working on the Open Source activities• Ezines, Advisories, News, Forum, , , , ,Mailing list• Founded in 2003Has 13 staff a k a ECHO STAFF• Has 13 staff a.k.a ECHO STAFF

• Has 11116mailing lists member, and 14151 Board Discussions 

bmember (Jan,22 2008)• http://echo.or.id  || http://e‐rdc.org 

[email protected] 

Page 4: wifi

WIWI FIFIWIWI‐‐FIFI

l kWi‐Fi, is a wireless networking technology used across the globe. Wi‐Fi refers to any system that uses the 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers g(IEEE) and released in 1997. The term Wi‐Fi, which is alternatively spelled WiFi  Wi‐fi  Wifi  or wifi  was spelled WiFi, Wi fi, Wifi, or wifi, was pushed by the Wi‐Fi Alliance, a trade group that pioneered commercialization of the commercialization of the technology.

Wi‐Fi®, Wi‐Fi Alliance®, the Wi‐Fi logo, are registered trademarks of the Wi‐Fi Alliance

[email protected] 

Page 5: wifi

802 11802 11802.11802.11

f d d f802.11 is a set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public 5 4 pspectrum bands.

[email protected] 

Page 6: wifi

Why WIWhy WI FIFIWhy WIWhy WI‐‐FIFI

i l b l f•Convenience:  Flexibility of time and location

•Mobility: Access the internet even Mobility: Access the internet even outside their normal work environment

P d i i  P i ll  b  •Productivity: Potentially be more

•Deployment: Requires little more than a single access pointt a a s g e access po t

•Expandability: Serve a suddenly‐increased number of clients 

•Cost.

[email protected] 

Page 7: wifi

Keep it safe or wide open

Page 8: wifi

WI WI  FI  SecurityFI  SecurityWI WI ––FI  SecurityFI  SecurityOutsiders can sometimes get into your wireless networks as fast and easilyOutsiders can sometimes get into your wireless networks as fast and easily

Some Security Method• MAC ID filtering MAC ID filtering • Static IP Addressing • WEP encryption 

WPA • WPA  Wi‐Fi Protected Access

• WPA2 • LEAP  Lightweight Extensible Authentication Protocol

• PEAP  Protected Extensible Authentication Protocol• TKIP  Temporal Key Integrity Protocol

• RADIUS  Remote Authentication Dial In User Service

• WAPI  WLAN Authentication and Privacy Infrastructure

• Smart cards, USB tokens, and software tokens

[email protected] 

Page 9: wifi

3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure3  General Steps To  Relatively Secure

ll d d b d1. All WI‐FI devices need to be secured

2. All Users need to be educated

3 Need to be actively monitored for weaknesses and breaches3. Need to be actively monitored for weaknesses and breaches

http://en.wikipedia.org/wiki/Wireless_security

[email protected] 

Page 10: wifi

Specific  Steps  to be Specific  Steps  to be relatively relatively SecureSecureSpecific  Steps  to be Specific  Steps  to be relatively relatively SecureSecure

S    h   t k   bli   i    f     (AP)    h   d  1. Secure your home network: enabling security  of your router (AP) , change password, restrict the

2. Protect yourself when using a public hotspot:C l hConnecting to a legitimate hotspot .Use a virtual private network or VPN,Stay away from critical action (bank transaction)

3. Configure for approved connections:  simply configure your device to not automatically connect 

4. Disable sharing: Your Wi‐Fi enabled devices may automatically open themselves to sharing / connecting with other devices. 

5. Install anti‐virus software: makes it more important to have antivirus software installed.

6. Use a personal firewall: a personal firewall program.p p p g

[email protected] 

Page 11: wifi

A set of popular things

Page 12: wifi

Hardware HackingHardware HackingHardware HackingHardware Hacking

ild i id i iBuild A Tin Can Waveguide WiFiAntenna

•Using a Can, … and else• Increase the range of your gWireless network

•http://www.turnpoint.net/wireless/cantennahowto.html

•http://wikihost.org/wikis/indonesiainternet/programm/gebo.prg?name=sejarah_internet_indonesia:wajanbolic_e‐goen

[email protected] 

Page 13: wifi

War DrivingWar DrivingWar DrivingWar Driving

d i i h f hWardriving is the act of searchingfor Wi‐Fi wireless networks by aperson in a moving vehicle using aWi‐Fi‐equipped computer, such as alaptop or a PDA.

(http //en wikipedia org/wiki/Wardriving)(http://en.wikipedia.org/wiki/Wardriving)

Wardrivers are only out to log and collectinformation about the wireless access points, theyfind while driving, without using the networks'

Tools

•Net Stumblerfind while driving, without using the networksservices. • Kismet

• Kismac

• MiniStumbler/PocketWarior• MiniStumbler/PocketWarior

[email protected] 

Page 15: wifi

WarChalkingWarChalkingWarChalkingWarChalking

Warchalking is the drawing ofWarchalking is the drawing ofsymbols in public places toadvertise an open Wi‐Fi wireless

knetwork.

[email protected] 

Page 16: wifi

PiggyBackingPiggyBacking l ll lPiggyBackingPiggyBacking (using someone else's wireless Internet access)(using someone else's wireless Internet access)

i b ki d fPiggybacking is a term used to referto the illegal access of a wirelessinternet connection without explicitpermission or knowledge from theowner.

Targets :

Hotspots is a venue that offers Wi‐Fiotspots s a e ue t at o e saccess.

(Café, Restaurants, Campus,Office)

[email protected] 

Page 17: wifi

List of Abuse & tools

Page 18: wifi

Another WI  FI AbuseAnother WI  FI AbuseAnother WI  FI AbuseAnother WI  FI Abuse

• DOS

• Injection• Fake Access Point• Fake Access Point• Fake CaptivePortal• EavesDropesEavesDropes

• MAC Spoofing

• Man In The Middle Attack

Page 19: wifi

Top Top 5 5 WIWI FI  ToolsFI  ToolsTop Top 5 5 WIWI‐‐FI  ToolsFI  Tools

• Kismet A powerful wireless sniffer

• Net Stumbler Free Windows 802.11 Sniffer

•AirCrack h f l bl k l•AirCrack The fastest available WEP/WPA cracking tool

•AirSnort 802.11 WEP Encryption Cracking Tool

• Kismac A GUI passive wireless stumbler for Mac OS XKismac A GUI passive wireless stumbler for Mac OS X

Source: http://sectools.org/[email protected] 

Page 20: wifi

Maybe yes, Maybe No !

Page 21: wifi

Taking fun from the Taking fun from the wifiwifi at the Cafeat the CafeTaking fun from the Taking fun from the wifiwifi at the Cafeat the Cafe

•Café with a Hotspot

• Not Free Wifi Access 

•Using Some  eleet RestrictionMac Restriction

Protocol Restriction (All TCP need a session auth)

•Trick It• Change your mac

• Tunnel your connection

• Not Free Wifi Access

[email protected] 

Page 22: wifi

Taking fun from the Taking fun from the wifiwifi at the at the HotelHotelTaking fun from the Taking fun from the wifiwifi at the at the HotelHotel

• Charge User using their room number

•Using Some  eleet Restriction• Room Number with all 

the settings through Captive Portals

h h•Change the HTTP Request 

• Not Free Wifi Access

[email protected] 

Page 23: wifi

Will we see it right now in front of our eyes

Page 24: wifi

DEMODEMODEMODEMO

• War Driving

• WarChalking

• WI‐FI Abuse ?

• WEP CrackingWEP Cracking

[email protected] 

Page 25: wifi

Discussion