SlideShare ist ein Scribd-Unternehmen logo
1 von 49
HACKING & INFORMATION SECURITY
Presents:
-With TechNext
We Are…The Speakers…
Sudarshan Pawar
Certified Security Expert(C.S.E.)
Certified Information Security Specialist (C.I.S.S.)
Security Xplained (TechNext Speaker)
Computer Engg.
& a Security Professional
Prakashchandra Suthar
Security Enthusiast
Cisco Certified Network Associate
Red Hat Linux Certified
Security Xplained (TechNext Speaker)
Computer Engg
Security Researcher.
Topics to be covered
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
We are not including stats, history, who did what/when/why-> Bcoz it’s Booooring….!!! U can
google them later….!
Current Generation
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
Wifi Basics
• WiFi(Wireless Fidelity)->Wireless
networks(commonly referred as WLAN
• Developed on IEEE 802.11 standards
• Wireless networks include: Bluetooth, Infrared
communication, Radio Signal etc.
• Components used:
o Wireless Client Receiver
o Access Point
o Antennas
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
Extension to a wired network
(BROADBAND ROUTER)
(ACCESS POINT)
(EXTENSION POINT)
Multiple Access points
(BROADBAND ROUTER)
(ACCESS POINT-1)
(ACCESS POINT-2)
LAN -2-LAN
LAN-1 LAN-2
3g Hotspot
GPRS
3G
4G
Internet
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
How many of you have tried this???
WiFi Standards
Points 802.11b 802.11a 802.11g 802.11n
Extension to 802.11 802.11 802.11a 802.11g
Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 20 (54Mbps) 20 (54Mbps)
40 (150Mbps)
Frequency(Ghz) 2.4 5 2.4 2.4, 5
Pros Lowest cost;
signal range is
good and not
easily obstructed
fast maximum
speed; regulated
frequencies
prevent signal
interference from
other devices
fast maximum
speed; signal
range is good and
not easily
obstructed
fastest maximum
speed and best
signal range;
more resistant to
signal
interference from
outside sources
Cons slowest
maximum speed
highest cost;
shorter range
signal that is
more easily
obstructed
costs more than
802.11b;
appliances may
interfere on the
unregulated
signal frequency
standard is not
yet finalized;
Are u seriously concerned about wifi
security????? Be honest!
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
WEP(Wired Equivalence Privacy)
• The first encryption scheme made available
for Wi-Fi.
• Uses 24 bit initialization vector for cipher
stream RC4 for confidentiality
• CRC-32 bit checksum for integrity.
• Typically used by home users.
• Uses 64,128, 256 bit keys
• Flawed from the get go.
WEP Working
KEY
STORE WEP Key IV
RC4
CIPHER KEYSTREAM
DATA ICV
PAD KID CIPHERTEXTIV
WEP ENCRYPTED
PACKET(MAC FRAME)
CRC 32
CHECKSUM
XOR
ALGO.
WEP Weakness
1. Key management and key size
2. 24 bit IV size is less.
3. The ICV algorithm is not appropriate
4. Use of RC4 algorithm is weak
5. Authentication messages can be easily forged
Wep Broken beyond repair
WPA (Wi-Fi Protected Access)
• Data Encryption for WLAN based on 802.11 std.
• Improved Encryption & Authentication Method.
• Uses TKIP
– Based on WEP
– Michael algorithm
• Hardware changes not required
• Firmware update
Types
1. Personal 2. Enterprise
PSK 802.1x + RADIUS
WPA Working
Temporary
Encryption key
Transmit
Address
T.S.C.
KEY
MIXING
WEP
SEED
RC4
CIPHER KEYSTREAM
MAC
HEADER
IV KID EIV CIPHER TEXT
MSDU
MIC KEY
MPDU ICV
MICHAELS
ALGORITHM MSDU + MIC KEY
( PACKET TO BE TRANSMITTED )
WPA2
• Long Term Solution (802.11)
• Stronger Data protection & Network access
control
• Used CCMP
– Based on AES
• Hardware changes required
Types
1. Personal Pre Shared Key
2. Enterprise 802.1x + RADIUS
WPA2 Working
Source: EC Council
Source: someecards
Breaking WPA/WPA2
• Dictionary Attacks(Not so successful, but yeah
some time…)
• Brute Force(tools like: Kismac, Aireplay etc)
• WPA PSK
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
Security breaching sequence
Find the network
Study its traffic
Study Security
mechanisms
ATTACK!!!!!!!!
(i.e. Decrypt the
packets)
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
BEFORE ATTACK
DOS
Access point is busy handling attackers request
AFTER ATTACK
Man In The Middle Attack(MITM)
• Before
After…
ARP Poisoning/Spoofing
Source: http://securitymusings.com/wp-content/uploads/2008/12/arp-spoofing.png
WiFi JAMMING….
WiFi JAMMING….
Fake Access Points
SSID: XYZ Bank
Fake Access Points
SSID: XYZ Bank
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
Defense against WPA / WPA2 attacks
• Extremely Complicated keys can help
• Passphrase should not one from dictionary, so
use uncommon-senseless words.
• Key should be more than 20 chars with
combination of special chars, numbers,
alphabets. Change them at regular intervals.
#eY,t#!$c@//_B-gUd0n3?@$sW0rD
1. WPA instead of WEP
2. WPA2 Enterprise implementation
3. Place AP at secured location.
4. Centralized authentication & Update Drivers
regularly.
5. Changing default SSID after Configuring
WLAN
6. Firewall policies & Router access Password
Security Checkboxes
1. MAC add. Filtering
2. Encryption at Access Point
3. Packet Filtering between AP
4. Network Strength configuration.
5. Use Ipsec’s for encryption on WLANS
6. Check out for Rogue Access Points
Security Checkboxes(contd…)
Wi-Fi Security Auditing Tools
• AirMagnet Wifi Analyzer
• AirDefense
• Adaptive wireless IPS
• ARUBA RF Protect WIPS
• And many others…
Questions?
• What you want to ask, many already have that same question
on their mind. Be bold and lead
• OK, if you don’t want to speak and keep shut and keep
thinking about it in your mind and take those questions home,
make sure you email those to us and sleep well at night!
What should be our topic for the next meet?
I hate to ask but, how can we make this better?

Weitere ähnliche Inhalte

Was ist angesagt?

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Hem Pokhrel
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 

Was ist angesagt? (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Firewall
FirewallFirewall
Firewall
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Email security
Email securityEmail security
Email security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 

Ähnlich wie WiFi Secuiry: Attack & Defence

Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity materialNune SrinivasRao
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.pptNotSure11
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.pptMavaz
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Samwed Jain
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and securityAdel Zalok
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 

Ähnlich wie WiFi Secuiry: Attack & Defence (20)

chapter 8.ppt
chapter 8.pptchapter 8.ppt
chapter 8.ppt
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Wireless security
Wireless securityWireless security
Wireless security
 
WEP
WEPWEP
WEP
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 

Kürzlich hochgeladen

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

WiFi Secuiry: Attack & Defence

  • 1. HACKING & INFORMATION SECURITY Presents: -With TechNext
  • 2. We Are…The Speakers… Sudarshan Pawar Certified Security Expert(C.S.E.) Certified Information Security Specialist (C.I.S.S.) Security Xplained (TechNext Speaker) Computer Engg. & a Security Professional Prakashchandra Suthar Security Enthusiast Cisco Certified Network Associate Red Hat Linux Certified Security Xplained (TechNext Speaker) Computer Engg Security Researcher.
  • 3.
  • 4. Topics to be covered • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools We are not including stats, history, who did what/when/why-> Bcoz it’s Booooring….!!! U can google them later….!
  • 6. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 7. Wifi Basics • WiFi(Wireless Fidelity)->Wireless networks(commonly referred as WLAN • Developed on IEEE 802.11 standards • Wireless networks include: Bluetooth, Infrared communication, Radio Signal etc. • Components used: o Wireless Client Receiver o Access Point o Antennas
  • 8. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 9. Extension to a wired network (BROADBAND ROUTER) (ACCESS POINT) (EXTENSION POINT)
  • 10. Multiple Access points (BROADBAND ROUTER) (ACCESS POINT-1) (ACCESS POINT-2)
  • 13. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 14. How many of you have tried this???
  • 15. WiFi Standards Points 802.11b 802.11a 802.11g 802.11n Extension to 802.11 802.11 802.11a 802.11g Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 20 (54Mbps) 20 (54Mbps) 40 (150Mbps) Frequency(Ghz) 2.4 5 2.4 2.4, 5 Pros Lowest cost; signal range is good and not easily obstructed fast maximum speed; regulated frequencies prevent signal interference from other devices fast maximum speed; signal range is good and not easily obstructed fastest maximum speed and best signal range; more resistant to signal interference from outside sources Cons slowest maximum speed highest cost; shorter range signal that is more easily obstructed costs more than 802.11b; appliances may interfere on the unregulated signal frequency standard is not yet finalized;
  • 16. Are u seriously concerned about wifi security????? Be honest!
  • 17. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 18. WEP(Wired Equivalence Privacy) • The first encryption scheme made available for Wi-Fi. • Uses 24 bit initialization vector for cipher stream RC4 for confidentiality • CRC-32 bit checksum for integrity. • Typically used by home users. • Uses 64,128, 256 bit keys • Flawed from the get go.
  • 19. WEP Working KEY STORE WEP Key IV RC4 CIPHER KEYSTREAM DATA ICV PAD KID CIPHERTEXTIV WEP ENCRYPTED PACKET(MAC FRAME) CRC 32 CHECKSUM XOR ALGO.
  • 20. WEP Weakness 1. Key management and key size 2. 24 bit IV size is less. 3. The ICV algorithm is not appropriate 4. Use of RC4 algorithm is weak 5. Authentication messages can be easily forged
  • 22. WPA (Wi-Fi Protected Access) • Data Encryption for WLAN based on 802.11 std. • Improved Encryption & Authentication Method. • Uses TKIP – Based on WEP – Michael algorithm • Hardware changes not required • Firmware update Types 1. Personal 2. Enterprise PSK 802.1x + RADIUS
  • 23. WPA Working Temporary Encryption key Transmit Address T.S.C. KEY MIXING WEP SEED RC4 CIPHER KEYSTREAM MAC HEADER IV KID EIV CIPHER TEXT MSDU MIC KEY MPDU ICV MICHAELS ALGORITHM MSDU + MIC KEY ( PACKET TO BE TRANSMITTED )
  • 24. WPA2 • Long Term Solution (802.11) • Stronger Data protection & Network access control • Used CCMP – Based on AES • Hardware changes required Types 1. Personal Pre Shared Key 2. Enterprise 802.1x + RADIUS
  • 27. Breaking WPA/WPA2 • Dictionary Attacks(Not so successful, but yeah some time…) • Brute Force(tools like: Kismac, Aireplay etc) • WPA PSK
  • 28. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 29. Security breaching sequence Find the network Study its traffic Study Security mechanisms ATTACK!!!!!!!! (i.e. Decrypt the packets)
  • 30. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 32. Access point is busy handling attackers request AFTER ATTACK
  • 33. Man In The Middle Attack(MITM) • Before
  • 39.
  • 41. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  • 42. Defense against WPA / WPA2 attacks • Extremely Complicated keys can help • Passphrase should not one from dictionary, so use uncommon-senseless words. • Key should be more than 20 chars with combination of special chars, numbers, alphabets. Change them at regular intervals.
  • 44. 1. WPA instead of WEP 2. WPA2 Enterprise implementation 3. Place AP at secured location. 4. Centralized authentication & Update Drivers regularly. 5. Changing default SSID after Configuring WLAN 6. Firewall policies & Router access Password Security Checkboxes
  • 45. 1. MAC add. Filtering 2. Encryption at Access Point 3. Packet Filtering between AP 4. Network Strength configuration. 5. Use Ipsec’s for encryption on WLANS 6. Check out for Rogue Access Points Security Checkboxes(contd…)
  • 46. Wi-Fi Security Auditing Tools • AirMagnet Wifi Analyzer • AirDefense • Adaptive wireless IPS • ARUBA RF Protect WIPS • And many others…
  • 47.
  • 48. Questions? • What you want to ask, many already have that same question on their mind. Be bold and lead • OK, if you don’t want to speak and keep shut and keep thinking about it in your mind and take those questions home, make sure you email those to us and sleep well at night!
  • 49. What should be our topic for the next meet? I hate to ask but, how can we make this better?