HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and...
Transcript of HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and...
![Page 1: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/1.jpg)
HACKING & INFORMATION SECURITY Presents:
-‐With TechNext
![Page 2: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/2.jpg)
We Are…The Speakers…
Sudarshan Pawar Cer.fied Security Expert(C.S.E.) Cer.fied Informa.on Security Specialist (C.I.S.S.) Security Xplained (TechNext Speaker) Computer Engg. & a Security Professional
Prakashchandra Suthar Security Enthusiast
Cisco Cer.fied Network Associate Red Hat Linux Cer.fied
Security Xplained (TechNext Speaker) Computer Engg
Security Researcher.
![Page 3: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/3.jpg)
![Page 4: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/4.jpg)
Topics to be covered
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools We are not including stats, history, who did what/when/why-‐> Bcoz it’s Booooring….!!! U can
google them later….!
![Page 5: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/5.jpg)
Current Genera.on
![Page 6: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/6.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 7: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/7.jpg)
Wifi Basics
• WiFi(Wireless Fidelity)-‐>Wireless networks(commonly referred as WLAN
• Developed on IEEE 802.11 standards • Wireless networks include: Bluetooth, Infrared communica.on, Radio Signal etc.
• Components used: o Wireless Client Receiver o Access Point o Antennas
![Page 8: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/8.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 9: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/9.jpg)
Extension to a wired network
(BROADBAND ROUTER)
(ACCESS POINT)
(EXTENSION POINT)
![Page 10: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/10.jpg)
Mul.ple Access points
(BROADBAND ROUTER)
(ACCESS POINT-‐1)
(ACCESS POINT-‐2)
![Page 11: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/11.jpg)
LAN -‐2-‐LAN
LAN-‐1 LAN-‐2
![Page 12: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/12.jpg)
3g Hotspot
GPRS 3G 4G
Internet
![Page 13: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/13.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 14: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/14.jpg)
How many of you have tried this???
![Page 15: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/15.jpg)
WiFi Standards Points 802.11b 802.11a 802.11g 802.11n
Extension to 802.11 802.11 802.11a 802.11g
Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 20 (54Mbps) 20 (54Mbps) 40 (150Mbps)
Frequency(Ghz) 2.4 5 2.4 2.4, 5
Pros Lowest cost; signal range is good and not easily obstructed
fast maximum speed; regulated frequencies prevent signal interference from other devices
fast maximum speed; signal range is good and not easily obstructed
fastest maximum speed and best signal range; more resistant to signal interference from outside sources
Cons slowest maximum speed
highest cost; shorter range signal that is more easily obstructed
costs more than 802.11b; appliances may interfere on the unregulated signal frequency
standard is not yet finalized;
![Page 16: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/16.jpg)
Are u seriously concerned about wifi security????? Be honest!
![Page 17: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/17.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 18: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/18.jpg)
WEP(Wired Equivalence Privacy)
• The first encryp.on scheme made available for Wi-‐Fi.
• Uses 24 bit ini.aliza.on vector for cipher stream RC4 for confiden.ality
• CRC-‐32 bit checksum for integrity. • Typically used by home users. • Uses 64,128, 256 bit keys • Flawed from the get go.
![Page 19: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/19.jpg)
WEP Working
KEY STORE WEP Key IV
RC4 CIPHER KEYSTREAM
DATA ICV
PAD KID CIPHERTEXT IV
WEP ENCRYPTED PACKET(MAC FRAME)
CRC 32 CHECKSUM
XOR ALGO.
![Page 20: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/20.jpg)
WEP Weakness
1. Key management and key size 2. 24 bit IV size is less. 3. The ICV algorithm is not appropriate 4. Use of RC4 algorithm is weak 5. Authen.ca.on messages can be easily forged
![Page 21: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/21.jpg)
Wep Broken beyond repair
![Page 22: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/22.jpg)
WPA (Wi-‐Fi Protected Access) • Data Encryp.on for WLAN based on 802.11 std. • Improved Encryp.on & Authen.ca.on Method. • Uses TKIP
– Based on WEP – Michael algorithm
• Hardware changes not required • Firmware update Types 1. Personal 2. Enterprise PSK 802.1x + RADIUS
![Page 23: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/23.jpg)
WPA Working Temporary EncrypUon key
Transmit Address
T.S.C.
KEY MIXING
WEP SEED
RC4 CIPHER KEYSTREAM
MAC HEADER
IV KID EIV CIPHER TEXT
MSDU
MIC KEY MPDU ICV MICHAELS
ALGORITHM MSDU + MIC KEY
( PACKET TO BE TRANSMITTED )
![Page 24: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/24.jpg)
WPA2 • Long Term Solu.on (802.11) • Stronger Data protec.on & Network access control
• Used CCMP – Based on AES
• Hardware changes required
Types 1. Personal Pre Shared Key 2. Enterprise 802.1x + RADIUS
![Page 25: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/25.jpg)
WPA2 Working
Source: EC Council
![Page 26: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/26.jpg)
Source: someecards
![Page 27: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/27.jpg)
Breaking WPA/WPA2
• Dic.onary Akacks(Not so successful, but yeah some .me…)
• Brute Force(tools like: Kismac, Aireplay etc) • WPA PSK
![Page 28: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/28.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 29: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/29.jpg)
Security breaching sequence Find the network
Study its traffic
Study Security mechanisms
ATTACK!!!!!!!! (i.e. Decrypt the
packets)
![Page 30: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/30.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 31: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/31.jpg)
BEFORE ATTACK
DOS
![Page 32: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/32.jpg)
Access point is busy handling akackers request
AFTER ATTACK
![Page 33: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/33.jpg)
Man In The Middle Akack(MITM)
• Before
![Page 34: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/34.jpg)
Aler…
![Page 35: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/35.jpg)
ARP Poisoning/Spoofing
Source: h3p://securitymusings.com/wp-‐content/uploads/2008/12/arp-‐spoofing.png
![Page 36: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/36.jpg)
WiFi JAMMING….
![Page 37: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/37.jpg)
WiFi JAMMING….
![Page 38: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/38.jpg)
Fake Access Points
SSID: XYZ Bank
![Page 39: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/39.jpg)
![Page 40: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/40.jpg)
Fake Access Points
SSID: XYZ Bank
![Page 41: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/41.jpg)
• Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryp.on Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
![Page 42: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/42.jpg)
Defense against WPA / WPA2 akacks
• Extremely Complicated keys can help • Passphrase should not one from dic.onary, so use uncommon-‐senseless words.
• Key should be more than 20 chars with combina.on of special chars, numbers, alphabets. Change them at regular intervals.
![Page 43: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/43.jpg)
#eY,t#!$c@/\/_B-‐gUd0n3?@$sW0rD
![Page 44: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/44.jpg)
1. WPA instead of WEP 2. WPA2 Enterprise implementa.on 3. Place AP at secured loca.on. 4. Centralized authen.ca.on & Update Drivers
regularly. 5. Changing default SSID aler Configuring
WLAN 6. Firewall policies & Router access Password
Security Checkboxes
![Page 45: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/45.jpg)
1. MAC add. Filtering 2. Encryp.on at Access Point 3. Packet Filtering between AP 4. Network Strength configura.on. 5. Use Ipsec’s for encryp.on on WLANS 6. Check out for Rogue Access Points
Security Checkboxes(contd…)
![Page 46: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/46.jpg)
Wi-‐Fi Security Audi.ng Tools
• AirMagnet Wifi Analyzer • AirDefense • Adap.ve wireless IPS • ARUBA RF Protect WIPS • And many others…
![Page 47: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/47.jpg)
![Page 48: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/48.jpg)
Ques.ons?
• What you want to ask, many already have that same ques.on on their mind. Be bold and lead
• OK, if you don’t want to speak and keep shut and keep thinking about it in your mind and take those ques.ons home, make sure you email those to us and sleep well at night!
![Page 49: HACKING & INFORMATION SECURITY Presentsfiles.meetup.com/7108012/Wifi Security - Attack and Defense.pdf · • Basics)of)Wifi) • Types)of)wireless)networks) • Wireless)Standards(802.11)series))](https://reader035.fdocuments.in/reader035/viewer/2022070904/5f6e45728017e62beb593e9e/html5/thumbnails/49.jpg)
What should be our topic for the next meet? I hate to ask but, how can we make this beker?