-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathwifinetworking
458 lines (350 loc) · 6.95 KB
/
wifinetworking
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
networking>>>
ISDN
sector based antena
omni and sector based antene
WIFI::
types of wifi:
standard:
authentication:
chalking:
antenna:
termnology::
frequency hopping spread spectrum(FHSS)::
hedy lamrr(actoress and inventer)
irregular frequency 900mhz-2.5ghz
not very fast
direct squence spread spectrum(dsss):
FCC:
frequency hopping
basic servic set identifier(BSSID)
conist mac address of access point
BSS-table
ssid(service set id) :32 alphnumeric character
attached each headers of wireless packets
multiple access point
Disadvantage::
security
bandwidth
upgrades
interference
types of wifi n/w:::
extension to n/w
access point
lan 2 lan n/w
multiple access point n/w
cellular access n/w
pcmcia cards
wifi standards:
line of sight
fresnel zone(cannot block more then 40 %)
ieee standards:
802.11c
--a
--b
--g
--n
--ac max speed
802.16(wimax)
bluetooth
part 4 wifi
wifi authentication::
open vs shared
open system authentication
ssid of computer match with wifi ssid
///connecting to n/w
probe request<---
probe response--->
open sys auth ,rqu<--
open sys auth,resp--->
assos requ<--
assos respon-->
authen req<---
challenge text--->
shared key
<---encrytp channlege txt--
---decrypt challenge txt good auth client--->
<-----connet to n/w<-----
wireless threat::
shared key
identify n/w
chalking:::deprecated tech
war walking
war flying
war driving
war crawling
leave behind some symbols for another community person
symbols
node (open closed)
)( o
encyrption used
speeds
ssid
filtering
antenna types::
omni direction(transmit 360 degree horizontally less powerful)
vertical omni direction
both depend upon wiring
direction antenna(varous degree 40 90 180) powerful then omni
by using sheet mattle it increase signals
parablic grid (10 + miles) more powerful
less angle more bandwidth
yagi
extremly focus connectivity/used for huge distance
used reflactors,direcotors,driven element
used small pattern
used microweave technology /low frequecy
encryption in wireless:
wep encription /wpa wpa2/beraking encrption/defending against
wep encription:(wired equivalent privacy)
protect from eavedropping
prevent unautherize access
keys
goals:
gain access
confidetiality
data integrity
efficency
no review via public
pre share key issue
used RC4 encription same key used for decription
wpa:::wifi procted access
uses tempory key integrity protocol(TKIP)
wrap code aroud wep
unique keys for each frame
wpa2::
aes algo.
ccnp (counter cipher mode and block chain autheniction build protocol ) replace tkip
wpa-personal
uses psk(pre share key)
uses 256 bit key
8-63 asiii using for passphares
wps (wifi protected setup)
wpa-enterprize
uses eap or radius
uses name ,pass,token card,kerberos,certs etc.
AES-CCMP which is stroger then RC4
802.1x(framework)
uses user and machine auth/port based controls
breaking encription::::
feeble initialization vectors or ivs
initalize vectores wep has:
rc4
key scduel algo
first few bits are clear txt
initailze vector reuse
appended to keys make it susceptable to FMS attack
aircrack,airsnort(tools)
airplay-ng(tools)
wpa psk is tougher
de authenentication attack
kismac,reaver(tools)
types of attack::
data frame injection
data replay
wep injection
iv(initialize vector) replay
bit fipping
EAP Replay
RADIUS REPLAY
WIRELESS N/W VIRUS(EXAMPLE chameleon)
confidentiality attacks
honeypot aps
sessoin hijecking
traffic analysis
eavesdropping
masquarding
MITM(man in middle attack)
creacking wep
evil twin access nw point
Availablity attack
AP theft
DOS
auth flood
disassociation
deauthentication flood
ARP posioning
routing attack
EAP failure
power saving attack
beacon flooding
TKIP MIC exploit
Authentication attack
ID theft
PSK cracking
VPN login cracking
DOmain login cracking
Password assumption
app login theft
Attacks on access point
rogue access point
unauthorize association
Honey spot ap attack
AP mac spoofing
attacks on client::
denial of service
(dos attack)
adhoc attack
jamming
methodology of hacking wireless::
wifi discovery
looky-loo
footprinting
build in wifi ,extern antenna, application
inSSIDer(tools)
netsurveyor(tools)
vistumbler(tools)
wigle.net(website)
kismet(tools)
istumbler(tools)
mobiles:
wi-fifofum(tools)
network signal info
wifi rader
ministunner
wifi analyzer
wardriving
GPS(global positioning system) mapping::
wigle(tools)
skyhook(tools)
wefi
wifi traffic analysis
authentication attacks
id vulnerablilities
reconnasissance
cool tools:
wireshark
airmagnet
omnipeak
airsnort
understand the card
card brand
chipset brand
capablility
drivar avalilblity
pcmci(card)
airpcap(adapter)
multichennel
injection feature
cain & able,wireshark,aircrack-ng
acrylic(card)
launching attack
aircracking(tools)
airbase-ng(tools)
aircrack-ng(tools)
airdriver-ng(tools)
airdrop-ng(tools)
airplay-ng(tools)
eassid-ng(tools)
airodump-ng(tools)
airgraph-ng(tools)
airolib-ng(tools)
airserv-ng(tools)
airmon-ng(tools)
airtun-ng(tools)
packetforge-ng(tools)
tkiptun-ng(tools)
wesside-ng(tools)
airdecloak-ng(tools)
airdecap-ng(tools)
netstubller(tools)
find hidden ssids::
airdump-ng wlan1
airdump-ng -c 6 --bssid x wlan1
airplay-ng ---
cracking wifi encryption
aircrack-ng(tools)
kismac(tools)
killerbee(tools)
bluepot(tools)
blueranger(tools)
redfang(tools)
wifi honey(tools)
cain & abel(tools)
usbdoggle(tools)
cloudcracker(tools)
reaver(tools)
how much danage can we do::
wps
reaver -i interface name -b bssid
airmon-ng start wlan1 or either wlan0
airodump-ng mon0
reaver -i mon0 -b bsssid -vv
airmon-ng
airmon-ng start
airodump-ng mon0
airodump-g -c 11 --bssid -w /root/desktop/mon0
airplay-ng -0 2 -a bssid -c station mon0
aircrack-ng -a2 -b bssid -w /root/dic.txt /root/desktop/*.cap
going mobile
peNtrate pro
bcmon
reaver
ispeedtouch
wifiaudit
iwep pro
hacking bluetooth:::
the threat:
bluejacking(sending message)
bluesmacking(dos buffer overflow)
bluesnarfing
blue priniting(footprinting method)
bluebugging(gain access and full access AT level commands)
MiTM(man in middle)
mac spoofing
PicoNet(ad hoc nw)
PiTM
Countermeasures:
bluetooth
Rogue access point
6 layers of wireless
bluetooth
Rogue access point
AP scanning
wireless intrusion prevention system
RF scanning
Layers of wireless:::
wireless signals
RF spectrum
IDS
Data protection
WPA2 and AES
Device Security
update/patches/vulnerablities
Connection level
pre packet auth
centralize encription
N/W protection
strong auth
End users
a user firewall
Best practices::
configuration
change default ssid
change default username and password
disable ssid broadcasting
disable remote login/wireless
administration
enable mac filtering
change passphrase
Authentication::
WEP
update driver
centralize auth server
turn off when are not using
secure physical side
SSID settings
use ssid cloaking(hiding ssid)
firewall/packet filter=>network
checking setting after firmware update
limiting signal strength
think about other encryptions(IPSEC?)
TOOLS:
WIPS(wireless intrusion prevention system)
cisco discovery protocol
s/w
airmagnet
zenworks
airTight
openwips-ng
h/w
Bat