(5th SEMESTER-3rd YEAR)
ATTACKING WIFI NETS WITH TRAFFIC INJECTION
Mr. Gaurav Sharma
SUBMITTED BY: JAGTARSINGH SECTION-K1004 ROLL NO- A01 REG NO.11005298 ACKNOWLEDGEMENT
I Jagtar Singh student of B.Tech(CSE)-MBA Ist term expressing my deep gratitude to my OE teacher “Mr. Gaurav Sharma”. I am very much thankful to him. I benefited a lot discussing with him. I am also thankful to my parents who encouraged me and provided such a motivation, so I became able to perform this. I am also thankful to all my friends and those who helped me directly or indirectly in completion of my project.
•Laws that have been violated
•Possible Punishments (IT ACT + INTERNATIONAL LAWS)
•Unlawful Losses and Gains
•Working of Attacks
•Description of Tools
This term paper is based on “attacking wifi nets with traffic injection” also known as packet injection which simply means the hacking of wireless networks with different techniques to send extra amount of traffic (packets, frames, duplicate copies) on a network by which a hacker can able to access the information and identity that a client is using.
Some techniques are wireless network sniffing, DOS (denial of service attack), Man in the middle attack etc. Attacks on wireless LANs (WLAN’s) and wireless-enabled laptops are a quick and easy way for hackers to steal data and enter the corporate network. Many types of tools are used to perform hacking. Some of them are named as aircrack-ng, airjack etc. thts paper will later give brief information on tools used , working of tools ,losses and gains with hacking etc. These type of attacks are known as INTEGRITY attacks.
Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate. We already know 802.11 networks are weak. Open networks are prone to any well-known LAN perimeter attack WEP is vulnerable.
Traffic injection has changed things like
•Increased DoS (denial of service) capabilities
•Dramatically decreased WEP cracking achievement time
•Allows traffic tampering
•Allows stations attacks
Cyber Crime –A crime where the computer is used as a tool or target. Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
Hacking – Traffic injection attacks comes under hacking. It is defined as whomever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. Hacking may also occur when a person willfully, knowingly, and without authorization or without reasonable grounds to believe that he or she has such authorization, destroys data, computer programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network. Besides the destruction of such data,...