Preview

Wifi Hacking

Powerful Essays
Open Document
Open Document
3190 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wifi Hacking
The Art of casual WiFi hacking
Jeremy Martin, CISSP-ISSAP, NSA-IAM/IEM, CEH – jeremy@infosecwriter.com It is a cloudy Friday night and I am in the listening to another episode of 2600’s “Off the hook” radio when the interruption of the phone catches my attention. I had been expecting the call from my colleague, because I needed help with some new proof-ofconcept ideas for a penetration test I have the following week. During the conversation, we eagerly decided to head out for the night to Wardrive in the area. Wardriving is always a good excuse to test new programs and ideas. We position both laptops for optimal WiFi signal, easy access to the GPS devices, and secure them for the least amount of movement while driving. Right before we leave, we make sure the power converter is turned on, and the systems are plugged in. To cover all our bases, one laptop runs Windows XP Pro, NetStumbler, and Cain&Able while the second system has Suse 9.2 Linux with Kismet, Airsnort, Aircrack, and Void11. Using two devices with such different environments improves success while surveying WiFi in an area or “footprinting” them. Here is where the fun begins. After driving for a few miles, we enter a well lit street in the business section of town, and hear the ping of live access points every few seconds. Even though we have been doing this for years, we are both amazed at the percentage of companies that employ WiFi that do not implement any sort of encryption. This allows us to park and let Kismet do what it does best... passively listen to network traffic running over the 802.11 signal. We are able to map several subnets and gather other interesting information being broadcast to the public. At the end of the night, we were able to gather over 127 WiFi hotspots after only driving seventeen miles round trip. With this type of information gathered, playtime for hackers begins.

Wardriving
Also referred to as “Geek’s catch and release fishing”, is the act of driving around and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Losing Sensitive Items

    • 354 Words
    • 2 Pages

    SKL you have just given your enemy the ability to intercept all secure radio transmissions between any two operators in your area…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although the Zigbee protocol implements the Advanced Encryption Standard (AES) protocol the initial key exchange is not protected against sniffing. The network keys are often exchanged in plain text or are encoded using the default factory key. Consequently, if an attacker were to sniff the initial exchange of packets, that attacker would be able to gain access to the network keys and the entire network. The difficulty with this type of attack is that the key exchange only occurs when a new node registers with the network. After this initial exchange all packets are encoded. The trick for these types of attacks, is forcing the network to enter an initialization state. This can be accomplished by creating RF interference that will result in dropped packets. After a certain number of dropped packets a wireless node will think that it has lost connection to the network and will try to reconnect. Then when this occurs the network key can be sniffed. These types of attacks have been carried out by a large number of security researchers [6, 7, 8, 9,…

    • 734 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Searls, D., 2003. Linux makes wi-fi happen in new york city. Linux Journal 2003, 3.…

    • 3205 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    hobo Essay Example

    • 850 Words
    • 4 Pages

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Buddha's Brain

    • 3236 Words
    • 13 Pages

    This position offers a unique opportunity to build a Center of Excellence in Wireless Communication Research and to significantly expand industry-university collaborative research in the fields of wireless networks. IPFW offers a competitive salary and benefits package and an excellent work environment. Fort Wayne is the second largest city in Indiana and is located within several hours of Chicago, Columbus, Cincinnati, Detroit, and Indianapolis. It boasts affordable housing, a low cost of living and a safe environment in which to raise a family.The region is home to seven major defense contractors employing over 1,800 engineers working in the fields of wireless communication, sensor networks, C4, network-centric systems, and defense products. Applicants with extensive industrial rather than university career experience will be given serious consideration and are strongly encouraged to apply. Candidates demonstrating extensive contact networks within the business and governmental sectors will be preferred. To apply for this position, please visit our Web site at www.ipfw.jobs. Applicants should submit a cover letter addressing wireless communication and DoD knowledge and experience, resume/vita, statement of research and teaching experience, and the names and contact information for at least three references. The committee will begin review of applications immediately and the search will remain open until the position is filled. For additional information regarding IPFW and the Department of Engineering please visit the Web sites at: www.engr.ipfw.edu and www.ipfw.edu. ,3): LV DQ (TXDO 2SSRUWXQLW (TXDO $FFHVV $IILUPDWLYH $FWLRQ (PSORHU…

    • 3236 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    I heard that you were installing a wireless LAN in your small business, but you were concerned about security. Well when it comes to installing a wireless LAN, there are several security threats that you should be aware of beforehand. There are four common security threats, which are drive-by hackers, war drivers, unprotected access points, and rogue access points.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Foundation Schools

    • 4532 Words
    • 15 Pages

    Scenario: Global Communications. (n.d.). Retrieved April 9, 2008 from University of Phoenix MMPBL500r3Gap Analysis Global Communications https://ecampus.phoenix.edu/secure/resource/resource.asp…

    • 4532 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    wificrack

    • 2263 Words
    • 9 Pages

    Follow the steps below… download wep password cracker software AIRCRACK. then, step 1: extract it on desktop, step 2: open up BIN folder, step 3: Now,open AIRCRACK-NG GUI step 4: step 5: step 6: step 7: That all... Any problem then coment me... Email extractor spider gold :: 2005-08-12 :: 30 EMail Extractor v3.2.1 :: 2007-09-26 :: 42 Email for NET 2.0 :: 2005-08-12 :: 36 Email Generator by Emailsmartz :: 2010-06-04 :: 22 Email hacker v3.4.6 :: 2014-03-14 :: 22 Email Manager by Emailsmartz :: 2010-06-04 :: 25 Email Marketer Business Edition v1.42 Multilingual :: 2006-09-01 :: 15 Email Marketing Director v4.1.117 :: 2007-11-24 :: 34…

    • 2263 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Wifi

    • 1363 Words
    • 6 Pages

    Wi-Fi has had a checkered security history. Its earliest encryption system, WEP, proved easy to break. Much higher quality protocols, WPA and WPA2, were added later. However, an optional feature added in 2007, called Wi-Fi Protected Setup (WPS), has a flaw that allows a remote attacker to recover the router's WPA or WPA2 password in a few hours on most implementations.[2] Some manufacturers have recommended turning off the WPS feature. The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly-certified devices resist brute-force AP PIN attacks.…

    • 1363 Words
    • 6 Pages
    Powerful Essays

Related Topics