Preview

Attacking Wifi Nets with Traffic Injection

Powerful Essays
Open Document
Open Document
4750 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Attacking Wifi Nets with Traffic Injection
TERM PAPER
(5th SEMESTER-3rd YEAR)

TOPIC
ATTACKING WIFI NETS WITH TRAFFIC INJECTION

SUBMITTED TO: Mr. Gaurav Sharma

SUBMITTED BY: JAGTARSINGH SECTION-K1004 ROLL NO- A01 REG NO.11005298
ACKNOWLEDGEMENT

I Jagtar Singh student of B.Tech(CSE)-MBA Ist term expressing my deep gratitude to my OE teacher “Mr. Gaurav Sharma”. I am very much thankful to him. I benefited a lot discussing with him.
I am also thankful to my parents who encouraged me and provided such a motivation, so I became able to perform this.
I am also thankful to all my friends and those who helped me directly or indirectly in completion of my project.

CONTENTS
• Introduction
• Crime Definition
• Laws that have been violated
• Possible Punishments (IT ACT + INTERNATIONAL LAWS)
• Unlawful Losses and Gains
• Working of Attacks
• Description of Tools

INTRODUCTION

This term paper is based on “attacking wifi nets with traffic injection” also known as packet injection which simply means the hacking of wireless networks with different techniques to send extra amount of traffic (packets, frames, duplicate copies) on a network by which a hacker can able to access the information and identity that a client is using.

Some techniques are wireless network sniffing, DOS (denial of service attack), Man in the middle attack etc. Attacks on wireless LANs (WLAN’s) and wireless-enabled laptops are a quick and easy way for hackers to steal data and enter the corporate network. Many types of tools are used to perform hacking. Some of them are named as aircrack-ng, airjack etc.



References: http://www.cse.wustl.edu/~jain//cse571-07/ftp/wireless_hacking/index.html http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm#_Toc77524642 http://www.webopedia.com/TERM/C/cyber_crime.html http://www.wi-fiplanet.com/tutorials/article.php/3568066 file:///C:/Users/jsk/Desktop/Wireless%20Hackers%20101.htm

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    Drive-by hackers, which are the most serious threats of them all, are people that sit outside a company’s premises and intercept the firm’s data transmissions. They can also mount denial-of-service attacks, send malware into the network, and do other mischief. You should watch out because the software that they use is usually downloaded from the Internet. War drivers are people who drive around a city looking for working access points that are unprotected. War driving is not illegal. Only if they break in do they become drive-by hackers. Unprotected access points are access points that drive-by hackers can associate with by gaining access to the local area network without going through the site firewall. And rogue access points are unauthorized access points that are set up by a department or an individual. They often have poor security, so it makes drive-by hacking a much easier task.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Good Essays

    Wireless Intrusion Prevention Systems (WIPS): monitors a wireless network for suspicious traffic by analyzing wireless networking protocols.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Transmissions over wireless networks can be intercepted by any suitable device within the transmission radius. If a network intruder is able to attach to an unsecured AP, they can get access to the wireless network and the Internet connection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Embedding Wi-Fi into smartphones is another way for hackers to gain access to information easily. If a smartphone has Wi-Fi enabled, it means that it can connect to a number of access points or “hotspots” to access the internet, just like a PC would. Alternatively, this also means that it opens it up so that a hacker looking for information can access that smartphone though a computer with more ease than going through Bluetooth. Once a hacker has linked up to a smartphone…

    • 913 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This paper discusses the risks you face when you connect to the Internet, describes the types of attacks that can occur, and offers an overview of firewall technology, which can protect your network from hackers. Specifically, the paper discusses the implementation of a firewall and what you should consider in choosing the type of firewall you require.…

    • 2383 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Wi-Fi Security

    • 1913 Words
    • 8 Pages

    Wi-Fi is the system of wireless connecting devices, which use some radio waves that allow for the connection between the devices without expenses of the cumbersome cable or without requiring them for being facing the other. Wireless-Fidelity (Wi-Fi) network would provide the computer experts with option to remove the wired network (Wekhande, 2006). Badly secured Wi-Fi networks may be utilized for attacking the networks as well as corporations from inside, rather than about attempting to do that externally by Internet. The purpose of the report is to describe about the Wi-Fi Security. Firstly it discusses Wi-Fi (802.11) Security. Then it reviews the risks as well as the precautions prior to opening the Wi-Fi network for the others, after that it gives recommendations for closing the Wi-Fi Network to the strangers and how to be alert while sending very sensitive information over the Wi-Fi Networks.…

    • 1913 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Wifi Hacking

    • 3190 Words
    • 13 Pages

    Jeremy Martin, CISSP-ISSAP, NSA-IAM/IEM, CEH – jeremy@infosecwriter.com It is a cloudy Friday night and I am in the listening to another episode of 2600’s “Off the hook” radio when the interruption of the phone catches my attention. I had been expecting the call from my colleague, because I needed help with some new proof-ofconcept ideas for a penetration test I have the following week. During the conversation, we eagerly decided to head out for the night to Wardrive in the area. Wardriving is always a good excuse to test new programs and ideas. We position both laptops for optimal WiFi signal, easy access to the GPS devices, and secure them for the least amount of movement while driving. Right before we leave, we make sure the power converter is turned on, and the systems are plugged in. To cover all our bases, one laptop runs Windows XP Pro, NetStumbler, and Cain&Able while the second system has Suse 9.2 Linux with Kismet, Airsnort, Aircrack, and Void11. Using two devices with such different environments improves success while surveying WiFi in an area or “footprinting” them. Here is where the fun begins. After driving for a few miles, we enter a well lit street in the business section of town, and hear the ping of live access points every few seconds. Even though we have been doing this for years, we are both amazed at the percentage of companies that employ WiFi that do not implement any sort of encryption. This allows us to park and let Kismet do what it does best... passively listen to network traffic running over the 802.11 signal. We are able to map several subnets and gather other interesting information being broadcast to the public. At the end of the night, we were able to gather over 127 WiFi hotspots after only driving seventeen miles round trip. With this type of information gathered, playtime for hackers begins.…

    • 3190 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Abstract The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. An integrated security mechanism is one of the key challenges in the Open Wireless network Architecture (OWA) because of the diversity of the wireless networks in OWA and the unique security mechanism used in each one of these networks. The overall security of the network is as strong as its weakest component; integration of the overall security mechanism in OWA is of primary importance. In this paper, we comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be a part of OWA. Keywords Wireless Architecture, OWA, Security, Heterogeneous Networks I. Introduction The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further…

    • 3434 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Local Network Area

    • 15891 Words
    • 64 Pages

    L ocal area n e t w ork (L AN) communicat io ns s ecurity is address ed…

    • 15891 Words
    • 64 Pages
    Satisfactory Essays
  • Powerful Essays

    In the last I am thankful to hundreds of worker and employees for their co- operation and specially the good behavior shown by them during research work and also lot of thanks Mr. Praveen Yadav, Mr. Gajender Yadav and all HR members for their co- operation in training period.…

    • 7481 Words
    • 30 Pages
    Powerful Essays
  • Good Essays

    Question Paper

    • 2538 Words
    • 11 Pages

    3 3 An airport is converting all its manual information systems to computerised systems. (a) One stage in analysing the existing system is fact finding. State three methods of fact finding: 1 2 3 [3]…

    • 2538 Words
    • 11 Pages
    Good Essays