Hacking Wireless
Hacking Wireless
Hacking Wireless
md 4/10/2019
Wireless network is a computer network that uses wireless data connectionbetween network nodes.
Terms
GSM
Access Point
Access Point (AP) or Wireless Access Point (WAP) is a hardware device that allows wireless connectivity to the
end devices.
ISM Band
Wireless Standards
Wi-FI
Wi-Fi is a local area networking technology based on the IEEE 802.11 standard.
Wi-Fi Authentication
1/7
16_Hacking_Wireless_Networks.md 4/10/2019
Open authentication
Shared Key authentication
Open Authentication
Client WAP
Client WAP
Challenge test :
The client encrypt the challenge test with his shared key
The AP decrypt the encrypted challenge test with his shared key, if the decrypted text matches, the
successful authentication response frame is sent to the client
This challenge test can be captured by a hacker as a clear text, so the hacker can get the shared key
IEEE 802.1X
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It provides an authentication
mechanism to devices wishing to attach to a LAN or WLAN.
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks
and point-to-point connections. For example, in IEEE 802.11 (Wi-Fi) the WPA and WPA2 standards have
2/7
16_Hacking_Wireless_Networks.md 4/10/2019
adopted IEEE 802.1X with one hundred EAP Types as the official authentication mechanisms.
Parties
Supplicant : a client device (such as a laptop) that wishes to attach to the LAN/WLAN
Authenticator : a network device, such as an Ethernet switch or wireless access point
Authentication server : typically a host running software supporting the RADIUS and EAP protocols
Authentication Progress
Wardriving
Wardriving is the act of searching for Wi-Fi wireless networks by a person usually in a moving vehicle, using a
laptop or smartphone.
Some types of directional antenna: Parabolic antenna , Yagi-Uda antenna , Horn antenna
Omnidirectional antennas
Omnidirectional antenna radiates equal radio power in all directions. When graphed in three dimensions this
radiation pattern is often described as doughnut-shaped.
Wireless Encryption
3/7
16_Hacking_Wireless_Networks.md 4/10/2019
WPA2
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an enchanced
data cryptographic encapsulation mechanism designed for data confidentiality
Implements AES based encryption mode
Wi-Fi Protected Setup (WPS) allows users to quickly connect to a WPA protected WLAN
WPA-Personal uses password (Pre-Shared Key(PSK)) for authentication
WPA-Enterprise includes EAP or RADIUS for centralized authentication
Wireless Threats
Access Contorl Attacks : evading access controll parameters (MAC spoofing, Rogue Access point)
Integrity Attacks : Data frame injection, replay attacks, etc...
4/7
16_Hacking_Wireless_Networks.md 4/10/2019
Hacking Methodology
Wi-Fi Discovery
GPS Mapping
Capture the packets to reveal any information (SSID, authentication method, ...)
Launch Attacks
ARP poisoning
MAC spoofing
De-Authentication
Rogue access point
MITM
5/7
16_Hacking_Wireless_Networks.md 4/10/2019
Wi-Fi Countermeasures
Change default parameters
Disable remote login to wireless devices
Wireless IPS deployment
Use strong password
Use the latest standards (WPA2 AES)
MAC filtering
Update software often
Enable firewall
Use network management software
Bluetooth
Bluetooth is a wireless technology for exchanging data over short distance
Range: typically less then 10m
Operates on the 2.4 GHz
Discovery feature can control the visibility of the device
Bluetooth Attacks
Countermeasures
6/7
16_Hacking_Wireless_Networks.md 4/10/2019
7/7