w ireless s ecurity chapter 8. history 1971 alohonet – ethernet protocol 1997 1 st version of...
TRANSCRIPT
![Page 1: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/1.jpg)
WIRELESS SECURITY
Chapter 8
![Page 2: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/2.jpg)
![Page 3: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/3.jpg)
![Page 4: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/4.jpg)
History
• 1971 AlohoNet – Ethernet Protocol• 1997 1st version of 802.11• 1999 Wi-Fi Alliance trade association
![Page 5: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/5.jpg)
US Frequency BandsBand Frequency rangeUHF ISM 902-928 MHzS-Band 2-4 GHzS-Band ISM 2.4-2.5 GHz (The higher than cell phones - frequency allows the signal to carry
more data.).C-Band 4-8 GHzC-Band satellite downlink 3.7-4.2 GHzC-Band Radar (weather) 5.25-5.925 GHzC-Band ISM 5.725-5.875 GHzC-Band satellite uplink 5.925-6.425 GHzX-Band 8-12 GHzX-Band Radar (police/weather)8.5-10.55 GHz
![Page 6: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/6.jpg)
What do the waves look like?Wave Video
![Page 7: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/7.jpg)
Wireless Local Area Network (WLAN)
• Connecting two or more systems using wireless• 802.11 Standards • WiFi uses radio waves • Wireless cards are cheap• Irda (direct line of sight – not as many security problems)
150 Feet
![Page 8: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/8.jpg)
Access Point/Hot Spots
• An AP (access point also known as a AP) is the wireless server that connects clients to the internal network. AP’s typically act as a bridge for the clients.
Wifi Wififreespot.comwi-fiplanet.com
Boing.comGogoair.com
![Page 9: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/9.jpg)
Antennas
• Antennas come in all shapes and styles:– Omni-directional:
• Vertical Whip• Ceiling mount
– Directional:• Yagi (“Pringles can”) • Wall mounted panel• Parabolic dish
![Page 10: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/10.jpg)
HotSpots – Are they Safe?
![Page 11: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/11.jpg)
Piggybacking on someone’s else Wireless Internet
• Google the name: David M. Kauchak
![Page 12: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/12.jpg)
Bluetooth
![Page 13: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/13.jpg)
Bluetooth• proprietary open wireless technology standard for
exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices.
• WiFi – replaces cables for your network vs. Bluetooth – replaces cables for your devices
300 Feet
![Page 14: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/14.jpg)
Bluetooth
![Page 15: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/15.jpg)
Bluetooth Attacks• Bluejacking -sends a message to a phone that you don’t
know. Usually harmless. • Bluesnarking – is unauthorized access of information &
often times retrieves information.• Blue bugging – similar to bluesnarking but leaves a
backdoor and then the “hacker” can come and use the phone.
Page 376-377
![Page 16: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/16.jpg)
How to Secure Your Bluetooth
• Always Turn off your Bluetooth. • Make Your Phone Visibility to Hidden. • Set up a code when pairing devices• Set your “Auto Connection without Confirmation” to No
in all paired Devices.
![Page 17: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association](https://reader035.vdocument.in/reader035/viewer/2022062304/56649d215503460f949f64da/html5/thumbnails/17.jpg)
802.11 Security Tools
• http://sectools.org/tag/wireless/• Airsnort - http://freshmeat.net/projects/airsnort/ • Wepcrack -
http://sourceforge.net/projects/wepcrack • Netstumbler - http://www.netstumbler.com/ • Kismet - http://www.kismetwireless.net/