Date post: | 28-Jan-2015 |
Category: |
Technology |
Upload: | ammar-wk |
View: | 4,414 times |
Download: | 5 times |
ECHOECHOECHOECHO
I d E i C it f H k • IndonEsian Community for Hackers and Open Source •The stressing is still around the hacking stuffs. We're working on the Open Source activities• Ezines, Advisories, News, Forum, , , , ,Mailing list• Founded in 2003Has 13 staff a k a ECHO STAFF• Has 13 staff a.k.a ECHO STAFF
• Has 11116mailing lists member, and 14151 Board Discussions
bmember (Jan,22 2008)• http://echo.or.id || http://e‐rdc.org
WIWI FIFIWIWI‐‐FIFI
l kWi‐Fi, is a wireless networking technology used across the globe. Wi‐Fi refers to any system that uses the 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers g(IEEE) and released in 1997. The term Wi‐Fi, which is alternatively spelled WiFi Wi‐fi Wifi or wifi was spelled WiFi, Wi fi, Wifi, or wifi, was pushed by the Wi‐Fi Alliance, a trade group that pioneered commercialization of the commercialization of the technology.
Wi‐Fi®, Wi‐Fi Alliance®, the Wi‐Fi logo, are registered trademarks of the Wi‐Fi Alliance
802 11802 11802.11802.11
f d d f802.11 is a set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public 5 4 pspectrum bands.
Why WIWhy WI FIFIWhy WIWhy WI‐‐FIFI
i l b l f•Convenience: Flexibility of time and location
•Mobility: Access the internet even Mobility: Access the internet even outside their normal work environment
P d i i P i ll b •Productivity: Potentially be more
•Deployment: Requires little more than a single access pointt a a s g e access po t
•Expandability: Serve a suddenly‐increased number of clients
•Cost.
Keep it safe or wide open
WI WI FI SecurityFI SecurityWI WI ––FI SecurityFI SecurityOutsiders can sometimes get into your wireless networks as fast and easilyOutsiders can sometimes get into your wireless networks as fast and easily
Some Security Method• MAC ID filtering MAC ID filtering • Static IP Addressing • WEP encryption
WPA • WPA Wi‐Fi Protected Access
• WPA2 • LEAP Lightweight Extensible Authentication Protocol
• PEAP Protected Extensible Authentication Protocol• TKIP Temporal Key Integrity Protocol
• RADIUS Remote Authentication Dial In User Service
• WAPI WLAN Authentication and Privacy Infrastructure
• Smart cards, USB tokens, and software tokens
3 General Steps To Relatively Secure3 General Steps To Relatively Secure3 General Steps To Relatively Secure3 General Steps To Relatively Secure
ll d d b d1. All WI‐FI devices need to be secured
2. All Users need to be educated
3 Need to be actively monitored for weaknesses and breaches3. Need to be actively monitored for weaknesses and breaches
http://en.wikipedia.org/wiki/Wireless_security
Specific Steps to be Specific Steps to be relatively relatively SecureSecureSpecific Steps to be Specific Steps to be relatively relatively SecureSecure
S h t k bli i f (AP) h d 1. Secure your home network: enabling security of your router (AP) , change password, restrict the
2. Protect yourself when using a public hotspot:C l hConnecting to a legitimate hotspot .Use a virtual private network or VPN,Stay away from critical action (bank transaction)
3. Configure for approved connections: simply configure your device to not automatically connect
4. Disable sharing: Your Wi‐Fi enabled devices may automatically open themselves to sharing / connecting with other devices.
5. Install anti‐virus software: makes it more important to have antivirus software installed.
6. Use a personal firewall: a personal firewall program.p p p g
A set of popular things
Hardware HackingHardware HackingHardware HackingHardware Hacking
ild i id i iBuild A Tin Can Waveguide WiFiAntenna
•Using a Can, … and else• Increase the range of your gWireless network
•http://www.turnpoint.net/wireless/cantennahowto.html
•http://wikihost.org/wikis/indonesiainternet/programm/gebo.prg?name=sejarah_internet_indonesia:wajanbolic_e‐goen
War DrivingWar DrivingWar DrivingWar Driving
d i i h f hWardriving is the act of searchingfor Wi‐Fi wireless networks by aperson in a moving vehicle using aWi‐Fi‐equipped computer, such as alaptop or a PDA.
(http //en wikipedia org/wiki/Wardriving)(http://en.wikipedia.org/wiki/Wardriving)
Wardrivers are only out to log and collectinformation about the wireless access points, theyfind while driving, without using the networks'
Tools
•Net Stumblerfind while driving, without using the networksservices. • Kismet
• Kismac
• MiniStumbler/PocketWarior• MiniStumbler/PocketWarior
WarChalkingWarChalkingWarChalkingWarChalking
Warchalking is the drawing ofWarchalking is the drawing ofsymbols in public places toadvertise an open Wi‐Fi wireless
knetwork.
PiggyBackingPiggyBacking l ll lPiggyBackingPiggyBacking (using someone else's wireless Internet access)(using someone else's wireless Internet access)
i b ki d fPiggybacking is a term used to referto the illegal access of a wirelessinternet connection without explicitpermission or knowledge from theowner.
Targets :
Hotspots is a venue that offers Wi‐Fiotspots s a e ue t at o e saccess.
(Café, Restaurants, Campus,Office)
List of Abuse & tools
Another WI FI AbuseAnother WI FI AbuseAnother WI FI AbuseAnother WI FI Abuse
• DOS
• Injection• Fake Access Point• Fake Access Point• Fake CaptivePortal• EavesDropesEavesDropes
• MAC Spoofing
• Man In The Middle Attack
Top Top 5 5 WIWI FI ToolsFI ToolsTop Top 5 5 WIWI‐‐FI ToolsFI Tools
• Kismet A powerful wireless sniffer
• Net Stumbler Free Windows 802.11 Sniffer
•AirCrack h f l bl k l•AirCrack The fastest available WEP/WPA cracking tool
•AirSnort 802.11 WEP Encryption Cracking Tool
• Kismac A GUI passive wireless stumbler for Mac OS XKismac A GUI passive wireless stumbler for Mac OS X
Source: http://sectools.org/[email protected]
Maybe yes, Maybe No !
Taking fun from the Taking fun from the wifiwifi at the Cafeat the CafeTaking fun from the Taking fun from the wifiwifi at the Cafeat the Cafe
•Café with a Hotspot
• Not Free Wifi Access
•Using Some eleet RestrictionMac Restriction
Protocol Restriction (All TCP need a session auth)
•Trick It• Change your mac
• Tunnel your connection
• Not Free Wifi Access
Taking fun from the Taking fun from the wifiwifi at the at the HotelHotelTaking fun from the Taking fun from the wifiwifi at the at the HotelHotel
• Charge User using their room number
•Using Some eleet Restriction• Room Number with all
the settings through Captive Portals
h h•Change the HTTP Request
• Not Free Wifi Access
Will we see it right now in front of our eyes
DEMODEMODEMODEMO
• War Driving
• WarChalking
• WI‐FI Abuse ?
• WEP CrackingWEP Cracking
Discussion