17
WIRELESS SECURITY Chapter 8

W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Embed Size (px)

Citation preview

Page 1: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

WIRELESS SECURITY

Chapter 8

Page 2: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association
Page 3: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association
Page 4: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

History

• 1971 AlohoNet – Ethernet Protocol• 1997 1st version of 802.11• 1999 Wi-Fi Alliance trade association

Page 5: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

US Frequency BandsBand Frequency rangeUHF ISM 902-928 MHzS-Band 2-4 GHzS-Band ISM 2.4-2.5 GHz (The higher than cell phones - frequency allows the signal to carry

more data.).C-Band 4-8 GHzC-Band satellite downlink 3.7-4.2 GHzC-Band Radar (weather) 5.25-5.925 GHzC-Band ISM 5.725-5.875 GHzC-Band satellite uplink 5.925-6.425 GHzX-Band 8-12 GHzX-Band Radar (police/weather)8.5-10.55 GHz

Page 6: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

What do the waves look like?Wave Video

Page 7: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Wireless Local Area Network (WLAN)

• Connecting two or more systems using wireless• 802.11 Standards • WiFi uses radio waves • Wireless cards are cheap• Irda (direct line of sight – not as many security problems)

150 Feet

Page 8: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Access Point/Hot Spots

• An AP (access point also known as a AP) is the wireless server that connects clients to the internal network. AP’s typically act as a bridge for the clients.

Wifi Wififreespot.comwi-fiplanet.com

Boing.comGogoair.com

Page 9: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Antennas

• Antennas come in all shapes and styles:– Omni-directional:

• Vertical Whip• Ceiling mount

– Directional:• Yagi (“Pringles can”) • Wall mounted panel• Parabolic dish

Page 10: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

HotSpots – Are they Safe?

Page 11: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Piggybacking on someone’s else Wireless Internet

• Google the name: David M. Kauchak

Page 12: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Bluetooth

Page 13: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Bluetooth• proprietary open wireless technology standard for

exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices.

• WiFi – replaces cables for your network vs. Bluetooth – replaces cables for your devices

300 Feet

Page 14: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Bluetooth

Page 15: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

Bluetooth Attacks• Bluejacking -sends a message to a phone that you don’t

know. Usually harmless. • Bluesnarking – is unauthorized access of information &

often times retrieves information.• Blue bugging – similar to bluesnarking but leaves a

backdoor and then the “hacker” can come and use the phone.

Page 376-377

Page 16: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

How to Secure Your Bluetooth

• Always Turn off your Bluetooth. • Make Your Phone Visibility to Hidden. • Set up a code when pairing devices• Set your “Auto Connection without Confirmation” to No

in all paired Devices.

Page 17: W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol 1997 1 st version of 802.11 1999 Wi-Fi Alliance trade association

802.11 Security Tools

• http://sectools.org/tag/wireless/• Airsnort - http://freshmeat.net/projects/airsnort/ • Wepcrack -

http://sourceforge.net/projects/wepcrack • Netstumbler - http://www.netstumbler.com/ • Kismet - http://www.kismetwireless.net/