Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Objectives
2
Describe wardriving
Baby monitors
Pagers
GPS
Remote controls
Two-way radios
Wireless PDAs
Understanding Wireless
Technology
Ethernet cable
Components of a Wireless
Network
Access Points
5
Hands-On
Ethical
Hacking and
Network
Defense
After a successful logon you will see the devices main window
SSID
Wireless NICs
10
11
12
15
Other terms
Wavelength
Frequency
Cycle
Bands
16
Narrowband
Popular uses
Cordless phones
17
An Overview of Wireless
Technologies
Infrared (IR)
Methods
18
An Overview of Wireless
Technologies
(continued)
Spread Spectrum
802.11a
Created in 1999
Bands or frequencies
802.11b
Effectively only three channels (1, 6, and 11) can be used in combination
without overlapping
20
802.11e
802.11g
21
802.11i
802.15
22
802.16
802.20
Addresses wireless MANs for mobile users who are sitting in trains,
subways, or cars traveling at speeds up to 150 miles per hour
23
Bluetooth
Throughput of up to 12 Mbps
HiperLAN2
24
Understanding Authentication
25
Basic concepts
PPP verifies that users attempting to use the link are indeed who
they say they are
Certificates
Kerberos
Certificate
28
Microsoft PEAP
802.1X components
Supplicant
Authenticator
Authentication server
29
31
Rekeying mechanism
It provides fresh keys that help prevent attacks that relied on reusing old
keys
32
Understanding Wardriving
33
Warflying
How It Works
34
Laptop computer
Wireless NIC
An antenna
Antenna prices vary depending on the quality and the range they
can cover
NetStumbler
36
NetStumbler (continued)
37
SSID
Manufacturer of the AP
Encryption
Kismet
38
Kismet features
AirSnort compatible
Kismet (continued)
39
Client-server architecture
XML output
Port scanning
Enumeration
Equipment
Laptop computer
A wireless NIC
An antenna
Sniffers
AirSnort
WEPCrack
AirSnort
42
AirSnort limitations
WEPCrack
43
Honeypots
Fakeap
44
If you use WEP, consider using 104-bit encryption rather than 40bit encryption
45
Summary
46
Ethernet cables
Summary (continued)
47
DSSS, FHSS, and OFDM are the most common modulations for
wireless networks
WLANs can be attacked with many of the same tools used for
hacking wired LANS
Summary (continued)
48
Countermeasures include