Module 17
Module 17
Wireless Hacking
Ansh Bhawnani
Wireless Concepts
Module 17
1. Wireless Networks
Module 17
Wireless Concepts
▰ Wireless networks are computer networks that are not connected by cables of any
kind.
▰ The basis of wireless systems are radio waves.
▰ A wireless network is a computer network that uses wireless data connections
between network nodes.
▰ Examples of wireless networks include cell phone networks, wireless local area
networks (WLANs), wireless sensor networks, satellite communication networks,
and terrestrial microwave networks
▰ Homes, telecommunications networks and business installations avoid the costly
process of introducing cables into a building.
▰ This implementation takes place at the physical level (layer) of the OSI model
network structure. 4
Wireless Concepts
5
Wireless Concepts
6
Wireless Concepts
▰ History
▻ 1973 – Ethernet 802.3
▻ 1991 – 2G cell phone network
▻ June 1997 – 802.11 "Wi-Fi" protocol first release
▻ 1999 – 803.11 VoIP integration
7
Wireless Concepts
▰ Advantages:
▻ Installation is fast and easy and eliminates wiring through walls and ceilings.
▻ Much cheaper due to less amount of physical cabling and hardware.
▻ It is easier to provide connectivity in areas where it is difficult to lay cable.
▻ Access to the network can be from anywhere within range of an access
point.
▻ Public places like airports, libraries, schools or even coffee shops offer you
constant Internet connections using Wireless LAN.
8
Wireless Concepts
▰ Disadvantages:
▻ Security is a big issue and may not meet expectations.
▻ As the number of computers on the network increases, the bandwidth
suffers.
▻ Wi-Fi enhancements can require new wireless cards and/or access points.
▻ Some electronic equipment can interfere with the Wi-Fi networks (noise).
9
2. Wireless
Terminologies
Module 17
Wireless Concepts
▰ GSM: Universal system used for mobile transportation for wireless network
worldwide.
▰ Bandwidth: Describes the amount of information that may be broadcasted over a
connection or a range within a band of frequencies
▰ BSSID: The MAC address of an access point that has set up a Basic Service Set
(BSS).
▰ ISM band: A set of frequency for the international Industrial, Scientific, and
Medical communities.
▰ Access Point: Used to connect wireless devices to a wireless network.
▰ Hotspot: Places where wireless network is available for public use.
11
Wireless Concepts
12
3. Wi-Fi Networks at
Home and Public
Places
Module 17
Wireless Concepts
▰ Wi-Fi at Home: Wi-Fi networks at home allow you to be wherever you want with
your laptop, iPad, or handheld device, and not have to make holes for or hide
Ethernet cables.
▰ Wi-Fi at Public Places: You can find free/paid Wi-Fi access available in coffee
shops, shopping malls, bookstores, offices, airport terminals, schools, hotels, and
other public places.
14
4. Wireless
Technology
Statistics
Module 17
Wireless Concepts
Module 17
Wireless Concepts
18
Wireless Concepts
▰ Wireless PAN
▻ Wireless personal area networks (WPANs) connect devices within a relatively
small area, typically within a range of 10 meters.
▻ For example, both Bluetooth radio and invisible infrared light provides a
WPAN for interconnecting a headset to a laptop.
19
Wireless Concepts
▰ Wireless LAN
▻ A wireless local area network (WLAN) links two or more devices over a short
distance using a wireless distribution method, 150 feet indoors and 300 feet
outdoors, usually providing a connection through an access point for internet
access.
▻ The use of spread-spectrum or OFDM technologies may allow users to move
around within a local coverage area, and still remain connected to the
network.
▻ Products using the IEEE 802.11 WLAN standards are marketed under the Wi-
Fi brand name
20
Wireless Concepts
▰ Wireless LAN
21
Wireless Concepts
23
Wireless Concepts
▰ Wireless MAN
▻ Wireless metropolitan area networks are a type of wireless network that
connects several wireless LANs.
▻ WiMAX is a type of Wireless MAN and is described by the IEEE 802.16
standard.
24
Wireless Concepts
▰ Wireless WAN
▻ Wireless wide area networks are wireless networks that typically cover large
areas, such as between neighboring towns and cities, or city and suburb.
These networks can be used to connect branch offices of business or as a
public Internet access system.
▻ The wireless connections between access points are usually point to point
microwave links using parabolic dishes on the 2.4 GHz and 5.8Ghz band,
rather than omnidirectional antennas used with smaller networks.
25
6. Wireless
Standards
Module 17
Wireless Concepts
27
Wireless Concepts
28
7. Service Set
Identifier (SSID)
Module 17
Wireless Concepts
30
Wireless Concepts
31
Wireless Concepts
▰ SSID is a token to identify a 802.11 (Wi-Fi) network; by default it is the part of the
frame header sent over a wireless local area network (WLAN).
▰ A service set is also known as extended service set or ESS. The identifier is known
as ESSID (for e.g., “Tech Hacker”)
▰ It acts as a single shared identifier between the access points and clients.
▰ Access points continuously broadcasts SSID, if enabled, for the client machines to
identify the presence of wireless network.
▰ SSID is a human-readable text string with a maximum length of 32 bytes.
32
Wireless Concepts
33
Wireless Concepts
▰ Basic service sets (BSS) are a subgroup of devices within a service set which are
additionally also operating with the same physical layer medium access
characteristics (i.e. radio frequency, modulation scheme, security settings etc.)
such that they are wirelessly networked.
▰ Devices within basic service sets are identified by BSSIDs (basic service set
identifiers), which are 48-bit labels that conform to MAC-48 conventions.
▰ While devices may have multiple BSSIDs, usually each BSSID is associated with at
most one basic service set at a time.[1] There are two classes of basic service
sets: access points or infrastructure, and independent stations in a peer-to-peer
ad hoc topology (an Independent Basic Service Set- or IBSS.)
34
8. Wi-Fi Encryption
Module 17
8.1. Types of
Wireless Encryption
Module 17
Wi-Fi Encryption
▰ WEP:
▻ WEP is an encryption algorithm for IEEE 802.11 wireless networks.
▻ It is an old and original wireless security standard which can be cracked
easily.
▰ WPA:
▻ It is an advanced wireless encryption protocol using TKIP, MIC, and AES
encryption.
▻ Uses a 48 bit IV, 32 bit CRC and TKIP encryption for wireless security.
▰ WPA2:
▻ WPA2 uses AES (128 bit) and CCMP for encryption. 37
Wi-Fi Encryption
▰ EAP:
▻ Supports multiple authentication methods, such as token cards, Kerberos,
certificates etc.
▰ WPA2 Enterprise:
▻ It integrates EAP standards with WPA2 encryption.
▰ TKIP:
▻ A security protocol used in WPA as a replacement for WEP.
▰ CCMP: CCMP utilizes 128-bit keys, with a 48-bit initialization vector (IV) for replay
detection.
38
Wi-Fi Encryption
▰ AES:
▻ It is a symmetric-key encryption, used in WPA2 as a replacement of TKIP.
▰ 802.11i:
▻ It is an IEEE amendment that specifies security mechanisms for 802.11
wireless networks.
▰ RADIUS:
▻ It is a centralized authentication and authorization management system.
▰ LEAP:
▻ It is a proprietary WLAN authentication protocol by Cisco.
39
8.2. WEP Encryption
Module 17
Wi-Fi Encryption
▰ WEP Encryption
▻ What is WEP:
▻ Wired Equivalent Privacy (WEP) is an IEEE 802.11 wireless protocol
which provides security algorithms for data confidentiality during
wireless transmissions.
▻ WEP uses a 24-bit initialization vector (IV) to form stream cipher RC4
for confidentiality, and the CRC-32 checksum for integrity of wireless
transmission.
41
Wi-Fi Encryption
44
Wi-Fi Encryption
▰ WEP Weaknesses
▻ Weak keys
▻ IV length is too short
▻ IV values can be reused
▻ Key Management and updating is poorly provided for
▻ Message integrity checking is ineffective
45
8.3. What is WPA?
Module 17
Wi-Fi Encryption
▰ Wi-Fi Protected Access (WPA) is a data encryption method for WLANs based on
802.11 standards.
▰ It is a snapshot of 802.11i (under development) providing stronger encryption, and
enabling PSK or EAP authentication.
▰ TKIP (Temporal Key Integrity Protocol):
▻ TKIP utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit
MIC integrity check.
▻ TKIP mitigated vulnerability by increasing the size of the IV and using mixing
functions.
47
Wi-Fi Encryption
Module 17
Wi-Fi Encryption
▰ WPA2 replaced WPA. WPA2, implements the mandatory elements of IEEE 802.11i.
In particular, it includes mandatory support for CCMP, an AES-based encryption
mode. WPA2 certification is mandatory for all new devices to bear the Wi-Fi
trademark.
▰ In order to enhance the security, WPA2 was invented with strong encryption model
(AES) and a very strong authentication model based on 802.1x (or PSK).
▰ WPA was introduced just as a staging mechanism for smooth transition to WPA2.
A lot of wireless cards did not support the new AES (at that time), but all of them
were using RC4 + TKIP. Therefore WPA was also based on that mechanism, just
with a few advancements.
50
8.5. WEP vs WPA vs
WPA2
Module 17
Wi-Fi Encryption
52
Wi-Fi Encryption
53
9. Wi-Fi
Authentication
Module 17
9.1. Wi-Fi
Authentication
Module 17
Wireless Concepts
56
Wireless Concepts
▰ Open Authentication
57
Wireless Concepts
58
Wireless Concepts
63
Wireless Concepts
64
Wireless Concepts
65
Wireless Concepts
66
9.2. Wi-Fi Protected
Setup (WPS)
Module 17
Wireless Concepts
▰ The Wifi protected setup (WPS) is a wireless network security standard that tries
to make connection between a router and wireless devices in a faster and secure
way.
▰ WPS works only for wireless networks that use a password that is protected with
the Wifi Protected Access Personal (WPA) or Wifi Protected Access2 (WPA2)
Personal security protocols.
▰ It comprises of a 8-digit PIN which acts as an optional certification which allows a
user to easily protect the network at home or small business.
68
Wireless Concepts
▰ Modes of WPS
▻ PIN method: PIN is either read from sticker or displayed on the new wireless
device. It is provided by the access point, to be entered from the new device.
▻ Push button method: At just one click/push of a button, a user can connect
multiple devices to the network, without entering the password. It requires
physical access to the access point.
▻ Near-field communication method: Clients are brought nearer to the access
point. This provides strong protection against unintended devices.
69
Wireless Concepts
▰ Advantages of WPS:
▻ No need to know SSID, passphrases or security keys
▻ Auto-configuration of SSID and WPA security
▻ Supported by various OS
▻ Security keys are random, so cannot be guessed
▻ Information can be exchanged online using Extensible Authentication
Protocol (EAP)
70
Wireless Concepts
▰ Vulnerabilities in WPS:
▻ Online brute-force attack: On PIN-based WPS. There are 7 unknown digits in
each PIN, which can make 10,000,000 combinations.
▻ Offline brute-force attack: Also called Pixie-dust. After obtaining initial value
(E-S1 and ES-2), attack is performed offline.
▻ Physical Security: Access points have PIN printed on them. If its not kept in a
secure area, it is likely to be misused.
▻ Reaver tool: Implements a brute force attack against WPS PINs to recover
WPA/WPA2 passphrases. I can recover target APs plaintext WPA/WPA2
passphrase in 4-10 hours.
71
10. How to break
Encryptions?
Module 17
Wi-Fi Encryption
73
Wireless Threats
Module 17
1. Access Control
Attacks
Module 17
Wireless Threats
76
Wireless Threats
77
Wireless Threats
78
Wireless Threats
79
2. Integrity Attacks
Module 17
Wireless Threats
▰ Suppose that legitimate client called victim (Step 1) is writing an e-mail to the
friend asking for money of 1000$ and putting bank account number in the e-mail.
▰ Assuming the information is not well encrypted (or attacker broke the encryption
and have the chance of reading everything in clear text), wireless attacker (Step 2)
reads the whole packet flowing in the air to the AP. The attacker modifies a
message by swapping the bank account number to its own and re-inject a
message back to the air, to go to the internet via the AP.
▰ In that situation, if there are no integrity checks that would detect a change in the
content of the message - the recipient would get a message with a modified bank
account number.
81
Wireless Threats
82
3. Confidentiality
Attacks
Module 17
Wireless Threats
▰ No Encryption/ WEP Encryption − These are not very secure approaches and
should not be used under any circumstances.
▰ TKIP Encryption − This encryption model is used in WPA deployments. It has not
yet been cracked, but TKIP is not considered as strong mean of encryption, due to
the use of weaker RC4 algorithm.
▰ CCMP Encryption − This is used with WPA2. So far, it is considered the safest
encryption model that is based on not-breakable (at least for today) AES
algorithm.
84
4. Availability
Attacks
Module 17
Wireless Threats
▰ Layer 1 DOS:
▻ A radio card is configured to send out a constant RF signal (much like a
narrow-band signal generator). While, other valid wireless clients never get a
chance of accessing the medium, because whenever they perform a clear
channel assessment (short process of checking the "air" before sending any
traffic over the wireless), the wireless medium is occupied by this constant
transmitter.
▻ Similar to the de-authentication attacks with aireplay-ng.
86
Wireless Threats
▰ Layer 2 DOS:
▻ The most common types of Layer 2 DoS attacks involve spoofing of
disassociation or de-authentication management frames. The reason, why it
is so efficient is that, those frames are NOT the request frames but
notifications!
▻ Because authentication process is a pre-requisite for association a de-
authentication frame will automatically disassociate the client as well.
▻ Mitigation is to use an 802.11w-2009 Standard Management Frame
Protection (MFP). Requires that management frames are also signed by a
trusted AP, and else, they should be neglected.
87
Wireless Threats
▰ Layer 3 DOS:
▻ Fraggle Attack: Attacker sends a large amount of UDP echo requests to IP
broadcast address.
▻ Ping Flood Attack: Attacker sends a large number of ICMP packet to the
target computer using ping.
▻ Smurf Attack: Exactly the same step by step operation, as in case of Fraggle
Attack. The only difference is that, Smurf attack uses ICMP echo request
packets.
88
5. Authentication
Attacks
Module 17
Wireless Threats
▰ By sniffing the 4-way handshake between the client and the authenticator (AP),
one may perform a brute-force to break the encryption and derive the PSK value.
▰ LEAP (Lightweight Extensible Authentication Protocol) generates dynamic WEP
keys. In this setup, the password hashes were flowing over-the-air hashed with
MS-CHAP or MS-CHAPv2 algorithms. Attack that may be applied to LEAP would
consist of the following steps −
▻ The username is sent in a clear text.
▻ There is a challenge text in clear text.
▻ The response text is hashed.
▻ Office dictionary attack, inside "function(password,challenge) = response"
90
mathematical formula
6. Rogue Access
Point Attacks
Module 17
Wireless Threats
▰ If the network resources are exposed by a rogue access point, the following risks
may be identified −
▻ Data Theft − Corporate data may be compromised.
▻ Data Destruction − Databases may be erased.
▻ Loss of Services − Network services can be disabled.
▻ Malicious Data Insertion − An attacker may use a portal to upload viruses,
key loggers or pornography.
▻ 3rd Party Attacks − A company's wired network may be used as a launching
pad for 3rd party attacks against other networks across the internet.
92
7. Client
Misassociation
Module 17
Wireless Threats
▰ Your laptop remembers the list of WLANs that you were connected to in the past,
and stores this list in the so-called Preferred Network List.
▰ A malicious hacker may bring its own wireless AP to the physical area, where you
are normally using your Wi-Fi. If the signal from that AP, would be better than the
one from original AP, the laptop software will mis-associate to the fake (rogue)
access point provided by the hacker (thinking it is the legitimate AP, you have
used in the past).
▰ These kind of attacks are sometimes referred to as Honeypot AP Attacks.
94
Wireless Threats
95
8. Misconfigured
Access Point Attack
Module 17
Wireless Threats
97
Wireless Threats
98
Wireless Hacking
Methodology
Module 17
1. Wi-Fi Discovery
Module 17
Wireless Threats
▰ Wardriving
▻ Wardriving is the process of finding a Wireless Network (wireless network
discovery) by a person in a car using their personal laptop, smartphone or
other wireless client tools.
▻ Basically, the intention is to find some free-access wireless network, that
malicious user can use without any legal obligations. Examples might be
some market, that offer free Wi-Fi, without registration or some hotel that
you can just register with fake data.
▻ The method of finding those WLAN's are exactly the same as described
above in this wireless discovery section.
102
2. GPS Mapping
Module 17
Wireless Threats
▰ There is a number of satellites that send a low-power radio signal towards the
piece of earth it covers. The GPS device that you use, for example a smartphone
with google maps, receives that signal from multiple satellites at the same time.
The device itself combines those signals together and calculate current
geographical location on earth.
▰ The idea of GPS mapping is to map a wireless network that the user encounters
on the global map of wireless network in reference to its geographical location.
One may use the already mentioned Kismet tool to map its wireless network to the
geographical location, and then put its coordinates on the google earth map.
▰ There is website on the internet http://wigle.net that you can use to see how many
WLAN's are GPS mapped. You can use this website to map GSM cellular network
as well. 104
Wireless Threats
105
3. Wireless Traffic
Analysis
Module 17
Wireless Threats
▰ The type of data, that is valuable to collect are BSSID, WEP IV, TKIP IV, CCMP IV,
EAP 4-way handshake exchange, wireless beacon frames, MAC addresses of
communicating parties, etc.
▰ Usage of Wireshark in both Windows and Linux are very intuitive - both
environments provide a GUI that looks the same for both systems.
▰ When the program starts, you only need to indicate the physical interface, that
would be used for traffic sniffing (you can select any interface, either wired one or
wireless one), and then proceed with traffic sniffing.
107
Wireless Threats
▰ Filter Field − Wireshark is equipped with a very good filtering tool that allows
limiting the real-time traffic output. It is extremely useful, when you need to
extract particular flows out of hundreds of packs coming every second from all
the wireless clients.
▰ Traffic Output − In this section, you can see all the packets showing up, that were
sniffed on the wireless interface, one by one.
▰ Decoded Parameters of the Data − This section lists all the fields existing in a
frame (all the headers + data). We can see, that some set of information is in the
form of unreadable data (encrypted), and in 802.11 header you can find CCMP
information (AES encrypted), so it must be WPA2 Wi-Fi network.
. 108
Wireless Threats
▰ Hex Dump − The Hex Dump is exactly the same information you have above in
"decoded parameters of the data" but in a hexadecimal format. The reason for
that is that, hexadecimal representation is the original way the packet looks like,
but Wireshark has thousands of "traffic templates", which are used to map
specific HEX values to a known protocol field. For example, in a 802.11 header the
bytes from 5 to 11 are always the source of a MAC address of the wireless frame,
using the same pattern mapping, Wireshark (and other sniffers) can re-construct
and decode static (and well known) protocol fields.
109
4. Launch Wireless
Attacks
Module 17
Wireless Threats
▰ Passive Attacks
▻ Breaking WEP Encryption: Behind the scenes to break a WEP encryption, one
has to sniff a large volume of data packets. The next step is to get the same
IV vector inside the wireless frames, and the last step is to break the WEP
encryption model offline.
▻ Breaking WPA/WPA2 Encryption: One needs to sniff EAP 4-way handshake
between a wireless client and the AP. Afterwards, an offline dictionary (or
offline brute-force attack) is conducted on the collected encrypted packets.
Sometimes, you need to inject wireless de-authentication frames, forcing the
wireless victim to de-authenticate and then re-authenticate again, thus
sniffing the new authentication 4-way handshake.
111
Wireless Threats
112
Wireless Threats
▰ Active Attacks
▻ Injection of Wireless Traffic − A classic example of Layer 2 DoS, used by
flooding of de-authentication frames.
▻ Jamming Attacks − As you remember, this is a type of Layer 1 DoS attack.
Jamming devices are used to create interferences with a valid RF of Wi-Fi
network, thus leading to WLAN service degradation.
▻ Man-in-the-Middle Attack − The attacker is equipped with two wireless
network cards and may use one of them to connect to the original AP as the
client; and use the second wireless card to broadcast some fake SSID using
software emulating AP. Client associates to "fake AP" and all the client traffic
going to the internet is directly forwarded through attacker.
113
Wireless Threats
▰ Active Attacks
▻ Injection of Wireless Traffic − A classic example of Layer 2 DoS, used by
flooding of de-authentication frames.
▻ Jamming Attacks − As you remember, this is a type of Layer 1 DoS attack.
Jamming devices are used to create interferences with a valid RF of Wi-Fi
network, thus leading to WLAN service degradation.
▻ Man-in-the-Middle Attack − The attacker is equipped with two wireless
network cards and may use one of them to connect to the original AP as the
client; and use the second wireless card to broadcast some fake SSID using
software emulating AP. Client associates to "fake AP" and all the client traffic
going to the internet is directly forwarded through attacker.
114
Setting up your Lab
Module 17
Wireless Threats
▰ Antennas
▻ Antennas are used to "translate" information flowing as an electrical signal
inside the cable and into the electromagnetic field, which is used to transmit
the frame over a wireless medium.
▻ Every wireless device (either AP or any type of wireless client device) has an
antenna that includes a transmitter and the receiver module.
▻ One of the biggest advantages of external antennas (comparing to most of
the internal antennas you might meet built-in to the equipment), is that they
can be configured in a so-called "monitor mode”
▻ These antennas on the client side are usually embedded in wireless adapters,
both internal or external ones. 116
Wireless Threats
117
Wireless Threats
▰ Monitor Mode
▻ Monitor mode, or RFMON (Radio Frequency MONitor) mode, allows a
computer with a wireless network interface controller (WNIC) to monitor all
traffic received on a wireless channel.
▻ Unlike promiscuous mode, which is also used for packet sniffing, monitor
mode allows packets to be captured without having to associate with an
access point or ad hoc network first.
▻ Monitor mode only applies to wireless networks, while promiscuous mode can
be used on both wired and wireless networks.
▻ Not all wireless cards support RFMON mode.
119
Wireless Threats
120
Wireless Threats
▰ Packet Injection
▻ Packet injection means sending data while in Monitor mode because it's a
passive-only mode.
▻ Sending and receiving management and control frames is necessary for
impersonating base stations and clients, and for listening to frames that are
meant for specific adapters.
▻ The dreadful deauthentication frame, is used to capture the WPA 4-way
handshake or to force a user into a malicious AP, or to recover a hidden SSID,
etc.
▻ Most of the adapters lack support of RFMON and Packet Injection for security
and cost efficiency. 121
Wireless Threats
▰ Soft AP
▻ SoftAP is an abbreviated term for "software enabled access point".
▻ This is software enabling a computer which hasn't been specifically made to
be a router into a wireless access point. It is often used interchangeably with
the term "virtual router".
▻ Microsoft added a feature called "Virtual Wi-Fi" to Windows 7 and later
operating systems, which enabled a Wi-Fi card to act as both a Wi-Fi client
and a wireless access point simultaneously.
▻ The "virtual" Wi-Fi feature allows desktop computers to create a wireless
hotspot that other wireless devices in the vicinity can use.
122
Wireless Threats
124
Wireless Threats
▰ Wireless Standards
▻ IEEE 802.11bgn = 2.4GHz only
▻ IEEE 802.11gn = 2.4GHz only
▻ IEEE 802.11agn = 2.4GHz + 5GHz
▻ IEEE 802.11ac = 2.4GHz + 5GHz
▻ IEEE 802.11abgn = 2.4GHz + 5GHz
125
Wireless Threats
Module 17
1. How to detect and
block Rogue AP?
Module 17
Wireless Threats
▰ If the unauthorized access point is found not connected to the secure network, it is
an external access point.
▰ Most computers will automatically join any network with the same name of a
network they've joined before. You should go into your computer's Wi-Fi settings
and delete any networks you no longer wish to connect to.
▰ If you don't want your computer's connection to be taken over by a random network
you forgot you connected to weeks ago, make sure to delete these and test to
make sure your computer doesn't connect to networks with the same name.
▰ Make sure to use a VPN whenever possible to ensure that even if your connection
is intercepted, it won't be as easy as injecting content into webpages to steal your
credentials.
132
2. How to Defend
Against Wireless
Attacks?
Module 17
Wireless Threats
▰ Always Be Suspicious
▻ If someone presents a story where the solution is to hand over your Wi-Fi
credentials, try to present an alternative solution, like "I can look that up for
you," and see if they pivot to stay focused on the password.
▰ Better Passwords
▻ Using password managers like LastPass and KeePassX can make it easier to
use unique passwords, but you should avoid passwords like phone numbers,
addresses, and not at all related to any other information you’ve made public.
134
Wireless Threats
▰ Static IP addressing
▻ Typical wireless access points provide IP addresses to clients via
DHCP. Requiring clients to set their own addresses provides little
protection against a sophisticated attacker.
▰ SSID hiding
▻ A simple but ineffective method to attempt to secure a wireless
network is to hide the SSID. This provides very little protection
against anything but the most casual intrusion efforts.
▰ MAC ID filtering
▻ One of the simplest techniques is to only allow access from
135
known, pre-approved MAC addresses.
Wireless Threats
▰ Least Privilege
▻ Only give out your password on a need-to-know basis.
▻ If someone has a burning desire to get the Wi-Fi password, ask yourself why,
and treat it as seriously as giving out a PIN for a bank account. If you don't
have the time to secure your network above and beyond what the average
person does, don't risk letting anyone in that you don't trust.
136
Wireless Threats
138
Wireless Threats
139
HACKING
Is an art, practised through a creative mind.
140