SlideShare uma empresa Scribd logo
1 de 24
Assessing Wireless
Radio and Bluetooth
CNG 256 Vulnerability Assessment
Frank H. Vianzon, GPEN, GCWN, GISP, CompTIA A+, CompTIA Network+
Wi-Fi: Overview
 Standard is IEEE 802.11
 Exists in everything these days, from laptops to smartphones to IoT devices
Four Environments
Four environments built around the technology
1. Extensions to an existing wired network
2. Multiple Access Points
3. LAN-to-LAN wireless network
4. 3G or 4G hot spots
Wireless Standards
Wireless Vocabulary
Term Description
Association The process of connecting a client to an access point
BSSID – Basic
Service Set
Identification
The MAC address of an access point
SSID / ESSID –
Extended Service
Set Identification
The (broadcast) name of a network
Hot Spot A location that provides wireless access to the public
Access Point /
Wireless Access
Point (WAP)
A hardware or software construct that provides wireless access
Service Set Identifier (SSID)
 SSID is a continual broadcast by the access point
 SSID is embedded within the header of the packets
 SSID is the name of a network. Also called an ESSID
(Extended SSID)
 You can try to mask a ESSID
 BSSID’s identify access points and their clients
 Is the MAC address
 MUST be transmitted
BSSID
This identifier is called a basic
service set identifier (BSSID)
and is included in all wireless
packets.
Each Access Point has its Own
BSS
Wireless Antennas : Laptops
 On a standard laptop, the antenna is typically around the screen
 Can be extended via USB
 When extending, make sure to match cables and Ohms
Wireless Antenna : Yagi Antenna
 Unidirectional
 Site to site or directional
Wireless Antennas : Omnidirectional and
Parabolic Grid
 Omnidirectional – all directions
 Two dimensions but not three
 Sometimes magnetic for cars and war driving
Wireless Authentication Modes
 Open
 only requires a MAC address
 Shared Key
 All AP’s and clients use the same authentication key
 Hashing methods used to protect the key can be easily broken
 802.1X
 Authentication uses usernames and passwords, certificates or devices such as smart
cards. Requires one or both of these
 RADIUS server to centralize user accounts and authentication information
 A PKI for issuing certificates
Wireless Encryption
 WEP – Wireless Equivalent Privacy
 Oldest and weakest
 Initial solution
 WPA – Wi-Fi Protected Access
 Uses Temporal Key Integrity Protocol (TKIP)
 TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy
WLAN equipment to upgrade to TKIP without replacing hardware.
 Uses Message Integrity Code (MIC)
 WPA2
 Uses AES
 Requires hardware
WEP Encryption:
 Introduced with the 802.11b standard
 11MBs, 2.4 GHz, RC4
 Design Parameters
 Defeat Eavesdropping on communications
 Check integrity of data
 Use Shared Secret
 Problems with WEP
 Designed w/o input from the academic community or the public, professional
cryptologist were never consulted
 Passively uncover the key
Breaking WEP
 Need to intercept as many IV’s (Initialization Vectors) as possible
1. Start the wireless interface in monitor mode
2. Fake authentication with the access point
3. ARP requests can be intercepted and reinjected
4. Run password cracking tool
Comcast Split Wireless
Attack Surface
Attacks and Vulnerabilities
 Attacks in transit
 WEP
 WPA
 WPA2
 Attacks on endpoints
 Laptops
 WAP – Wireless Access Points
 Rouge access points
Access Points
Wireless access points transmits its SSID and BSSID
to anyone in range
Using monitor mode, we can see the BSSID and
then use a brute force utility to find the password
Access Points
Monitor Mode vs Managed Mode
Managed Mode is the mode you are mostly in to connect to
wireless networks
Monitor mode makes your wireless card passive. It is simply
listening in on every channel
Finding the MAC address
For Windows, you can use the inSSIDer tool
For Linux, you can use place the card in monitor mode and
use the airodump NG tool
Access Points
Testing Points
If you systems are using certificates or other PKI
authentication, try to join the network.
Egress Rules
Once you join, can you nmap the network?
User Laptops
 User laptops will continuously broadcast for saved networks
 We can attack the user MAC or answer the broadcast with a WiFi Pineapple
Bluetooth
 Bluetooth devices are prominent these days. Bluetooth is found on laptops and
mobile devices
 Operates on the 2.4 GHz range
 Four different versions
Bluetooth Modes
 Discoverable
 Allows the device to be scanned and located by other Bluetooth devices
 Limited Discoverable
 Mode is becoming more common. This put it into discovery mode for a short period of
time
 Non-discoverable
 As the name suggests, it cannot be located
 Pairing
 We have to pair devices in a peer to peer type connection
Bluetooth Threats
 What type of information do you exchange with Bluetooth?
 Calendars and Address Books
 Photos, cameras, microphones
 Attacker can inject microphone

Mais conteúdo relacionado

Mais procurados

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
Nitin kumar Gupta
 

Mais procurados (20)

Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
Wifi security
Wifi securityWifi security
Wifi security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 

Semelhante a CNG 256 wireless wi-fi and bluetooth

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
Agreeta Sharma
 

Semelhante a CNG 256 wireless wi-fi and bluetooth (20)

Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 

Mais de Frank Victory

Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
Frank Victory
 

Mais de Frank Victory (12)

Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
 
Kealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsKealy OWASP interactive_artifacts
Kealy OWASP interactive_artifacts
 
Automation and open source turning the tide on the attackers
Automation and open source   turning the tide on the attackersAutomation and open source   turning the tide on the attackers
Automation and open source turning the tide on the attackers
 
CNG 256 cloud computing
CNG 256 cloud computingCNG 256 cloud computing
CNG 256 cloud computing
 
Differential learning SnowFROC 2017
Differential learning SnowFROC 2017Differential learning SnowFROC 2017
Differential learning SnowFROC 2017
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
 
Active defensecombo clean
Active defensecombo cleanActive defensecombo clean
Active defensecombo clean
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policies
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

CNG 256 wireless wi-fi and bluetooth

  • 1. Assessing Wireless Radio and Bluetooth CNG 256 Vulnerability Assessment Frank H. Vianzon, GPEN, GCWN, GISP, CompTIA A+, CompTIA Network+
  • 2. Wi-Fi: Overview  Standard is IEEE 802.11  Exists in everything these days, from laptops to smartphones to IoT devices
  • 3. Four Environments Four environments built around the technology 1. Extensions to an existing wired network 2. Multiple Access Points 3. LAN-to-LAN wireless network 4. 3G or 4G hot spots
  • 5. Wireless Vocabulary Term Description Association The process of connecting a client to an access point BSSID – Basic Service Set Identification The MAC address of an access point SSID / ESSID – Extended Service Set Identification The (broadcast) name of a network Hot Spot A location that provides wireless access to the public Access Point / Wireless Access Point (WAP) A hardware or software construct that provides wireless access
  • 6. Service Set Identifier (SSID)  SSID is a continual broadcast by the access point  SSID is embedded within the header of the packets  SSID is the name of a network. Also called an ESSID (Extended SSID)  You can try to mask a ESSID  BSSID’s identify access points and their clients  Is the MAC address  MUST be transmitted
  • 7. BSSID This identifier is called a basic service set identifier (BSSID) and is included in all wireless packets. Each Access Point has its Own BSS
  • 8. Wireless Antennas : Laptops  On a standard laptop, the antenna is typically around the screen  Can be extended via USB  When extending, make sure to match cables and Ohms
  • 9. Wireless Antenna : Yagi Antenna  Unidirectional  Site to site or directional
  • 10. Wireless Antennas : Omnidirectional and Parabolic Grid  Omnidirectional – all directions  Two dimensions but not three  Sometimes magnetic for cars and war driving
  • 11. Wireless Authentication Modes  Open  only requires a MAC address  Shared Key  All AP’s and clients use the same authentication key  Hashing methods used to protect the key can be easily broken  802.1X  Authentication uses usernames and passwords, certificates or devices such as smart cards. Requires one or both of these  RADIUS server to centralize user accounts and authentication information  A PKI for issuing certificates
  • 12. Wireless Encryption  WEP – Wireless Equivalent Privacy  Oldest and weakest  Initial solution  WPA – Wi-Fi Protected Access  Uses Temporal Key Integrity Protocol (TKIP)  TKIP is a suite of algorithms that works as a "wrapper" to WEP, which allows users of legacy WLAN equipment to upgrade to TKIP without replacing hardware.  Uses Message Integrity Code (MIC)  WPA2  Uses AES  Requires hardware
  • 13. WEP Encryption:  Introduced with the 802.11b standard  11MBs, 2.4 GHz, RC4  Design Parameters  Defeat Eavesdropping on communications  Check integrity of data  Use Shared Secret  Problems with WEP  Designed w/o input from the academic community or the public, professional cryptologist were never consulted  Passively uncover the key
  • 14. Breaking WEP  Need to intercept as many IV’s (Initialization Vectors) as possible 1. Start the wireless interface in monitor mode 2. Fake authentication with the access point 3. ARP requests can be intercepted and reinjected 4. Run password cracking tool
  • 17. Attacks and Vulnerabilities  Attacks in transit  WEP  WPA  WPA2  Attacks on endpoints  Laptops  WAP – Wireless Access Points  Rouge access points
  • 18. Access Points Wireless access points transmits its SSID and BSSID to anyone in range Using monitor mode, we can see the BSSID and then use a brute force utility to find the password
  • 19. Access Points Monitor Mode vs Managed Mode Managed Mode is the mode you are mostly in to connect to wireless networks Monitor mode makes your wireless card passive. It is simply listening in on every channel Finding the MAC address For Windows, you can use the inSSIDer tool For Linux, you can use place the card in monitor mode and use the airodump NG tool
  • 20. Access Points Testing Points If you systems are using certificates or other PKI authentication, try to join the network. Egress Rules Once you join, can you nmap the network?
  • 21. User Laptops  User laptops will continuously broadcast for saved networks  We can attack the user MAC or answer the broadcast with a WiFi Pineapple
  • 22. Bluetooth  Bluetooth devices are prominent these days. Bluetooth is found on laptops and mobile devices  Operates on the 2.4 GHz range  Four different versions
  • 23. Bluetooth Modes  Discoverable  Allows the device to be scanned and located by other Bluetooth devices  Limited Discoverable  Mode is becoming more common. This put it into discovery mode for a short period of time  Non-discoverable  As the name suggests, it cannot be located  Pairing  We have to pair devices in a peer to peer type connection
  • 24. Bluetooth Threats  What type of information do you exchange with Bluetooth?  Calendars and Address Books  Photos, cameras, microphones  Attacker can inject microphone

Notas do Editor

  1. IoT devices: Nest Thermostat, Ring Doorbell, Refrigerators, Garage Doors
  2. https://www.juniper.net/documentation/en_US/junos-space-apps/network-director2.0/topics/concept/wireless-ssid-bssid-essid.html
  3. Standard laptops – works great for users Older laptops may have door on bottom. Newer laptops are typically intergrated
  4. Shared Key is the most common
  5. Lab – find the rouge access point
  6. Lab on placing in monitor mode Once you have the MAC address, you can launch deauth attacks. This is a form of DoS attack Bully to force the network connection
  7. Some of the PKI structures will let you join but not let you do anything Stop client to client access?