1 / 22

Attack of the Killer Void: Managing wireless computing

Attack of the Killer Void: Managing wireless computing. This is funny…. Wireless Timeline -. EARLY DAYS Thomas Edison and other early inventors theorized on radio frequency transmissions and their capabilities.

julius
Télécharger la présentation

Attack of the Killer Void: Managing wireless computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Attack of the Killer Void:Managing wireless computing

  2. This is funny…

  3. Wireless Timeline - • EARLY DAYS • Thomas Edison and other early inventors theorized on radio frequency transmissions and their capabilities. • 1942 - Composer/pianist George Antheil and actress HedyLamarr patent a frequency-hopping radio encryption technique (later called spread-spectrum technology) and donate it to the U.S. Navy, which classifies it but finds it too UNRELIABLE for use in WWII.

  4. Timeline continued… • Other junk goes in here….blah blah blah blah • FTC opens the spectrum…blah blah blah • 1999 – 802.11# ratified making client networks a possibility.

  5. Where have we gone… • Hotspots – Starbucks started putting these in back in 2001 – now they are everywhere… • Smartphones with wifi sharing • Bluetooth headsets • Wireless keyboards and mice • Mi-Fi devices from any carrier

  6. Another funny…

  7. Attacks… • Google search – Hacking wireless – • You’ll find lots of tools: • Asleap - Cisco LEAP AttackBluecrypt - Implementation of the Bluetooth CiphersCowpatty - Attacking WPA/WPA2-PSK Exchangeseapmd5pass - Attacking EAP-MD5 networksfile2air - 802.11 packet injection utilityFreeRADIUS-WPE - Attacking PEAP and other 802.1X EAP typeswlan2eth - Converting wireless packet captures to Ethernet format Aircrack-ng – key cracking program John-the-ripper – password ripper Kismet – See local SSID Wireshark – network traffic sniffer Airpwn – I own your network adapter Ettercap – sniffer/interceptor/logger Cain and Abel – password cracking/recovery TCPDump – packet interceptor Dsniff – displays pictures being transmitted over unencrypted wireless Netstumbler – wireless network detection Ntop – network utilization tool NGREP – network packet analyzer (Network Grep) Etherape – graphical network monitor Kismac – kismet for a mac Metasploit – point and click network exploit tool FakeAP – generate a lot of fake SSID’s.

  8. All in one - • Backtrack – BT4. Hackers tools all in one handy self booting disc. • www.remote-exploit.org • Hacking Keyboards and such: Keykeriki v2

  9. Wifi Keyboard

  10. Bluetooth problems • Go do a Google search on bluetooth eavesdropping – • Spread spectrum frequency hopping (good and bad)

  11. What can a hacker find…

  12. More information

  13. Another Funny

  14. New Wireless Standards • 802.11n • Requires the use of WPA2 with AES encryption • Provides Theoretical speeds up the 600 Mbits • Actual speeds have been achieved on our system at 125 Mbits.

  15. Managing your Networks • Dsniff – captures SSIDS • Use a VPN • Use WPA2 – with AES • Patch often and use a firewall (patch routers/wifi devices too) • http://wigle.net/gps/gps//Stat – top 1000 SSIDS

  16. Wireless uses Radio Frequency • 2.4 Ghz wifi spectrum • 5 Ghz wifi spectrum

  17. Clean Spectrum

  18. Dirty Spectrum w/ Bluetooth

  19. Real Life Problems – MI-FI

  20. Solutions to help us all!!! • Use standard non-overlapping channels – 1,6,11 • Use a tool like Inssider to find your best channel option (2.4 Ghz band) • Pass the word around to neighbors if you see a problem • Keep your signal strength as low as possible to share the bandwidth

  21. And when we die…

  22. Questions: • NOC – 801-587-1300 • Helpdesk Trouble Tickets

More Related