0% found this document useful (0 votes)
60 views

Hacking Wireless

Uploaded by

hassan.ma242
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Hacking Wireless

Uploaded by

hassan.ma242
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Hacking Wireless Networks

Department of Networks and


Communications

Thursday, April 11, 2024


Thursday, April 11, 2024 2
1

Is the Access point


in the range

Yes, the AP is in
the Range
3

Send
Authentication
Request
4
Approve or Deny
the Authentication
Request

Thursday, April 11, 2024 3


5

Since the
Authentication is
approved, then
The client send
Association
Request to Join
the AP
6

The AP approve
the Association
request and the
client is now
connected to the
AP

Thursday, April 11, 2024 3


1

The station sends


an authentication
request to the AP
2

The AP sends a
challenge text to
the station

The station
encrypts the
challenge text
using its
configured 64-bit
or 128-bit key and
sends the
encrypted text to
the AP.

Thursday, April 11, 2024 3


4

The AP uses its


configured for
example, Wired
Equivalent Privacy
(WEP) key to
decrypt the
encrypted text.
5

The AP compares
the decrypted text
with the original
challenge text. If
they match, the
AP authenticates
the station.
6

The station
connects to the
network
Thursday, April 11, 2024 3
Thursday, April 11, 2024 4
Thursday, April 11, 2024 5
Thursday, April 11, 2024 6
Thursday, April 11, 2024 7
Thursday, April 11, 2024 8
Client Mis-Association occurs when a device connects
AUTOMATICALLY to a rouge AP.
ON THE OTHER HAND
Rouge AP occurs when a user believes that the AP is
secure, and it is safe to connect to it (i.e. Free IAU Wi-Fi)

Thursday, April 11, 2024 8


Thursday, April 11, 2024 9
• Installation Errors
• Configuration
errors on an AP
APs with default
• Troubleshooting
configurations are
Errors
vulnerable to brute-force
• Security changes
dictionary attacks.
not implemented
uniformly across an
architecture.

The key
elements that
play an
important role
in this kind of
attack

Thursday, April 11, 2024 10


An attacker performs
malicious association with
the help of soft APs instead
of corporate APs.

The attacker creates a soft


AP, typically on a laptop, by
running a tool that makes the
laptop’s NIC appear an AP

Thursday, April 11, 2024 11


This type of attack succeeds when the
target wireless network uses MAC
filtering to authenticate clients (users).

Users should only be connected to an


SSID that has a specific name and MAC
address

Thursday, April 11, 2024 12


Jamming attacks
usually block all
communications
completely

Thursday, April 11, 2024 13


Long-Term Evolution

Thursday, April 11, 2024 15


Wireless Hacking Methodology

Thursday, April 11, 2024 16


Thursday, April 11, 2024 17
Thursday, April 11, 2024 18
Thursday, April 11, 2024 19
Wi-Fi Protected
Setup (WPS) is
designed to
make the process
of connecting to
a secure wireless
network from a
computer or
other device
easier

Thursday, April 11, 2024 20


Thursday, April 11, 2024 22
Thursday, April 11, 2024 23
Thursday, April 11, 2024 25
Thursday, April 11, 2024 26
Thursday, April 11, 2024 27
Thursday, April 11, 2024 28
Alfa network
• Alfa model AWUS036H is the IEEE 802.11b/g/n Long Range Wireless USB adapter.
• It provides users to launch a wireless network at 150 Mbps in the 2.4GHz band.
A long-range USB antenna:
1. Strengthen signals
2. Change management mode to
different modes such as:
A. ad-hoc mode
B. monitor mode

Thursday, April 11, 2024 30


Thursday, April 11, 2024 31
Thursday, April 11, 2024 37

You might also like