The document outlines a presentation by two speakers on hacking and information security. It introduces the speakers and their backgrounds in cybersecurity. The presentation topics include basics of WiFi networks, wireless standards, encryption algorithms, wireless hacking methodology and common attacks. It also covers how to stay secure and defensive tools. Interactive portions engage the audience on their WiFi security concerns and ask for feedback to improve future sessions.
Presentation of TechNext; speakers are certified security experts and enthusiasts.
Overview of topics for discussion including Wifi basics, wireless standards, hacking methodologies, and security tools.
Definition of WiFi and wireless networks, highlighting components like access points and routers.
Illustration of LAN connections and the use of hotspots, focusing on broadband and access capabilities.
Comparison of WiFi standards (802.11 variants) including specifications, advantages, and disadvantages.
Introduction of WPA as a successor to WEP, improvements in encryption, and types of WPA implementation.
Concepts of breaking WPA/WPA2 security through attacks like dictionary and brute force.Sequence of security breaches detailing network analysis and attack execution.
Illustrations and explanations of 'Man In The Middle' attacks, ARP spoofing, and fake access points.
Strategies for defending against WPA/WPA2 attacks, including key complexity, placement, and regular updates.
Encouragement for audience questions and suggestions for the next meeting.
We Are…The Speakers…
SudarshanPawar
Certified Security Expert(C.S.E.)
Certified Information Security Specialist (C.I.S.S.)
Security Xplained (TechNext Speaker)
Computer Engg.
& a Security Professional
Prakashchandra Suthar
Security Enthusiast
Cisco Certified Network Associate
Red Hat Linux Certified
Security Xplained (TechNext Speaker)
Computer Engg
Security Researcher.
4.
Topics to becovered
• Basics of Wifi
• Types of wireless networks
• Wireless Standards(802.11 series)
• Encryption Algorithms
• Wireless hacking methodology
• ATTACKS(commonly encountered)
• Staying secure(Defense)
• Security Tools
We are not including stats, history, who did what/when/why-> Bcoz it’s Booooring….!!! U can
google them later….!
Wifi Basics
• WiFi(WirelessFidelity)->Wireless
networks(commonly referred as WLAN
• Developed on IEEE 802.11 standards
• Wireless networks include: Bluetooth, Infrared
communication, Radio Signal etc.
• Components used:
o Wireless Client Receiver
o Access Point
o Antennas
WiFi Standards
Points 802.11b802.11a 802.11g 802.11n
Extension to 802.11 802.11 802.11a 802.11g
Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 20 (54Mbps) 20 (54Mbps)
40 (150Mbps)
Frequency(Ghz) 2.4 5 2.4 2.4, 5
Pros Lowest cost;
signal range is
good and not
easily obstructed
fast maximum
speed; regulated
frequencies
prevent signal
interference from
other devices
fast maximum
speed; signal
range is good and
not easily
obstructed
fastest maximum
speed and best
signal range;
more resistant to
signal
interference from
outside sources
Cons slowest
maximum speed
highest cost;
shorter range
signal that is
more easily
obstructed
costs more than
802.11b;
appliances may
interfere on the
unregulated
signal frequency
standard is not
yet finalized;
16.
Are u seriouslyconcerned about wifi
security????? Be honest!
WEP(Wired Equivalence Privacy)
•The first encryption scheme made available
for Wi-Fi.
• Uses 24 bit initialization vector for cipher
stream RC4 for confidentiality
• CRC-32 bit checksum for integrity.
• Typically used by home users.
• Uses 64,128, 256 bit keys
• Flawed from the get go.
19.
WEP Working
KEY
STORE WEPKey IV
RC4
CIPHER KEYSTREAM
DATA ICV
PAD KID CIPHERTEXTIV
WEP ENCRYPTED
PACKET(MAC FRAME)
CRC 32
CHECKSUM
XOR
ALGO.
20.
WEP Weakness
1. Keymanagement and key size
2. 24 bit IV size is less.
3. The ICV algorithm is not appropriate
4. Use of RC4 algorithm is weak
5. Authentication messages can be easily forged
WPA (Wi-Fi ProtectedAccess)
• Data Encryption for WLAN based on 802.11 std.
• Improved Encryption & Authentication Method.
• Uses TKIP
– Based on WEP
– Michael algorithm
• Hardware changes not required
• Firmware update
Types
1. Personal 2. Enterprise
PSK 802.1x + RADIUS
WPA2
• Long TermSolution (802.11)
• Stronger Data protection & Network access
control
• Used CCMP
– Based on AES
• Hardware changes required
Types
1. Personal Pre Shared Key
2. Enterprise 802.1x + RADIUS
Defense against WPA/ WPA2 attacks
• Extremely Complicated keys can help
• Passphrase should not one from dictionary, so
use uncommon-senseless words.
• Key should be more than 20 chars with
combination of special chars, numbers,
alphabets. Change them at regular intervals.
1. WPA insteadof WEP
2. WPA2 Enterprise implementation
3. Place AP at secured location.
4. Centralized authentication & Update Drivers
regularly.
5. Changing default SSID after Configuring
WLAN
6. Firewall policies & Router access Password
Security Checkboxes
45.
1. MAC add.Filtering
2. Encryption at Access Point
3. Packet Filtering between AP
4. Network Strength configuration.
5. Use Ipsec’s for encryption on WLANS
6. Check out for Rogue Access Points
Security Checkboxes(contd…)
Questions?
• What youwant to ask, many already have that same question
on their mind. Be bold and lead
• OK, if you don’t want to speak and keep shut and keep
thinking about it in your mind and take those questions home,
make sure you email those to us and sleep well at night!
49.
What should beour topic for the next meet?
I hate to ask but, how can we make this better?