6
Wireless Security

Houses In businesses Local institutions WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Embed Size (px)

Citation preview

Page 1: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Wireless Security

Page 2: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Access Points

Houses

In businesses

Local institutions

Page 3: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Wireless Encryption Standards

WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

WPA – Wifi Protection Access- User Authentication via Mac Addresses-Temporary Key Integrity Protocol (TKIP)

WPA 2 – Wifi Protection Access version 2-Advanced Encryption Standard (AES)-Counter Mode with Cipher Blocking Chain Message

Authentication Code (CCMP)

Page 4: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Cracking the Encryption

Aircrack-ng

coWPatty

AirSnort

WEPCrack

Ethereal

Cain and Able

Page 5: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

The Tutorials (Tuts)

Page 6: Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)

Crackers Monitoring the Local Area Network

Attacking Through Software

Airsnare IP scanning Transfer of Malware (Malicious Software) Router Control Keylogging Mirroring Connecting via Remote Desktop

Connection Software