Thursday, 9 June 2016

Wireless Hacking

Wireless Hacking

Hello Friends, Today we are going to study "Wireless Hacking". Wireless networks are all around , from home to corporate server farms. They make our lives by avoiding physical connectivity to networks via cables while providing guaranteed consistent network connectivity of devices. It is an advantage with a certain danger attached to it . Wireless network are prone to hacking attacks. We will examine a couple of strategies to secure wireless networks to accomplish satisfactory security.


How do Wireless Network Work ?

Before we discuss wireless network security and weakness, we must understand the fundamental radio transmission and the IEEE 820.11 protocol, regularly known as the WLAN protocol. This protocol connects two or more devices within the short range, Using radio signals. to set up a wireless network, you require a wireless access point and a wireless network card for every device to be connected. The access point is also referred as a Hotspot. It consists of a radio transmitter which is used for transmitting and receiving signals, additionally it also contains hardware which converts data signals to radio signals & vice versa.

we can access a wireless network using wireless network enabled device such as a laptop, tablet, smartphones etc. within the transmission range of a wireless point. most of the device have the wireless network option enabled by default.

you can connect to any wireless network if it is not password protected. if it is password protected then you will need the password to gain access.

Wireless network Authentication 

As the wireless network network is open to every body who has a wireless network enabled gadget, most network are now configured with some kind of encryption and authentication mechanisms.

Let's take a look at some of the commonly used wireless authentication techniques.

WEP

WEP is the acronym for wired equivalent privacy. It was developed for IEEE 802.11 WLAN standards. Its objective was to provide data protection similar or equivalent to that provided by wired networks. WEP encrypts the data, When transmitted over the networks to keep it safe.

WEP Weakness

WEP has significant design flaws and vulnerabilities 

  • WEP is based on passwords which makes it vulnerable to dictionary based attacks.
  • WEP uses R encryption algorithm to create stream ciphers. The stream Cipher input is made of an initial value (iv) and a secret key. The length of the initial value (iv) is 24 bits long while the secret key can either be 40 bits or 140 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The lower possible value of the secret key makes it easy to crack it.
  • Weak initial values combination don't encrypt adequately.
  • Initial values can be reused.

WPA

WPA stands for WI-FI Procted access. It is A security Protocol developed through The WI-FI alliance in response to the weakness found in WEP. It is used to encrypt data on 802.11 WLAN's. It uses higher initial values 48 bits as an alternative to the 24 bits that WEP uses. It uses temporary Keys to encrypt packets.

WPA Weakness

  • The collision avoidance implementation can be broken.
  • It is vulnerable to DoS attacks.
  • Pre-shared keys Use passphrases. Weak passphrases are vulnerable to dictinary based attacks.
If you like my post & my Blog Please Comment and review it 
______________Thank You________________

No comments:

Post a Comment