21-04-2011, 03:17 PM
Submitted By:
Gurjeet Barar
[attachment=12569]
INTRODUCTION
• wireless networking –readily available, affordable and easy to use.
• popularity of wireless networking in private and commercial areas business.
• Interfaces with public areas.
• Some Wi-Fi operaters do not deploy any network security.
• Wired Equivalent Privacy as its default security protocol—widely recognized as being easily broken.
Unauthorised Access cases
Access to Computers :
• To deface/change information
• To obtain information
• To copy information
• To affect operation
Access to Networks :
• To obtain access
• To mask identity
Wireless Hacking
Examples of possible conduct or security failure.
exploiting the vulnerability of a wireless network to hack into the computer or computer system.
unauthorized (or in excess of authorization) access to a computer to steal information for their own purposes (data theft).
unauthorized (or in excess of authorization) access to a computer to deface information for their own purposes (malicious hackers).
Eavesdropping: monitoring the wireless transmissions.
interception of electronic communication.
intentionally disclosure of the contents of electronic communication.
Privacy Challenges
Anything connected can potentially be tracked
Who should be able to track what?
Balancing business benefits and privacy
e.g., track the product in the store, but not on the consumer
Cryptography offers new tradeoffs
WLAN Security: Why it matter?
International concerns.
Access point ≈ Wireless Hub
Difficult to trace attackers
Low cost hacking equipment
Typical insecure WLAN deployments
Lack of user/admin security awareness
Technology limitations & vulnerabilities
WLAN Security Threats
WLAN Security Threats
User hijacking & Man-in-the-middle attack
Inverse Wardriving
Sniff & Modify
Fake server
Https hack
Password stealing
“Phishing”
Advantages
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult to lay cable.
Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an access point.
Portable or semipermanent buildings can be connected using a WLAN.
Although the initial investment required for WLAN hardware can be similar to the cost of wired LAN hardware, installation expenses can be significantly lower.
Disadvantages
As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.
As standards change, it may be necessary to replace wireless cards and/or access points.
Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.
Security is more difficult to guarantee and requires configuration.
Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.
Gurjeet Barar
[attachment=12569]
INTRODUCTION
• wireless networking –readily available, affordable and easy to use.
• popularity of wireless networking in private and commercial areas business.
• Interfaces with public areas.
• Some Wi-Fi operaters do not deploy any network security.
• Wired Equivalent Privacy as its default security protocol—widely recognized as being easily broken.
Unauthorised Access cases
Access to Computers :
• To deface/change information
• To obtain information
• To copy information
• To affect operation
Access to Networks :
• To obtain access
• To mask identity
Wireless Hacking
Examples of possible conduct or security failure.
exploiting the vulnerability of a wireless network to hack into the computer or computer system.
unauthorized (or in excess of authorization) access to a computer to steal information for their own purposes (data theft).
unauthorized (or in excess of authorization) access to a computer to deface information for their own purposes (malicious hackers).
Eavesdropping: monitoring the wireless transmissions.
interception of electronic communication.
intentionally disclosure of the contents of electronic communication.
Privacy Challenges
Anything connected can potentially be tracked
Who should be able to track what?
Balancing business benefits and privacy
e.g., track the product in the store, but not on the consumer
Cryptography offers new tradeoffs
WLAN Security: Why it matter?
International concerns.
Access point ≈ Wireless Hub
Difficult to trace attackers
Low cost hacking equipment
Typical insecure WLAN deployments
Lack of user/admin security awareness
Technology limitations & vulnerabilities
WLAN Security Threats
WLAN Security Threats
User hijacking & Man-in-the-middle attack
Inverse Wardriving
Sniff & Modify
Fake server
Https hack
Password stealing
“Phishing”
Advantages
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult to lay cable.
Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an access point.
Portable or semipermanent buildings can be connected using a WLAN.
Although the initial investment required for WLAN hardware can be similar to the cost of wired LAN hardware, installation expenses can be significantly lower.
Disadvantages
As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.
As standards change, it may be necessary to replace wireless cards and/or access points.
Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.
Security is more difficult to guarantee and requires configuration.
Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.