Wireless hacking Or Wifi Hacking


     1.       Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections between nodes e.g. Laptops, Desktops, Printers etc is implemented without the use of wires.

2   2.       The popularity in Wireless Technology is driven by two major factors: convenience and cost. A Wireless Local Area Network (WLAN) allows workers to access digital resources without being locked to their desks. Mobile users can connect to a Local Area Network (LAN) through a Wireless (Radio) connection.

    3.       Demand for wireless access to LANs is fueled by the growth of mobile computing devices, such as laptops and personal digital assistants, and by users’ desire for continuous network connections without physically having to plug into wired systems.
    4.       For the same reason that WLANs are convenient, their open broadcast infrastructure, they are extremely    vulnerable to intrusion and exploitation. Adding a wireless network to an organization’s internal LAN may     open a backdoor to the existing wired network.
    5.       The IEEE 802.11 standard refers to a family of specifications for wireless local area networks (WLANs)    developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).

    6.        This standards effort began in 1989, with the focus on deployment in large enterprise networking environments, effectively a wireless equivalent to Ethernet. The IEEE accepted the specification in 1997. Standard 802.11 specifies an over-the-air interface between a mobile device wireless client and a base station or between two mobile device wireless clients.

Wireless Standards:
• WAP (Wireless Access Point):
Wireless Access Point is the point from where the Wireless network are generated. Like the Wireless Routers or Switches.

•SSID (Service Set Identifier):
An SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other. SSID is also known as ESSID (Extended Service Set Identifier).

• BSSID (Basic Service Set Identifier):
A BSSID is the MAC Address (Media Access Control) or Physical Address of the Wireless Access Point or the Wireles Router. This is a unique 48 bit key provided by the manufacturer of the device. It can be in the form of Hexadecimal
i.e. 0-9 , A-F.

E.g. 00:A1:CB:12:54:9F

• For checking your card’s MAC Address:
Start > Run > CMD
Write “getmac” in Command Prompt.

• Beacons:
These are the Wireless Packets which are broadcasted to maintain the connectivity with the Wireless Access Point and Client systems. The Wireless Access point broadcasts beacon frames from time to time to check connectivity with the systems.

• Channel:
It is the frequency at with the Wireless Signal travels through air.

• Data Packets:
These are the packets which sent and received for the transfer of data between Wireless Access Point and Client systems. All the data communicated between two Computers travels in the form of Data Packets.

• Data Packets:
These are the packets which sent and received for the transfer of data between Wireless Access Point and Client systems. All the data communicated between two Computers travels in the form of Data Packets

SSID Solution:

Wireless equipment manufacturers use a default Service Set ID (SSID) in order to identify the network to wireless clients. All access points often broadcast the SSID in order to provide clients with a list of networks to be accessed. Unfortunately, this serves to let potential intruders identify the network they wish to attack. If the SSID is set to the default manufacturer setting it often means that the additional configuration settings (such as passwords) are at their defaults as well.

Good security policy is to disable SSID broadcasting entirely. If a network listing is a requirement for network users then changing the SSID to something other than the default, that does not identify the company or location, is a must. Be sure to change all other default settings as well to reduce the risk of a successful attack.

MAC address filtering:

Some 802.11 access point devices have the ability to restrict access to only those devices that are aware of a specific identification value, such as a MAC address. Some access point devices also allow for a table of permitted and denied MAC addresses, which would allow a device administrator to specify the exact remote devices that are authorized to make use of the wireless service. Client computers are identified by a unique MAC address of its IEEE 802.11 network card. To secure an access point using MAC address filtering, each access point must have a list of authorized client MAC address in its access control list

We can Prevent or Permit machines on the behalf of MAC Addresses

How To crack or hack wifi WEP Password

• Wired Equivalent Privacy (WEP) was the first security option for 802.11 WLANs. WEP is used to encrypt data on the WLAN and can optionally be paired with shared key authentication to authenticate WLAN clients. WEP uses an RC4 64-bit or 128-bit encryption key.

• WEP was fairly quickly found to be crack able. WEP is vulnerable because of relatively short and weak encryption. The security of the WEP algorithm can be compromised.

Just u need to have AIRCRACK 2.1  SOFTWARE

Very soon I will give you much more information very clearly step by step, this is just a sample
So please visit frequently to get updated

Countermeasures for Wireless attacks:

Hide the Wireless Network:
Do not broadcast the SSID of the Wireless Network. This will help you in protecting your
Wireless being invisible to the people who do not know about Passive War Driving

Use a Secured Key :
You can use the WEP Key protection on your Wireless Network to protect your Wireless Network Connection. Although this is not the ultimate security measure but will help you a lot against the Script
Kiddies who do not know how to break into the WEP Protection.

WPA: Wi-Fi Protected Access
•WPA employs the Temporal Key Integrity Protocol (TKIP)—which is a safer RC4 implementation—for data encryption and either WPA Personal or WPA Enterprise for authentication.

•WPA Enterprise is a more secure robust security option but relies on the creation and more complex setup of a RADIUS server. TKIP rotates the data encryption key to prevent the vulnerabilities of WEP and, consequently, cracking attacks.

Mac Filtering
An early security solution in WLAN technology used MAC address filters: A network administrator entered a list of valid MAC addresses for the systems allowed to associate with the Wireless Access Point.

Choosing the Best Key
Always use a long WPA Key with lower as well as upper case letters including numbers and special characters.

Sample Key: 12345@abcde&FGHI

==========    Hacking Don't Need Agreements     ==========
Just Remember One Thing You Don't Need To Seek Anyone's Permission To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
            Thank You for Reading My Post, I Hope It Will Be Useful For You

I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At BhanuHacks@gmail.com

Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Security Analyst, Blogger, Web Developer and a Mechanical Engineer. He Enjoys writing articles, Blogging, Debugging Errors and Capture the Flags. Enjoy Learning; There is Nothing Like Absolute Defeat - Try and try until you Succeed.

No comments:

Post a Comment