29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

WEP key encryption<br />

The IEEE 802.11b standard defines an optional encryption scheme called Wired Equivalent Privacy (WEP), which creates a<br />

mechanism for securing wireless LAN data streams. WEP was part of the original IEEE 802.11 wireless standard. These<br />

algorithms enable RC4-based, 40-bit data encryption in an effort to prevent an intruder from accessing the network and<br />

capturing wireless LAN traffic.<br />

WEP’s goal is to provide an equivalent level of security and privacy comparable to a wired Ethernet 802.3 LAN. WEP uses a<br />

symmetric scheme where the same key and algorithm are used for both encryption and decryption of data. WEP is<br />

disabled by default on most wireless network equipment.<br />

Wireless security Overview<br />

Two methods exist for authenticating wireless LAN clients to an access point: Open system or Shared key authentication.<br />

1. Open system does not provide any security mechanisms but is simply a request to make a connection to the network.<br />

2. Shared key authentication has the wireless client hash a string of challenge text with the WEP key to authenticate to<br />

the network.<br />

Wireless Attacks<br />

Broadcast Bubble :<br />

One of the problems with wireless is that the radio waves that connect network devices do not simply stop<br />

once they reach a wall or the boundary of a business. They keep traveling into parking lots and other<br />

businesses in an expanding circle from the broadcast point, creating a ‘bubble’ of transmission radiation.<br />

This introduces the risk that unintended parties can eavesdrop on network traffic from parking areas or any<br />

other place where a laptop can be set up to intercept the signals.<br />

War Driving :<br />

War Driving is finding out the Wireless Networks present around the Wireless Card. common war driving<br />

exploits find many wireless networks with WEP disabled and using only the SSID for access control. This<br />

vulnerability makes these networks susceptible to the parking lot attack, where an attacker has the ability to<br />

gain access to the target network a safe distance from the building’s perimeter.<br />

w w w . h a c k i n g t e c h . c o . t v Page 69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!