SlideShare a Scribd company logo
A summary of
wireless attacks.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Common types of wireless attacks.
– Attacks on wireless encryption.
PACE-IT.
Page 4
A summary of wireless attacks.
Page 5
By their very nature,
wireless networks tend to be
more vulnerable than wired
networks.
The best security for any network is for an attacker to not
even realize that there is a network to be hacked. Since
wireless networks rely upon transmitting data over public
radio frequencies, it is all but impossible to hide a wireless
network. The requirement to transmit data over the radio
frequency (RF) spectrum has led to the development of
various types of attacks on wireless networks.
A summary of wireless attacks.
Page 6
– War driving/war chalking.
» The practice of attempting to sniff out unprotected or
minimally protected wireless networks.
• Once found, marks are placed on buildings and streets,
indicating what networks are available and vulnerable.
» Wireless networks are vulnerable merely due to the fact
that they need to broadcast over the air.
– Rogue access point attack.
» An unauthorized wireless access point (WAP) that gets
installed on the network.
» The biggest culprits are end users; they often install their
own WAPs for convenience and don’t properly secure
them, opening a vulnerability in the network.
• Can also be implemented by a hacker.
A summary of wireless attacks.
Page 7
– Jamming attack.
» All wireless networks use radio frequency (RF) channels to
transmit data on the network. It is possible to create enough
interference on the RF channel that it is no longer usable on the
network.
• An attacker will often use jamming when performing a DoS
type of attack; however, it can also be used as a prelude to an
evil twin type of attack.
» Many of the modern networking standards and devices employ
techniques to mitigate the threat of jamming (e.g., 802.11n and
802.11ac are difficult to jam).
– Evil twin attack.
» A type of rogue access point attack.
• A WAP is installed and configured with a service set identifier
(SSID) that is very similar to the authorized version.
• As users access the twin, their keystrokes are captured in the
hope of gaining sensitive information.
» Can also be considered a type of wireless phishing attack.
A summary of wireless attacks.
Page 8
– Bluejacking attack.
» Sending unsolicited messages over a Bluetooth connection in
an effort to keep the target from responding to valid requests.
– Bluesnarfing attack.
» An attack in which the attacker creates a Bluetooth connection
with another device without that device’s permission.
• The goal is to retrieve information from the attacked device
(e.g., contact information and stored emails).
» This vulnerability has been patched and may no longer be a
concern.
– Near field communications (NFC) attack.
» An attack in which the attacker attempts to capture NFC
transmissions in order to gain access to sensitive information.
• NFC uses radio waves to transfer information between two
devices that are close together.
• It is becoming a common tool used for purchases.
» Unshielded NFC devices are subject to exploitation.
A summary of wireless attacks.
Page 9
A summary of wireless attacks.
Page 10
Unfortunately, all of the
encryption standards that
are currently deployed in
modern wireless networks
can be broken (cracked).
Some are easy to crack (e.g., WEP). Others are much more
difficult to crack (e.g., WPA2). The fact still remains that, given
enough time and computing resources, all wireless encryption
can be broken.
Hackers often use a replay attack to help in the cracking process.
In order to break the encryption, the hacker has to receive
enough wireless traffic to discover the patterns. Usually, hackers
are looking for the initialization vector (IV). To speed up the
information gathering process, an attacker will feed back (replay)
captured packets to the wireless access point (WAP).
A summary of wireless attacks.
Page 11
– Packet sniffer attack.
» Packet sniffers examine network traffic at a very basic
level and can be used to help in the administration of a
network.
• Packet sniffers may also be used by malicious users to
see what protocols and activities are allowed on a
network. This may help them in further attacking the
network.
• They can also be used to determine what type of
encryption is being used on the wireless network.
– IV attack.
» Some encryption standards use a weak IV—which, when
enough data is captured, will allow the hacker to break
the encryption.
• RC4 only uses a repeating 24-bit IV value, which is why
Wired Equivalent Privacy (WEP) encryption is easy to
crack.
A summary of wireless attacks.
Page 12
– WEP cracking/WPA cracking.
» The use of a packet sniffer to capture data that is essential to
cracking the encryption standard used.
• Wired Equivalent Privacy (WEP) can be cracked in minutes.
• WiFi Protected Access (WPA) cracking will take hours, but it
can still be cracked.
– WPS (Wi-Fi Protected Setup) attack.
» WPS was implemented to simplify the process of setting up
wireless security for homes and small businesses.
• By pushing a button and entering a PIN (personal
identification number), wireless security is automatically set
up and established for the user.
• In 2011, a vulnerability was discovered with WPS that allows
a hacker to use a brute force attack on the PIN.
» WPS is very vulnerable and, as a best practice, should be
disabled on all devices.
A summary of wireless attacks.
Page 13
A summary of wireless attacks.
The requirement to transmit data over public radio waves tends to make
wireless networks more vulnerable than wired networks. This has led to the
development of attacks for wireless networks that include: war driving/war
chalking, rogue access point attacks, jamming attacks, evil twin attacks,
bluejacking attacks, bluesnarfing attacks, and NFC attacks.
Topic
Common types of wireless
attacks.
Summary
It is possible to break all modern encryption standards that are used in the
modern wireless network. Some encryption standards are easier than
others to break. Common attacks on encryption include: replay attacks,
packet sniffer attacks, IV attacks, WEP cracking/WPA cracking, and WPS
attacks.
Attacks on wireless
encryption.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot (20)

PPTX
Intrusion detection
CAS
 
PPTX
Firewall
Nilkanth Shingala
 
PPTX
Intrusion Prevention System
Vishwanath Badiger
 
PPT
The need for security
Dhani Ahmad
 
PPTX
Firewall presentation
TayabaZahid
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPTX
Virtual LAN
Lilesh Pathe
 
PPTX
Networking devices
frestoadi
 
PPTX
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
PPTX
Security threats
Qamar Farooq
 
PPTX
An introduction to networking
Jafar Nesargi
 
PPTX
Data center
Jwala Chapagai
 
PPTX
Five Major Types of Intrusion Detection System (IDS)
david rom
 
PPTX
Network Security
Abdul Qadir Pattal
 
PPTX
Wlan security
Upasona Roy
 
PPT
Next generation firewall(ngfw)feature and benefits
Anthony Daniel
 
PPTX
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
PPTX
Basic networking in power point by suprabha
Suprabha Sahoo
 
PPT
Adhoc wireless
Ipsita Sharma
 
Intrusion detection
CAS
 
Intrusion Prevention System
Vishwanath Badiger
 
The need for security
Dhani Ahmad
 
Firewall presentation
TayabaZahid
 
Introduction to Cyber Security
Stephen Lahanas
 
Virtual LAN
Lilesh Pathe
 
Networking devices
frestoadi
 
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
Security threats
Qamar Farooq
 
An introduction to networking
Jafar Nesargi
 
Data center
Jwala Chapagai
 
Five Major Types of Intrusion Detection System (IDS)
david rom
 
Network Security
Abdul Qadir Pattal
 
Wlan security
Upasona Roy
 
Next generation firewall(ngfw)feature and benefits
Anthony Daniel
 
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Basic networking in power point by suprabha
Suprabha Sahoo
 
Adhoc wireless
Ipsita Sharma
 

Viewers also liked (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
Ad

Similar to PACE-IT, Security+3.4: Summary of Wireless Attacks (20)

PPTX
PACE-IT: Common Threats (part 2)
Pace IT at Edmonds Community College
 
DOCX
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Oscp Training
 
DOCX
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Oscp Training
 
PPTX
PACE-IT, Security+1.5: Wireless Security Considerations
Pace IT at Edmonds Community College
 
PPTX
A framework for securing wireless home networks 1
Ryan Mc Donagh
 
PDF
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
PDF
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
CARMEN ALCIVAR
 
PDF
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
PPT
chapter 7 -wireless network security.ppt
abenimelos
 
PPTX
PACE-IT: Common Network Security Issues
Pace IT at Edmonds Community College
 
DOCX
Master PEN-210 Foundational Wireless Network Attacks Today.docx
Oscp Training
 
PDF
woot15-paper-novella
Eduardo Novella
 
PDF
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
PDF
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
PPTX
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
DOCX
1Table of Contents.docx
felicidaddinwoodie
 
DOCX
Mastering Wireless Attacks (PEN-210)_ The Ultimate Guide to Secure Networks.docx
Oscp Training
 
PPTX
Network-security-ppt.pptx...............
AkilSayyad2
 
DOCX
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
DOC
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
 
PACE-IT: Common Threats (part 2)
Pace IT at Edmonds Community College
 
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Oscp Training
 
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Oscp Training
 
PACE-IT, Security+1.5: Wireless Security Considerations
Pace IT at Edmonds Community College
 
A framework for securing wireless home networks 1
Ryan Mc Donagh
 
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
CARMEN ALCIVAR
 
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
chapter 7 -wireless network security.ppt
abenimelos
 
PACE-IT: Common Network Security Issues
Pace IT at Edmonds Community College
 
Master PEN-210 Foundational Wireless Network Attacks Today.docx
Oscp Training
 
woot15-paper-novella
Eduardo Novella
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
1Table of Contents.docx
felicidaddinwoodie
 
Mastering Wireless Attacks (PEN-210)_ The Ultimate Guide to Secure Networks.docx
Oscp Training
 
Network-security-ppt.pptx...............
AkilSayyad2
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
 
Ad

More from Pace IT at Edmonds Community College (10)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.9: Goals of Security Controls
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.8: Risk Management Best Practices
Pace IT at Edmonds Community College
 

Recently uploaded (20)

PPTX
Latest Features in Odoo 18 - Odoo slides
Celine George
 
PDF
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
PPTX
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
PPTX
10CLA Term 3 Week 4 Study Techniques.pptx
mansk2
 
PPTX
national medicinal plants board mpharm.pptx
SHAHEEN SHABBIR
 
PDF
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
PDF
Exploring-the-Investigative-World-of-Science.pdf/8th class curiosity/1st chap...
Sandeep Swamy
 
PPTX
PYLORIC STENOSIS: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Presentation: Climate Citizenship Digital Education
Karl Donert
 
PPTX
Blanket Order in Odoo 17 Purchase App - Odoo Slides
Celine George
 
PDF
Ziehl-Neelsen Stain: Principle, Procedu.
PRASHANT YADAV
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
THE HUMAN INTEGUMENTARY SYSTEM#MLT#BCRAPC.pptx
Subham Panja
 
PDF
Comprehensive Guide to Writing Effective Literature Reviews for Academic Publ...
AJAYI SAMUEL
 
PPTX
Maternal and Child Tracking system & RCH portal
Ms Usha Vadhel
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
PDF
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
TechSoup
 
PPTX
HIRSCHSPRUNG'S DISEASE(MEGACOLON): NURSING MANAGMENT.pptx
PRADEEP ABOTHU
 
Latest Features in Odoo 18 - Odoo slides
Celine George
 
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
10CLA Term 3 Week 4 Study Techniques.pptx
mansk2
 
national medicinal plants board mpharm.pptx
SHAHEEN SHABBIR
 
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
Exploring-the-Investigative-World-of-Science.pdf/8th class curiosity/1st chap...
Sandeep Swamy
 
PYLORIC STENOSIS: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Presentation: Climate Citizenship Digital Education
Karl Donert
 
Blanket Order in Odoo 17 Purchase App - Odoo Slides
Celine George
 
Ziehl-Neelsen Stain: Principle, Procedu.
PRASHANT YADAV
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
THE HUMAN INTEGUMENTARY SYSTEM#MLT#BCRAPC.pptx
Subham Panja
 
Comprehensive Guide to Writing Effective Literature Reviews for Academic Publ...
AJAYI SAMUEL
 
Maternal and Child Tracking system & RCH portal
Ms Usha Vadhel
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
07.15.2025 - Managing Your Members Using a Membership Portal.pdf
TechSoup
 
HIRSCHSPRUNG'S DISEASE(MEGACOLON): NURSING MANAGMENT.pptx
PRADEEP ABOTHU
 

PACE-IT, Security+3.4: Summary of Wireless Attacks

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Common types of wireless attacks. – Attacks on wireless encryption. PACE-IT.
  • 4. Page 4 A summary of wireless attacks.
  • 5. Page 5 By their very nature, wireless networks tend to be more vulnerable than wired networks. The best security for any network is for an attacker to not even realize that there is a network to be hacked. Since wireless networks rely upon transmitting data over public radio frequencies, it is all but impossible to hide a wireless network. The requirement to transmit data over the radio frequency (RF) spectrum has led to the development of various types of attacks on wireless networks. A summary of wireless attacks.
  • 6. Page 6 – War driving/war chalking. » The practice of attempting to sniff out unprotected or minimally protected wireless networks. • Once found, marks are placed on buildings and streets, indicating what networks are available and vulnerable. » Wireless networks are vulnerable merely due to the fact that they need to broadcast over the air. – Rogue access point attack. » An unauthorized wireless access point (WAP) that gets installed on the network. » The biggest culprits are end users; they often install their own WAPs for convenience and don’t properly secure them, opening a vulnerability in the network. • Can also be implemented by a hacker. A summary of wireless attacks.
  • 7. Page 7 – Jamming attack. » All wireless networks use radio frequency (RF) channels to transmit data on the network. It is possible to create enough interference on the RF channel that it is no longer usable on the network. • An attacker will often use jamming when performing a DoS type of attack; however, it can also be used as a prelude to an evil twin type of attack. » Many of the modern networking standards and devices employ techniques to mitigate the threat of jamming (e.g., 802.11n and 802.11ac are difficult to jam). – Evil twin attack. » A type of rogue access point attack. • A WAP is installed and configured with a service set identifier (SSID) that is very similar to the authorized version. • As users access the twin, their keystrokes are captured in the hope of gaining sensitive information. » Can also be considered a type of wireless phishing attack. A summary of wireless attacks.
  • 8. Page 8 – Bluejacking attack. » Sending unsolicited messages over a Bluetooth connection in an effort to keep the target from responding to valid requests. – Bluesnarfing attack. » An attack in which the attacker creates a Bluetooth connection with another device without that device’s permission. • The goal is to retrieve information from the attacked device (e.g., contact information and stored emails). » This vulnerability has been patched and may no longer be a concern. – Near field communications (NFC) attack. » An attack in which the attacker attempts to capture NFC transmissions in order to gain access to sensitive information. • NFC uses radio waves to transfer information between two devices that are close together. • It is becoming a common tool used for purchases. » Unshielded NFC devices are subject to exploitation. A summary of wireless attacks.
  • 9. Page 9 A summary of wireless attacks.
  • 10. Page 10 Unfortunately, all of the encryption standards that are currently deployed in modern wireless networks can be broken (cracked). Some are easy to crack (e.g., WEP). Others are much more difficult to crack (e.g., WPA2). The fact still remains that, given enough time and computing resources, all wireless encryption can be broken. Hackers often use a replay attack to help in the cracking process. In order to break the encryption, the hacker has to receive enough wireless traffic to discover the patterns. Usually, hackers are looking for the initialization vector (IV). To speed up the information gathering process, an attacker will feed back (replay) captured packets to the wireless access point (WAP). A summary of wireless attacks.
  • 11. Page 11 – Packet sniffer attack. » Packet sniffers examine network traffic at a very basic level and can be used to help in the administration of a network. • Packet sniffers may also be used by malicious users to see what protocols and activities are allowed on a network. This may help them in further attacking the network. • They can also be used to determine what type of encryption is being used on the wireless network. – IV attack. » Some encryption standards use a weak IV—which, when enough data is captured, will allow the hacker to break the encryption. • RC4 only uses a repeating 24-bit IV value, which is why Wired Equivalent Privacy (WEP) encryption is easy to crack. A summary of wireless attacks.
  • 12. Page 12 – WEP cracking/WPA cracking. » The use of a packet sniffer to capture data that is essential to cracking the encryption standard used. • Wired Equivalent Privacy (WEP) can be cracked in minutes. • WiFi Protected Access (WPA) cracking will take hours, but it can still be cracked. – WPS (Wi-Fi Protected Setup) attack. » WPS was implemented to simplify the process of setting up wireless security for homes and small businesses. • By pushing a button and entering a PIN (personal identification number), wireless security is automatically set up and established for the user. • In 2011, a vulnerability was discovered with WPS that allows a hacker to use a brute force attack on the PIN. » WPS is very vulnerable and, as a best practice, should be disabled on all devices. A summary of wireless attacks.
  • 13. Page 13 A summary of wireless attacks. The requirement to transmit data over public radio waves tends to make wireless networks more vulnerable than wired networks. This has led to the development of attacks for wireless networks that include: war driving/war chalking, rogue access point attacks, jamming attacks, evil twin attacks, bluejacking attacks, bluesnarfing attacks, and NFC attacks. Topic Common types of wireless attacks. Summary It is possible to break all modern encryption standards that are used in the modern wireless network. Some encryption standards are easier than others to break. Common attacks on encryption include: replay attacks, packet sniffer attacks, IV attacks, WEP cracking/WPA cracking, and WPS attacks. Attacks on wireless encryption.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.