Ethical Hacking Wireless Hacking - Ethical Hacking

What is Wireless network?

When two or more devices are connected to each other through radio waves within a limited range is called as wireless network. The devices in the wireless network must share data with other devices of the network and be in connection with the network but can be moved from one place to another but within the range. One of the most crucial point that they are so spread is that their installation cost is very cheap and fast than the wire networks.

Wireless networks use IEEE 802.11 . In a wireless network a device connects the user with the Internet, known as wireless router.

Wireless Router

In a wireless network, the extensions of the wireless ranges behave as logical switches which are known as Access Points.

Access Point

How Wireless networks are hacked?

Even wireless networks are not left without security problems, in spite facilitating greater flexibility. A hacker without being in the same building can sniff the network packets. The radio waves can be easily sniffed by the hacker from a nearby location.

A wireless network is hacked by identifying the SSID by using network sniffing. Wireless cards when converted to Sniffing modes are called monitor mode.

What are the different tools used for wireless hacking?

Some of the powerful tools used for wireless hacking are:

Kismet

Kismet is a powerful tool for wireless sniffing that is found in Kali distribution. The official link to download the tool is https://www.kismetwireless.net/index.shtml.

Open a terminal and type kismet. Start the Kismet Server and click Yes, as shown in the following screenshot.

Kismet

As shown here, click the Start button.

Start Button

Now, Kismet will start to capture data. The following screenshot shows how it would appear −

Capture Data

NetStumbler

NetStumbler is another tool for wireless hacking that is primarily meant for Windows systems. The link to download the tool is http://www.stumbler.net/

It is quite easy to use NetStumbler. Click the Scanning button and wait for the result, as shown in the following screenshot.

Scanning

It displays a screenshot as follows −

Network Stumbler

A point to be noted here is that the card should support monitoring mode, or else monitoring fails.

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security protocol to keep the wireless networks securely. It utilizes the encryption of the data link layer which facilitates the unauthorized access to the network.

The key is used to encrypt the packets before transmission begins. An integrity check mechanism checks that the packets are not altered after transmission.

As WEP is not entirely protected against security problems, the following issues arise:

  • CRC32 is not sufficient to ensure complete cryptographic integrity of a packet.
  • It is vulnerable to dictionary attacks.
  • WEP is vulnerable to Denial of Services attacks too.

WEPcrack

WEPcrack is a popular tool to crack WEP passwords. The link to download the tool is https://sourceforge.net/projects/wepcrack/.

WEP Crack

Aircrack-ng

Aircrak-ng is another popular tool for cracking WEP passwords. It can be found in the Kali distribution of Linux.

By the below screenshot it is observed that a wireless network is sniffed and the packets are collected and a file RHAWEP-01.cap is created. It is run with aircrack-ng to decrypt the cipher.

Air Crack

Wireless DoS Attacks

In a wireless environment, a network can be attacked from a distance making it difficult to collect the evidence against the attacker.

The first type of DoS is Physical Attack. This is the basic type of attack and is in the base of radio interfaces, which can also be created from cordless phones operating in 2.4 GHz range.

Another type is Network DoS Attack. As a shared medium is created by the Wireless Access Point creates, it offers the possibility to flood the traffic of this medium toward the AP thus allowing its processing slow for the clients trying to connect. These attacks are created just by a ping flood DoS attack.

Pyloris is a popular DoS tool a the link to download the tool is https://sourceforge.net/projects/pyloris/

Low Orbit Ion Cannon (LOIC) is another popular tool for DoS attacks.

DoS Attacks

Quick Tips

Some of the tips to make a wireless network more secure are:

  • Regularly change the password of the SSID and the network
  • Change the access point default password.
  • Don’t use WEP encryption.
  • Turn off guest networking.
  • Update the firmware of your wireless device.

All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Ethical Hacking Topics