0% found this document useful (0 votes)
77 views34 pages

Wireless BGSU

This document discusses wireless hacking and provides an overview of wireless technologies and related security issues. It outlines the advantages and disadvantages of wireless networks, including how the mobility and ease of wireless can benefit both legitimate users and hackers. The document describes the basic components of 802.11b wireless networks and terms like wardriving. It also provides examples of recent wireless hacking incidents and emphasizes the importance of securing wireless installations to prevent unauthorized access to networks and data.

Uploaded by

Sai Srikar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views34 pages

Wireless BGSU

This document discusses wireless hacking and provides an overview of wireless technologies and related security issues. It outlines the advantages and disadvantages of wireless networks, including how the mobility and ease of wireless can benefit both legitimate users and hackers. The document describes the basic components of 802.11b wireless networks and terms like wardriving. It also provides examples of recent wireless hacking incidents and emphasizes the importance of securing wireless installations to prevent unauthorized access to networks and data.

Uploaded by

Sai Srikar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 34

Wireless Hacking Overview

Thomas L. Roberts
Information Security Analyst
Bowling Green State University

http://www.bgsu.edu/offices/its/security
Introduction – Main Points
 Focus of presentation is non-technical –
some technical explanations are simplified
for ease of understanding
 Wireless definition in modern world
 Advantages and disadvantages of wireless
 Basic components of 802.11b networks
 Information available on the web
 Recent examples of wireless related
hacking
“Wireless” modern definition
covers many different technologies
 Wireless LAN computing – 802.11b
 Infared – installed in many laptops and
PDA’s (technology involving light and
radiation)
 Bluetooth – technology designed for
Personal Area Networks or PANs
 Wireless Application Protocol (WAP) –
example of cell phone technology
Wireless has advantages
 Mobility
 Low initial cost of installation - WLANs
 Convenience – ease of connections
 Ability to share data by using laptop
computers, cell phones, Personal
Information Devices (PDA’s)
 Various methods to transmit data via
wireless
Wireless disadvantages
 Mobility – attacks can occur from a
distance
 Post installation costs – such as security
 Convenience – also available to hackers
 Ability to share data – air is shared
medium
 Various methods of transmitting data
wirelessly – more ways to steal data
Main Points
 Advantages of wireless technologies also
benefit hackers and the unintended users
that steal information.
 When implementing wireless technolgies,
carefully plan and review installations.
Components of 802.11b Wireless
Network
 Station – Laptop w/ wireless card, wireless
PDA
 Access point – allows station to connect to
network
 Modes – Infrastructure (Basic Service Set)
Ad-hoc (Independent Basic Service Set)
 SSID – text that identifies 802.11 network
Wireless cell phone & PDA
Infrastructure (BSS)
Adhoc (IBSS)
Antennas
 Omni-directional & directional
 Antennas can combine technologies
 Can be used on Access Point or Station to
extend range
 Examples of antennas
A few more terms ….
 WarWalking – walking around to look for open
wireless networks
 Wardriving – driving around to look for open
wireless networks
 WarFlying – flying around to look for open
wireless networks
 WarChalking – using chalk to identify available
open networks
 Global Positioning Device (GPS) – can also be
used to help map the open networks that are
found.
Information on the Web about
wireless hacking
 Just some examples, there are large
amounts of correct and incorrect
information about wireless hacking
Wireless info mixed message
802.11 network from 80 miles away
WiFinder website
Warchalk symbols
Warchalk example #1
Warchalk example #2
Warchalk.org website
Warchalking site FAQ
Netstumbler website
Nestumbler map of networks
Wardriving t-shirts for souvenirs
Perception of wireless hacker
Actual wireless hacker #1
Actual wireless hacker #2
Pringles can used as antenna
Cantenna website
Recent examples of wireless
hacking
 Man from Norway discovered distant
neighbor was hacking his computer via a
wireless keyboard. He was also much
farther away than the rated wireless
specifications of the keyboard.
More examples
 Students have been involved in many
wireless hacking incidents. Some were
using cell phone text messaging for
answers. Example 1c2d3a4e5b
 One professor told his university class that
the correct answers to the current test were
available on the web for post-review.
Some students chose to use web access
during the test to help increase their odds.
More examples
 A San Francisco area businessman was
using his laptop at a wireless Starbucks
café. Along with checking email, he
logged into to check his company’s
database. Shortly later, a young college
age student approached along with a note
and warning, “This is your email and
password. Please use this as a learning
experience.”
Summary
 Advantages of wireless technologies also
benefit hackers and the unintended users
that steal information.
 When implementing wireless technologies,
carefully plan and review installations.
 Additional training and information is
available to secure wireless networks. Use
them to avoid being a wireless hacking
statistic.
Wireless Hacking Overview

Thomas L. Roberts
Information Security Analyst
Bowling Green State University

http://www.bgsu.edu/offices/its/security

You might also like