Wireless BGSU
Wireless BGSU
Thomas L. Roberts
Information Security Analyst
Bowling Green State University
http://www.bgsu.edu/offices/its/security
Introduction – Main Points
Focus of presentation is non-technical –
some technical explanations are simplified
for ease of understanding
Wireless definition in modern world
Advantages and disadvantages of wireless
Basic components of 802.11b networks
Information available on the web
Recent examples of wireless related
hacking
“Wireless” modern definition
covers many different technologies
Wireless LAN computing – 802.11b
Infared – installed in many laptops and
PDA’s (technology involving light and
radiation)
Bluetooth – technology designed for
Personal Area Networks or PANs
Wireless Application Protocol (WAP) –
example of cell phone technology
Wireless has advantages
Mobility
Low initial cost of installation - WLANs
Convenience – ease of connections
Ability to share data by using laptop
computers, cell phones, Personal
Information Devices (PDA’s)
Various methods to transmit data via
wireless
Wireless disadvantages
Mobility – attacks can occur from a
distance
Post installation costs – such as security
Convenience – also available to hackers
Ability to share data – air is shared
medium
Various methods of transmitting data
wirelessly – more ways to steal data
Main Points
Advantages of wireless technologies also
benefit hackers and the unintended users
that steal information.
When implementing wireless technolgies,
carefully plan and review installations.
Components of 802.11b Wireless
Network
Station – Laptop w/ wireless card, wireless
PDA
Access point – allows station to connect to
network
Modes – Infrastructure (Basic Service Set)
Ad-hoc (Independent Basic Service Set)
SSID – text that identifies 802.11 network
Wireless cell phone & PDA
Infrastructure (BSS)
Adhoc (IBSS)
Antennas
Omni-directional & directional
Antennas can combine technologies
Can be used on Access Point or Station to
extend range
Examples of antennas
A few more terms ….
WarWalking – walking around to look for open
wireless networks
Wardriving – driving around to look for open
wireless networks
WarFlying – flying around to look for open
wireless networks
WarChalking – using chalk to identify available
open networks
Global Positioning Device (GPS) – can also be
used to help map the open networks that are
found.
Information on the Web about
wireless hacking
Just some examples, there are large
amounts of correct and incorrect
information about wireless hacking
Wireless info mixed message
802.11 network from 80 miles away
WiFinder website
Warchalk symbols
Warchalk example #1
Warchalk example #2
Warchalk.org website
Warchalking site FAQ
Netstumbler website
Nestumbler map of networks
Wardriving t-shirts for souvenirs
Perception of wireless hacker
Actual wireless hacker #1
Actual wireless hacker #2
Pringles can used as antenna
Cantenna website
Recent examples of wireless
hacking
Man from Norway discovered distant
neighbor was hacking his computer via a
wireless keyboard. He was also much
farther away than the rated wireless
specifications of the keyboard.
More examples
Students have been involved in many
wireless hacking incidents. Some were
using cell phone text messaging for
answers. Example 1c2d3a4e5b
One professor told his university class that
the correct answers to the current test were
available on the web for post-review.
Some students chose to use web access
during the test to help increase their odds.
More examples
A San Francisco area businessman was
using his laptop at a wireless Starbucks
café. Along with checking email, he
logged into to check his company’s
database. Shortly later, a young college
age student approached along with a note
and warning, “This is your email and
password. Please use this as a learning
experience.”
Summary
Advantages of wireless technologies also
benefit hackers and the unintended users
that steal information.
When implementing wireless technologies,
carefully plan and review installations.
Additional training and information is
available to secure wireless networks. Use
them to avoid being a wireless hacking
statistic.
Wireless Hacking Overview
Thomas L. Roberts
Information Security Analyst
Bowling Green State University
http://www.bgsu.edu/offices/its/security