Abstract

Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i) later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated.

Highlights

  • In the entire history of networking it has never been easier to penetrate the network

  • Pored sigurnosnih problema sa IEEE 802.11 protokolom, prisutne su softverske ranjivosti operativnih sistema i programa na bežičnim klijentima

  • Tada bi mogao koristiti alat za menjanje MAC adrese, kao što je SMAC (Spoof MAC) koji mu omogućava da promeni hardversku ili MAC adresu na bilo kom interfejsu na Windows operativnom sistemu

Read more

Summary

Netehnički napadi

Ove vrste napada koriste različite ljudske slabosti, kao što su nedostatak savesti, nehat i preterana poverljivost prema strancima. Takođe, fizičke ranjivosti koje napadaču daju direktan pristup na bežične uređaje. To su često najlakše vrste napada koji uključuju:. – upad na bežične uređaje koje su korisnici samostalno instalirali i ostavili nezaštićene,. – socijalni inženjering, napadi gde se napadač predstavlja kao neka druga osoba i navodi korisnike na odavanje informacija o sopstvenoj mreži,. – fizički pristup na pristupne tačke, antene i ostalu bežičnu opremu

Mrežni napadi
Softverski napadi
Metodologija napada
Snimanje sistema
Mapiranje mreže
Network Stumbler
Skeniranje sistema
Often attacked network ports
Socijalni inženjering
Podešavanje snage zračenja bežične pristupne tačke
Nadgledanje protoka podataka
Otkrivanje lozinki
Prikupljanje IP adresa
Ratna vožnja
Lažiranje MAC adrese
Demonstracija jednostavnosti lažiranja MAC adrese
Napadi uskraćivanja servisa
Asocijacioni i autentifikacioni napadi
Disasocijacioni i deautentifikacioni napadi
ATTACKS ON IEEE WIRELESS NETWORKS
Introduction
The methodology of attack
Finding default values
Network attacks
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.