CCSA# 10

Wireless security

Disclaimer:

Usage of these information/Data/Tools/Techniques for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. The Computer Joker/Instructor/Owner assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purpose. The Computer Joker/Instructor do not support/promote hacking. For more details, head to our t&c page.

What is wi-fi?

Wi-Fi is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access. Wi‑Fi is a trademark of the non-profit Wi-Fi Alliance, which restricts the use of the term Wi-Fi Certified to products that successfully complete interoperability certification testing.

Devices that can use Wi-Fi technologies include personal computer desktops and laptops, smartphones and tablets, smart TVs, printers, smart speakers, cars, and drones.

stats of wireless technology

As of 2017, the Wi-Fi Alliance consisted of more than 800 companies from around the world.

As of 2018, over 2.97 billion Wi-Fi enabled devices are shipped globally each year.

More than 50% of all open Wi-Fi networks are susceptible to abuse.

90% or more of all smartphones are equipped with Wi-Fi capabilities.

A Wi-Fi attack on an open network can take less than 2 seconds.

There will be 10 billion new Wi-Fi enabled devices in the next 3 years

authentication on wifi

Types of wireless protocols

WEP - Wired Equivalency Privacy

WPA - Wi-Fi Protected Access

WPA2 - Wi-Fi Protected Access 2

wep

WEP (Wired Equivalency Privacy )

First 802.11 security standard

WEP used Rivest Cipher RC4 encryption for data privacy.

A 64-bit encryption uses 10 hexadecimal keys(0-9 and A-F) of 4 bits each totaling 40 bits which are further concatenated with 24-bit IV(initialization Vector) to produce 64-bits in total.

Easily hacked due to its 24-bit initialization vector and weak authentication

wpa

WPA(Wi-Fi Protected Access)

WAP creates the 128-bit key dynamically for each packet generated by using TKIP (Temporal Key Integrity Protocol).

The message integrity check adopted by WAP is TKIP which is stronger than CRC ( Cyclic Redundancy Check) used by WEP.

Different WPA versions include WPA-Personal and WPA-Enterprise.

WPA-Personal is designed for home and small office use and encrypts the wifi signals with 256-bit keys. WPA-Enterprise, on the other hand, utilizes EAP(Extensible authentication protocol) and RADIUS authentication server is a must for enterprise WPA security.

wpa-2

WPA2(Wi-Fi Protected Access Version 2)

WPA 2 uses latest AES( Advanced Encryption Standard) instead of TKIP and CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) over 24-bit RC-4 algorithm.

AES is considered one of the most fortified protocol and is even adopted as an encryption protocol for US government.

some tips on using public wi-fi

Turn off sharing.

Enable your firewall.

Use HTTPS and SSL whenever possible.

Consider using VPN(Virtual Private Network).

Turn off WiFi when not in use.

That's all for this module!

Click below to get to the Next Module - Android Basics & Security checks

“Stay hungry, stay foolish”

-STEVE JOBS<Co-founder of Apple>

Disclaimer:

Usage of these information/Data/Tools/Techniques for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. The Computer Joker/Instructor/Owner assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purpose. The Computer Joker/owner/Instructor do not support/promote hacking. For more details, head to our t&c page.

want a training?

Please contact us by filling the form on the right side for:

--> Live One to One Training

--> Course materials (pdf, tools & videos)

--> For any queries/feedback & suggestions.

Social
Contact

hi@thecomputerjoker.com

© copyrighted 2021. All Rights Reserved.