Premium Essay

Wireless Tutorial

In: Computers and Technology

Submitted By mhimp2
Words 2941
Pages 12
Wireless Hacking – Haifux

Wireless Hacking
Edri Guy
Mar 04 ,2013

See-Security

Mar 04 2013 – Wireless Hacking - Haifux

Wireless Hacking – Haifux

DISCLAIMER
1 – The following discussion is for informational and education purpose only.
2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden.
3 – Misused could result in breaking the law so use it at your own risk. See-Security

Mar 04 2013 – Wireless Hacking - Haifux

Wireless Hacking – Haifux

Introduction
WiFi Classes
Vulnerabilities
Attack

Overview


We're going to learn how WiFi (802.11) works



Start with terminology



Types



Vulnerabilities



Attacking them



Surprise demonstration of....:)

See-Security

Mar 04 2013 – Wireless Hacking - Haifux

Wireless Hacking – Haifux

Introduction
WiFi Classes
Vulnerabilities
Attack

Terminology




AP - Access Point
MAC – Media Access Control a unique id assigned to wireless adapters and routers.
It comes in hexadecimal format (ie 00:11:ef:22:a3:6a)

See-Security

Mar 04 2013 – Wireless Hacking - Haifux

Wireless Hacking – Haifux

Introduction
WiFi Classes
Vulnerabilities
Attack

Terminology




BSSID – Access Point's MAC Address
ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But
Airodump-ng can guess it.

See-Security

Mar 04 2013 – Wireless Hacking - Haifux

Wireless Hacking – Haifux

Introduction
WiFi Classes
Vulnerabilities
Attack

Gear - Antennas Dipole – Standar, Omni directional



Hyperbolic – Mushroom Shaped signal



Yaggi – Very directional (Japanese R&D)



Pringles – Improvised(Hacker Style) Yaggi



WindSurfer – Improvised hyperbolic



See-Security

Mar 04 2013 – Wireless…...

Similar Documents

Premium Essay

4g Wireless

...4G Wireless Networks Since 2008, fourth generation (4G) wireless networks have been proclaiming faster speeds for internet connectivity than the third generation (3G) networks. However, upgrading to a 3G or 4G wireless network can be quite expensive. Nevertheless, those who find the need for speed and mobility may find that it is worth the added expense. The war is on between the two generations of networks but there is speculation as to which is truly faster and better. The following paragraphs will provide an overview of both wireless networks, and will include a contrast and compare of 3G wireless networks to 4G networks in relation to application and services, user perception, network architecture, and data throughput. The information offered will also differentiate between 4G LTE, 4G WiMax, and 4G WiBro networks based on upload and download speeds, user perceptions, backward compatibility, and service availability. The following paragraphs will also identify the competition between the 4G LTE carriers and why it has been so fierce, as well as how subscribers will benefit from this competition. When shopping for 3G and 4G wireless networks, consumers will have to comparison shop to find a service that will meet their particular needs. Today, most cell phone providers offer both 3G and 4G wireless service in conjunction with Internet service. Verizon, Sprint, and AT&T are just a few of the providers that use 3G as a standard mobile Internet service, in addition to...

Words: 2108 - Pages: 9

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Premium Essay

Wireless Networks

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current......

Words: 2803 - Pages: 12

Free Essay

The Tutorials

...A reminder that tutorials start next Monday - 22 July Please check the list below for your Group. All tutorials will be held in the Engineering Demonstration Theatre Group 1 Group 2 Group 3 Group 4 Group 5 Group 6 Monday Monday Monday Wednesday Wednesday Wednesday 13.30 to 14.20 15.30 to 16.20 16.30 to 17.20 9.30 to 10.20 10.30 to 11.20 11.30 to 12.20 ID 1104002 1108305 1109502 1077831 1102302 1096127 1110048 1111423 1101900 1102570 1109000 1092083 1112768 1106513 1108847 1109555 1109208 1110604 1109145 1109543 1108719 1090471 1085067 1104689 1084561 1109934 1086473 1091955 1108668 1108096 1108204 Tutorial Group 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 1107714 1094474 1108322 1103558 1107829 1110185 1108336 1108514 1108472 1036708 1096899 1108999 1108633 1090988 1087104 1099054 1107550 1109424 1109192 1109119 1109019 1110883 1109025 1102940 1107637 1107898 1108102 1108526 1108642 1110989 1107840 1107706 1108412 1108717 1109528 1110552 1099108 1107625 1102621 1108494 1110324 1109260 1109368 1105809 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5 5 5 1108458 1099247 1090357 1105240 1110811 1108774 1109275 1107503 1109162 1110671 1108262 1108203 1102494 1099126 1112082 1103428 1100142 1110063 1109885 1105419 1107722 1100860 1106818 1101452 1104269 1107364 1111003 1104847 1097638 1104084 Waiver 5 5 5 5 5 5 5 5 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 ...

Words: 289 - Pages: 2

Premium Essay

Wireless

...PENYERAHAN DAN PENILAIAN TUGASAN ASSIGNMENT SUBMISSION AND ASSESSMENT KOD KURSUS /COURSE CODE : CBWT3103 TAJUK KURSUS /COURSE TITLE : INTRODUCTION TO WIRELESS TECHNOLOGY SEMESTER /SEMESTER : JANUARI/JANUARY 2011 _________________________________________________________________________ ARAHAN KEPADA PELAJAR / INSTRUCTIONS TO STUDENTS 1. Tugasan ini mengandungi SATU (1) soalan sahaja yang disediakan dalam bahasa modul bercetak kursus ini. / This assignment contains only ONE (1) question that is set in the language of the printed module for the course. 2. Jawab dalam Bahasa Melayu atau Bahasa Inggeris. / Answer in Malay or English. 3. Muatturunkan templet tugasan versi bahasa yang berkenaan daripada MyVLE untuk penyediaan dan penyerahan tugasan anda. / Download the language version of the assignment template concerned from the MyVLE for preparation and submission of your assignment. 4. (i) Bagi soalan Tugasan yang berasaskan esei / For essay based assignment: Tugasan anda hendaklah antara 2500 hingga 3000 patah perkataan tidak termasuk rujukan. Bilangan perkataan hendaklah ditunjukkan di hujung tugasan anda. Jumlah perkataan hendaklah ditunjukkan di penghujung Tugasan. Tugasan anda hendaklah ditaip dengan menggunakan saiz fon 12 Times New Roman dan langkau baris 1.5. Jangan menyalin soalan dan arahan tugasan dalam jawapan anda. / Your assignment should be between 2500 to 3000 words excluding references. The number of words should be shown at the end of your assignment. Your......

Words: 2663 - Pages: 11

Free Essay

Tutorial

...UNIVERSITI TUNKU ABDUL RAHMAN Centre Course Year/ Trimester Lecturer : : : : Centre for Foundation Studies Foundation In Science Year 1 Trimester 1 Unit Code Unit Title Session : : : FHSC1114 Physical Chemistry 2014/05 Ms Azlina Banu, Mr Tam Yun Hong, Ms Chong Pui Kuan, Ms Amelia Chiang Kar Mun, Ms Farhanah, Ms Wong Jing Tyng, Ms Jamie Anne, Ms Lau Mei Chien, Mr Ng Sweet Kin, Ms Phang Ying Ning, Ms Precilla, Ms Rachel Tham, Ms Rajalakshmi, Mr Tan Jun Bin, Ms Tan Lee Siew Tutorial 3 : Chapter 3 Stoichiometry and Solution Concentration 1. Balance the following equations: (a) Al(s) + NH4ClO4(s) → Al2O3(s) + AlCl3(s) + NO(g) + H2O(g) (b) GaBr3(aq) + Na2SO3(aq) → Ga2(SO3)3(aq) + NaBr(aq) 2. Ethanol, C2H5OH, is a liquid with a density of 0.789 g ml-1 at 25 °C. Calculate the molarity of ethanol solution made by dissolving 20.00 mL of ethanol at 25 °C in enough water to make 250.0 ml of solution. [Ans: 1.37 mol L-1] 3. Copper sulfate is widely used as a dietary supplement for animal feed. A lab technician prepares a “stock” solution of CuSO4 by dissolving 79.80 g of CuSO4 in enough water to make 500.0 mL of solution. (a) Determine the molarity of the CuSO4 “stock” solution prepared by the technician. [Ans: 1 mol L-1] (b) Calculate the volume of CuSO4 “stock” solution that should be diluted to give 2.5 L of [Ans: 0.25 L] 0.1 M CuSO4. 4. Aluminum is a limiting reactant in the reaction with sulfur gas to form aluminum sulfide. Initially, 1.18 mol of aluminum and 2.25 mol of...

Words: 447 - Pages: 2

Premium Essay

Tutorial

...Business Information Systems Tutorial Week 6 CASE Study 1: Cloud computing * 1.Are the security arrangements for data and applications stored in the cloud the responsibility of the user or the vendor? * Yes it is the responsibility of user to arrange security arrangement for data and applications stored in the cloud because cloud computing help computers by breaking physical bonds between IT infrastructure and their users.Security threats should be taken so that one can fully benefit from this type of new model.In the cloud one can lose control over assets in some respects,Therefore it is necessary to rethink about security arrangement. 2 . Do you agree with Microsoft’s bold prediction that the cloud is the foundation of the 21st-century digital economy? Yes I agree with Microsoft bold prediction that cloud is the foundation of 21st century because it has various advantages over traditional storage on hard drives.People who uses cloud computing can easily access data application from any part of the world.By this hardware cost of the organization can be reduce which results in less requirement of space by the hardware. 3.As an individual user you need to consider whether you would utilise the cloud for data, photo and music storage, among other things. Discuss the reasons for your decision. If cloud for data,photo and music storage works through web app then your browser address bar looks for “https” instead of http,this extra s tells......

Words: 686 - Pages: 3

Free Essay

Tutorial

...EPPD2023: STATISTIK UNTUK EKONOMI DAN PERNIAGAAN (SET 2) TUTORIAL 2 1. Jadual menunjukkan gaji sehari bagi 85 pekerja di syarikat pembinaan. |Gaji (RM) |Bilangan | |50.00 – 59.99 |10 | |60.00 – 69.99 |14 | |70.00 – 79.90 |20 | |80.00 – 89.99 |16 | |90.00 – 99.99 |13 | |100.00 – 109.99 |12 | |Jumlah |85 | Dari jadual taburan ulangan di atas tentukan yang berikut: a) Min aritmetik, (jw: 80.17) varians dan sisihan piawai gaji pekerja. b) Paras gaji harian di mana 30% dari pekerja memperoleh gaji harian lebih daripadanya. (Jwp:83.42) c) Kepencongan taburan data tersebut. (jwp: kanan sbb mod = 76) 2. Berikut menunjukkan kedudukan pendapatan bulanan 200 orang nelayan di Besut, Terengganu. |Pendapatan |Ulangan | |Bulanan (RM) | | | 1 – 100 |3 | |101 – 200 |28 | |201 – 400 |96 | |401 – 600 |30 | |601 – 1,000 |24 ......

Words: 428 - Pages: 2

Free Essay

Wireless Networking

...WIRELESS NETWORKING Introduction A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model  network structure. Examples of wireless networks include cell phone networks, Wi-Fi local networks and terrestrial microwave networks. Wireless network made up of There are two kinds of wireless networks: * An ad-hoc, or peer-to-peer wireless network * Access point Ad-hoc or peer-to-peer wireless network It consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers this way, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. (This is called "bridging") Each computer with a wireless interface can communicate directly with all of the others. Access point or base station A wireless network can also use an access......

Words: 1355 - Pages: 6

Premium Essay

Tutorial

...ECONOMICS, FINANCE AND MARKETING FINANCIAL ECONOMETRICS TUTORIAL EXERCISES We will not use Turnitin in this course; rather tutorials are to be submitted in the assignment box on level 7 in building 80 or sent via the post. Tutorials sent in the mail must be post marked on or before the submission date. Only hard copies will be accepted, also it is best to use a cover sheet. That is, tutorials cannot be submitted by email or via the Learning Hub. ____________________________________________________________________ T1 - 10 marks: DUE DATE: Friday 20th March 2015 SIMPLE LINEAR REGRESSION T1 covers the material in Modules 1 and 2. You are not expected to use material from later modules to answer these questions, but you may need to refer to material covered in Quantitative Methods in Finance and other finance courses. QUESTION 1 – A Cross-sectional study In this question you will be investigating the relationship between exports and imports using a cross-country study. The data needed is on the sheet called countries in the file Tutorial data s1 2015.xls. Economic data on the world’s countries and territories, including exports and imports is sourced from the CIA World Factbook and can be found at: http://www.cia.gov/library/publications/the-world-factbook/ (a) Check and clean the data on exports and imports so it can loaded into Eviews (you will need to do this for all data used in this Tutorial). Checking and setting the data in horizontal line,......

Words: 1720 - Pages: 7

Premium Essay

Tutorial

...HRPYC81/103/0/2013 Tutorial Letter 103/0/2013 Research Report HRPYC81 Year module Department of Psychology This tutorial letter contains Projects 4808 to 4813 Bar code CONTENTS READ ME FIRST .......................................................................................................................................... 3 PROJECT 4808 ............................................................................................................................................ 4 PROJECT 4809 ............................................................................................................................................ 5 PROJECT 4810 .......................................................................................................................................... 14 PROJECT 4811 .......................................................................................................................................... 36 PROJECT 4812 .......................................................................................................................................... 42 PROJECT 4813 .......................................................................................................................................... 55 2 HRPYC81/103 READ ME FIRST Tutorial Letter 102 Tutorial Letter contains Assignment 01as well as the following projects: Project 4802 Project 4803 Project 4804 Project 4805 Project 4807 Tutorial Letter 103 Tutorial Letter......

Words: 20483 - Pages: 82

Premium Essay

Wireless

...Wireless Security Technical Point-of-View Wireless Security Technical Point-of-View W ireless network (Wi-Fi) is now widely established and utilized at home, offices and everywhere in public areas such as rail stations, streets, and etc. This newsletter provides the technical knowledge of Wi-Fi technologies, relevant threats and countermeasures for building a secure internal Wi-Fi network. For the end user best practices of using Wi-Fi, please refer to another newsletter entitled “Wireless Network, Best Practices for General User”. Wireless Technologies | Classification of Networks Technological advancement in wireless communications has led to the worldwide proliferation of networks. The various kinds of network technologies developed can be classified into the following categories according to their range of coverage: Wireless Wide Area Network (WWAN) WWAN offers the largest coverage. Voice and data can be transferred between mobile phones via messaging apps, web pages and video conferencing. In order to secure the transfer, encryption and authentication methods are adopted. Examples of WWAN are 4G, 3G and 2G networks. Wireless Metropolitan Area Network (WMAN) MAN (Metropolitan Area Network) covers across the entire city and WMAN provides the Wi-Fi network similar to MAN. WiMAX and Wireless MAN are both examples of this kind. Wireless Local Area Network (WLAN) WLAN is an 802.11i wireless network that facilitates the access of corporate......

Words: 4503 - Pages: 19

Free Essay

Wireless

...Introduction We have been hired to deploy a wireless network for Citizens First National Bank. We are going to design, test and deploy this network. Banks have been slow to adapt this technology because if the high security standards they must follow. Since security has been improved and the benefits are so great more and more companies are starting to deploy wireless networks. It the next couple pages I will go through the scope of the project along with the goals and requirements. There are some initial testing that we have to get down and setup so auditors will be able to test before we can deploy to all branches. By using auditors it helps protect the bank with a paper trail incase an incident ever happened. This would show that we have followed all requirements and made every possible attempt to protect our customers and employees. We will have 60 days to setup and test before we have to purchase equipment. This should provide plenty of time to get a location up and running and have their auditors in to do testing. After initial testing we will then put a plan in place to bring all branches online one at a time while sticking to the budget. Scope and Goals Scope The major driving force of this project is to add a wireless infrastructure to the entire bank that would allow seamless use between all branches, while maintaining the high security standards that the FCC requires to help protect the customers and employees of the bank. The details of......

Words: 786 - Pages: 4

Premium Essay

Wireless

...WIRELESS COMMUNICATION Contents Page No 1. Dedication…………………………………………………………..01 2. Background…………………………………………………………02 3. Acknowledgement………………………………………………….03 4. Abstract.....................................................................................…….04 5. Introduction………………………………………………….….. 05 6. Introduction to Technology……………………………….……. 06 7. Introduction to Wireless Communication……………….……….06 8. Definition of Wireless………………………………………..……..07 9. Wireless Communication Model……………………………..……07 10. Wireless Communication Technologies……………………..……08 11. Wireless Usage……………………………………………..……….10 12. Wireless Security…………………………………………..……….10 13. Security about……………………………………………….……...11 14. Role of Security…………………………………………………….11 15. Wireless Devices…………………………………………….……...13 16. Wireless Prices……………………………………………….……..14 17. Wireless Devices Availability………………….…………………..14 18. Wireless Devices Manufacturers………………………….………14 19. Wireless Service Companies………………………………………15 20. Conclusion…………………………………………………………..15 21. Reference……………………………………………………………16 Dedication We dedicate this project to our loving parents whose prayers are always with us. Furthermore, We confer this project to all the teachers in our whole......

Words: 2185 - Pages: 9

Premium Essay

Wireless Signals

...Individual: Wireless Signals Erwin Pancho IT/242 June 17, 2012 Wireless Signals First of all lets define what a wireless signal is. Wireless internet/technology creates a network by sending radio-frequency signals between your computers to share information. This allows wireless networking technology to happen without the use of wires and makes it easier for other computers on the same network to communicate with one another. In wireless networking, a peer-to-peer or in other words point-to-point wireless network means that each computer can communicate with every other computer on that same network. Wireless networks that use client/servers have an access point. An access point is a wired controller that receives and transmits data to the wireless adapters installed in each of the computers. There are four main types of wireless technologies which include but not limited too are Bluetooth, IrDA, HomeRF, and Wi-Fi (wireless Fidelity). Bluetooth wireless technology allows users to enable links between their mobile computers, mobile phones, portable handheld devices, and Internet connectivity, which require no wires to be involved or that is needed. It is mostly used for devices such as cell phones, PDAs, wireless headsets, computer hardware, headphones, MP3 players, etc. Bluetooth technology is supported by application and product development in a broad range of market subdivisions, which include software......

Words: 672 - Pages: 3