Hacking Wireless Networks Module 15 Module 15 - Hacking Wireless Networks
Total Page:16
File Type:pdf, Size:1020Kb
CEH Lab Manual Hacking Wireless Networks Module 15 Module 15 - Hacking Wireless Networks Hacking Wireless Networks IVi-Fi is developed on IE E E 802.11 stand a ids and is widely used in wireless communication. I t provides wireless access to applications and data across a radio network. ICON KEY Lab Scenario [£Z7 Valuable Wireless network teclinology is becoming increasingly popular but, at the same tune, information it has many security issues. A wireless local area network (WLAN) allows workers to Test roui access digital resources without being tediered to their desks. However, the knowledge convenience o f WLANs also introduces security concerns that do not exist in a = Web exercise wired world. Connecting to a network no longer requires an Ethernet cable. Instead, data packets are airborne and available to anyone widi ability to intercept and Workbook review m decode them. Several reports have explained weaknesses 111 the Wired Equivalent Pnvacy (WEP) algorithm by 802.1 lx standard to encrvpt wireless data. To be an expert ethical hacker and penetration tester, you must have sound knowledge o f wireless concepts, wireless encryption, and their related threats. As a security administrator o f your company, you must protect the wireless network from hacking. Lab Objectives The objective o f this lab is to protect the wireless network from attackers. 111 this lab, you will learn how to: ■ Crack WEP using various tools ■ Capture network traffic ■ Analyze and detect wireless traffic Lab Environment 111 the lab you will need a web browser with an Internet connection. C 7 Tools demonstrated in ■ Tins lab requires AirPcap adapter installed on your machine for all labs this lab are available in Lab Duration D:\CEH- Tools\CEHv8 Time: 30 Minutes Module 15 Hacking Wireless Overview of Wireless Network Networks A wireless network refers to any type o f computer network that is w ireless and is commonly associated with a telecommunications network whose interconnections between nodes are implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic w aves such as CEH Lab Manual Page 819 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 15 - Hacking Wireless Networks radio waves for die carrier. The implementation usually takes place at the physical level or layer o f die network. ^ TASK 1 Lab Tasks Overview Pick an organization diat you feel is worthy o f vour attention. Tins could be an .perhaps a nonprofit chanty ־educational institution, a commercial company, 01 Recommended labs to assist you m Wireless Networks: ■ W1F1 Packet Sniffing Using AirPcap with Wireshark ■ Cracknig a \\”EP Network with Aircrack-ng for Windows ■ Sniffing die Network Using the OmniPeek Network Analyzer Lab Analysis Analyze and document the results related to the lab exercise. Give your opinion 011 your target’s security posture and exposure. PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB. C E H Lab M anual Page 820 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 15 - Hacking Wireless Networks WiFi Packet Sniffing Using AirPcap with Wireshark The AirPcap adapter is a USB device that, when used in tangent with the AirPcap drivers and WinPcap libraries, allows a pen tester to monitor 802.11b/g traffic in monitor mode. ■ con key Lab Scenario [£Z7 Valuable Wireless networks can be open to active and also passive attacks. These types o f information attacks include DoS, M11M, spoofing, jamming, war driving, network liijacking, y 5 Test your packet sniffing, and many more. Passive attacks that take place on wireless networks knowledge are common and are difficult to detect since die attacker usually just collects — Web exercise information. Active attacks happen when a hacker has gathered information about the network after a successful passive attack. Sniffing is die act o f monitoring die m Workbook review network traffic using legitimate network analysis tools. Hackers can use monitoring tools, including AiroPeek, Ethereal, TCPDump, or Wireshark, to monitor die wireless networks. These tools allow hackers to find an unprotected network diat they can hack. Your wireless network can be protected against tins type o f attack by using strong encryption and authentication methods. 111 tins lab we discuss the Wireshark tool, which can sniff the network using a wireless adapter. Since you are the etlucal hacker and penetration tester o f an organization, you need to check the wireless security, exploit the flaws 111 WEP, and evaluate weaknesses present 111WEP for your organization. Lab Objectives The objective o f tins lab is to help smdents learn and understand how to: ■ Discover WEP packets CEH Lab Manual Page 821 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 15 - Hacking Wireless Networks Lab Environment To execute the kb, you need: £ 7 Tools demonstrated in ■ Install AirPcap adapter dnvers; to install navigate to D:\CEH-Tools\CEHv8 this lab are Module 15 Hacking Wireless NetworksVAirPcap -Enabled Open Source available in tools, and double-click setup_airpcap_4_1_1.exe to install D:\CEH- Tools\CEHv8 ■ When you are installing the AirPcap adapter drivers, 11 any installation error Module 15 occurs, install die AirPcap adapter dnvers 111 compatibility mode (right-click Compatibility, 111 ^־Hacking Wireless the AirPcap adapter driver exe hie, select Properties Networks compatibility mode, and select Windows7) " Wireshark located at D:\CEH-Tools\CEHv8 Module 15 Hacking Wireless Networks\AirPcap -Enabled Open Source tools\wireshark-win64- 1.4.4.exe ■ Run diis lab 111 Windows Server 2012 (host machine) ■ A11 access point configured widi WEP on die host machine ■ This lab requires the AirPcap adapter installed on your machine. If you don’t have this adapter, please do not proceed with this lab ■ A standard AirPcap adapter widi its dnvers installed on your host machine ■ WinPcap libraries, Wireshark, and Cain & Abel installed on your host machine ■ Administrative privileges to run AirPcap and other tools Lab Duration Time: 15 Minutes Overview of WEP (Wired Equivalent Privacy) Several serious w eaknesses 111 the protocol have been identified by cryptanalysts with die result diat, today, a WEP connection can be easily cracked. Once entered C E H Lab M anual Page 822 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited Module 15 - Hacking Wireless Networks onto a network, a skilled hacker can modify software, network settings, and other security settings. Wired Equivalent Privacy (WEP) is a deprecated security algorithm for IEEE 802.11 wireless networks. Lab Tasks Configure AirPcap Download AirPcap drivers Ironi the site and lollow die wizard-driven installation steps to install AirPcap drivers. 1. Launch the Start menu by hovering the mouse cursor on the lower-left corner of the desktop. ca You can download AirPcap drivers from http:// www.a1rdemon.net/ riverbed.html FIGURE 1.1: Windows Server 2012—Desktop view 2. Click the AirPcap Control Panel app to open the AirPcap Control Panel window. m Tlie AirPcap adapters can work in monitor mode. In tliis mode, the AirPcap adapter captures all of the frames that are transferred on a channel, not just frames that are addressed FIGURE 1.2: Windows Server 2012—Apps to it. 3. The AirPcap Control Panel window appears. C E H Lab M anual Page 823 Ethical Hacking and Countenneasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 15 - Hacking Wireless Networks AirPcap Control Panel Settings Keys Interface AirPcap USB wireless capture adapter nr. 00 V Blink Led c a Tlie Multi-Channel Model: AirPcap Nx Transmit: yes Media: 802.11 a/b/g/n Aggregator can be configured like any real Basic Configuration AirPcap device, and therefore can have its own Channel 2437 MHz [BG 6] @ Include 802.11 FCS in Frames decryption, FCS checking and packet filtering settings. Extension Channel Capture Type 802.11 + Radio v FCS Filter All Frames Help C ancelReset Configuration Ok Apply CancelReset FIGURE 1.3: AirPcap Control Panel window 4. On tlie Settings tab, click die Interface drop-down list and select AirPcap USB wireless capture adapter. 5. 111 the Basic Configuration section, select suitable Channel, Capture Type, and FCS Filter and check the Include 802.11 FCS in Frames check box. ם _ * AirPcap Control Panel Settings Keys Interface AirPcap USB wireless capture adapter nr. 00 V Blink Led Q=& In Basic Model: AirPcap Nx Transmit: yes Media: 802.11 a/b/g/n Configuration bos settings: Channel: The channels Basic Configuration available in the Channel list box depend upon the selected adapter. Since Channel 2412 MHz [BG 1] ✓]Include 802.11 FCS in Frames channel numbers 14 in the 2.4GHz and 5GHz bands Extension Channel 0 v overlap and there are center frequencies Capture Type 802.11 Only v FCS Filter All Frames (channels) that do not have channel numbers., Each available channel is given by its center frequency. Help C ancelReset Configuration Ok Apply CancelReset FIGURE 1.4: AirPcap Control Panel window 6. Now, click die Keys tab. Check die Enable WEP Decryption check box. Tins enables die WEP decryption algoridnn. You can Add New Key, Remove Key, Edit Key, and Move Key UP and Down. C E H Lab M anual Page 824 Ethical Hacking and Countermeasures Copyright © by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited. Module 15 - Hacking Wireless Networks 7. After configuring settings and keys, click OK. AirPcap Control Panel * Settings Keys WEP Configuration In Basic Configuration Settings: [0 E n a b le W EP Decryption Extension Channel: For 802.1 In adapters, one can Keys Add New Key use the Extension Channel list to create a “wide” Remove Key channel.