LightBlog

Monday, 10 December 2018

Ethical Hacking Tutorials - What is Wireless Hacking ?

Ethical-Hacking-Tutorials-Wireless-Hacking

Ethical Hacking Tutorials - What is Wireless?


allow users to access network resources from nearly any convenient location within their primary networking environment(home or office). With the increasing saturation of laptop-style computers, this is particularly relevant.

With the emergence of public wireless networks, users can access the internet even outside their normal work environment. Most chain coffee shops, for example, offer their customers a wireless connection to the internet at little or no cost.

Users connected to a wireless network can maintain a nearly constant affiliation with their desired network as they move from place to place.

The initial setup of an infrastructure-based wireless network requires little more than a single access point. Wired networks, on the other hand, have the additional cost and complexity of actual physical cables being run to numerous locations (which can even be impossible for hard-to-reach locations within a building).

Wireless networks can serve a suddenly-increased number of clients with the existing equipment. In a wired network, additional clients would require additional wiring.


Wireless vs Wired Network?


Ethical-Hacking-Tutorials-Wireless-Hacking

A wired network connects devices to the Internet or other network using a cable. The most common wired networks use cables connected to Ethernet ports on the network router on one end and to a computer or other device o the cable's opposite end.

Wireless networking is a method by which homes, telecommunication networks, and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.

Wireless telecommunication networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI Model network structure.

There are Four Main Types of Wireless Networks



1.) Wireless Local Area Networks(LAN): Links two or more devices using a wireless distribution method, providing a connection through access points to the wider Internet.

2.) Wireless Metropolitan Area Networks(MAN): Connects sererall wireless LANs.

3.) Wireless Wide Area Networks (WAN): Covers large areas such as meighboring towns and cities.

4.) Wireless Personal Area Network(PAN): Interconnects devices in a short span, generally within a person's reach.

Radio Frequency Signal


Although radio frequency is a rate of oscillation, the term "Radio Frequency" or its abbreviation "RF" are used as a synonym for radio i.e. to describe the use of wireless communication, as opposed to communication via electric wires

Radiofrequency (RF) is any of the electromagnetic wave frequencies that lie in the range extending from around 3 kHz to 300 GHz (Frequency Range)


Radar FM TV Microwaves Infrared

1.) Radiofrequency(RF) is any of the electromagnetic wave frequencies (CAT).
2.) That lie in the range around 3 kHz to 300 GHz (Frequency Range)
3.) Like all other electromagnetic waves, they travel at the speed of light.
4.) Naturally occurring radio waves are generated by lightning, or by astronomical objects.

Disadvantages of Radio Frequency Signal


1.) Uncontrolled radiation of RF affects pre-adolescent children, pregnant women, elderly humans, patients with pacemakers, small birds, flora and fauna, small insects, etc.
2.) It can be easily intruded by hackers and crucial personal official data can be decoded for malicious motives.
3.) Possible Signal Loss weakening of signals.

What is the Difference Between 1G, 2G, 3G, 4G, Mobile Networks?

1G


Radio signals were transmitted in 'Analogue' form one was not able to do much other than sending text messaging and making calls. limited network availability

2G

Signals were transmitted in the digital format. Improved the quality of calls Reduced the complexity of data transmission 2G network came in the form of Semi Global Roaming System, which enabled the connectivity all over the world.

3G

The speed of data transmission on a 3G network ranges between 384KBPS to 2MBPS Enables voice and video calling, file transmission, online TV, view high definition videos, play games and much more.

4G

Speed ranging between 100MBPS to 1GBPS


Global Wireless Standards


The IEEE 802 LAN/MAN Standards Committee develops and maintains networking standards and recommended practices for local, metropolitan, and other area networks, using an open and accredited process and advocates them on a global basis. The most widely used standards are for Ethernet, Bridging and Virtual Bridged LANs Wireless LAN, Wireless PAN, Wireless MAN, Wireless Coexistence, Media Independent Handover Service, and Wireless PAN. An individual Working Group provides the focus for each area.


Local Area Network (LAN)

What is Open System Authentication (OSA)?

Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted.

What are Wireless Threats?

Wireless threats come in all shapes and sizes, from someone attaching to your WAP (Wireless Access Point) without authorization, to grabbing packets out of the air and decoding them via a packet sniffer. The airborne nature of WLAN transmission opens your network to intruders and attacks that can come from any direction. WLAN traffic travels over radio waves that the walls of a building cannot completely constrain. Although employees might enjoy working on their laptops from a grassy spot outside the building, intruders and would-be hackers can potentially access the network from the parking lot or across the street using the Pringles content.

Wireless Encryption Standards



Wired Equivalent Privacy (WEP)

The first 802.11 Security standard easily hacked due to its 24-bit initialization vector and weak authentication.

How it works

Uses RC4 stream cipher and 64-bit keys. The static master key must be manually entered into each device.


Wi-Fi Protected Access (WPA)

An interim standard to address major WEP flows, Backward compatible with WEP devices. It has two models: Personal and Enterprise.

How it works:

Retains use of RC4, but adds longer and 256-bit kyes. Each client gets TKIP Enterprise mode: Stronger authentication via 802.1x and EAP.

Wi-Fi Protected Access (WPA2)

Current standard Newer hardware ensures advanced encryption doesn't affect performance. Also has personal and enterprise modes.

How it works:

Replace RC4 and TKIP with CCMP and AES algorithm for stronger authentication and encryption.

What is SSID

An SSID (Service Set Identifier) is a name that identifies a particular wireless network you are connecting to. Each wireless network in your range will have its own unique name or SSID. If the wireless network is not broadcasting the SSID, you can use a network analyzer to find it.

What is Access Point 

A Device that ads as the bridge between wireless clients and the wired network Often abbreviated as Access Point

What is Hotspot

An Access Point set up specifically to provide Internet access to users. Hotspots are popular in coffee shops, restaurants, and other publicly accessible location, and usually do not require any authentication or offer any encryption. They provide the convenience of free Internet access to attract customers.

What is Captive Portal

In wireless networking, a captive portal is a process running on an access point that can intercept and redirect clients who have associated with a web page where they must agree to terms of service, provide a password, or even purchase access. These are common in hotels, airports, and other locations that offer Internet access but want to charge a few, restrict it to authorized users, or require the user to accept their AUP.

What is Bandwidth

Network Bandwidth is usually expressed in bits per second (BPS), modern networks typically have speeds measured in the millions of bits per second (megabits per second, or MBPS) or billions of bits per second (gigabits per second, or GBPS).

What is MIMO

Multiple Input or Multiple Output signaling that uses several transceivers and antennae to improve throughput and range of the wireless network. Both access points and clients can use MIMO, though it is most often a feature of the access point.

What is War Chalking

Warchalking is the drawing of symbols in public places to advertise on an open Wi-Fi network. Inspired by hobo symbols, the warchalking marks were conceived by a group of friends in June 2002 and publicized by Matt Jones who designed the set of icons and produced a downloadable document containing them.

What is War Driving

War Driving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone, or personal digital assistant (PDA).

Read: Ethical Hacking Tutorials - What is Buffer Overflow?
Read: Ethical Hacking Tutorials - What is DoS Attack?


 Tags: hacking,wireless,wifi hacking,wireless hacking,ethical hacking,learn hacking,cracking of wireless networks,cracking,learn wireless ethical hacking,hacking tutorials,learn wifi hacking,wireless hacking lesson,wps hacking,wireless ethical hacking,wireless computer hacking,wireless lan (industry),linux hacking,hack,computer hacking,best wireless adapter for wi-fi hacking,learn wifi hacking from scratch,ethical hacking tutorial




No comments:

Post a Comment