Wireless Network Security Training1

Views:
 
Category: Education
     
 

Presentation Description

Securium Fox Technology Provide Cyber Security Service In USA, India, Bangalore, UK, London, China, Africa, Japan As Well As Provide Ethical Hacking, Penetration Testing, Training Moreover Securium Fox Technology Provide All Platform Certification Such As CISCO , Microsoft, EC-Council, ISC2, Rad Hat And So On. You Get Any Certification With 100% Exam Crack Result. CISCO All Certification – CCNA, CCNP, CENT and so on. EC-Council All Certification – CEHv10, CHFI, LPT, ECSA and so on. ISC2 All Certification – CISM. CISSP and so on. Microsoft All Certification – MCSA, MCITP and so on.

Comments

Presentation Transcript

PowerPoint 演示文稿:

SECURIUM FOX offers cyber security consultancy services with its expert and experienced team. We are providing consulting services to prevent cyber attacks, data leak and to ensure that our customers are ready and safe against cyber attacks, with more than 15 years of experience. In addition to pentests and consulting services, SECURIUM FOX prepares its customers and field enthusiasts for real life scenarios by providing trainings in the lab environment which was prepared by themselves, with its young, dynamic and constantly following team. Everytime that hackers are in our lives, there are always risks that we can face with a cyber attack. Over the years cyber security has become a critical precaution for all organizations and companies after the effects and number of attacks. SECURIUM FOX tests the weak points of customers for possible attacks and provides consulting services to eliminate these weak points. SECURIUM FOX team also offers support for the development of our country in this field by supporting free events being organized as a volunteer by the Octosec team. ABOUT US

PowerPoint 演示文稿:

WI-FI SECURITY AND PENETRATION TEST TRAINING

PowerPoint 演示文稿:

How to test wireless systems: A step-by-step guide Penetration testing is like a car MoT or a service: it’s a snapshot in time of the security posture of a given environment. However, whilst a penetration test is a critical part of ensuring an environment is secure, you also need to know what is going on for the other 51 weeks of the year. This how-to is intended to provide a quick guide for wireless testing. The idea is to get people up and running so they can start to discover what wireless networks are around. This is especially useful for companies/government/etc as, occasionally, ne’er-do-wells put rogue access points onto the corporate network. Finding such APs is critical in order to ensure that access to the private internal network isn’t broadcast outside of the physical boundary….

PowerPoint 演示文稿:

Kit One of the most important aspects of wireless testing is the kit. Back in the dark ages of wireless testing you needed the right PCMCIA card (Orinoco Gold!), Kismet, and a great deal of patience to get them all working together. Nowadays things are a lot more straightforward and tools like Kismet are more mature. In general, I use the Alfa Network AWUS036H USB wireless adapter:

PowerPoint 演示文稿:

This has the advantage that it can be used with either a native Kali install or with a VM as it can be directly connected to the virtual machine. This is important as the device needs to be set into monitor mode (more on that later). The next question regards what platform to use for the exercise. This all depends on what you’re looking to achieve. If it is a general scan of the wireless environment but spread over a reasonable area, then I recommend getting a small laptop or a netbook. I use either a Samsung N110 netbook or a HP EliteBook 2530p (thank you eBay!). The netbook is light and the battery lasts for up to 7 hours. Ideal for situations where a lot of walking is required and where no power is available. The EliteBook is heavier but still much more portable than a standard laptop. Unless you have arms like Arnie and the stamina of a Mountain Goat then I recommend either the netbook of the EliteBook for walking around. There are some options with Android based tablets. YMMV with those…. If there is no wandering around required then stick to your normal laptop, or even desktop, and run everything from a virtual machine.

PowerPoint 演示文稿:

What operating system? Kali Linux is the best bet here. All of the tools I’m going to discuss are included as standard, and the Alfa card works without any fuss. The last thing you want when it comes to it is to have to mess around with the OS and/or hardware to get things doing

PowerPoint 演示文稿:

Monitor mode This is a critical aspect of wireless testing. Monitor mode is functionally equivalent to promiscuous mode for an Ethernet card. When set into monitor mode, a wireless card will “hear” everything in the air and pass it onto the listening application, for e

PowerPoint 演示文稿:

Kismet Kismet is probably the most popular of the wireless tools out there. It runs on all flavours of Linux/*BSD (and, allegedly, Windows!). It’s a command line tool, but it uses “curses” to display data in a terminal-based windows environment. You need to be reasonably comfortable with the command line, such as how to invoke a terminal and run a program from it. When Kismet first starts there are a couple of things that need to be done. One is to set the source that kismet receives data from- the network you want to check out. The screenshot below shows the network “trojan horse nest” (no, I didn’t make it up, my neighbours are beginning to scare me….):

PowerPoint 演示文稿:

…then we can dig deeper. In the following screenshot we can see more information about the network. For example, as well as the ESSID we can also see the BSSID. The type, channel, encryption type, and other useful information is also available. It should be noted here that Kismet, for some reason, isn’t always accurate with the encryption type. Airodump-ng does a better job of determining what encryption is being used, but we’ll cover that in another blog post.

PowerPoint 演示文稿:

What are we looking for? Once everything is set up, we need to know what the purpose of the wireless survey is. There are a number of goals that need to be achieved: A site survey of the campus. This is usually used to determine whether all of the legitimate access points are working, where they are, and signal strength in various locations. A site survey to discover rogue access points. Has an employee, contractor, or malicious agent installed a rogue access point? What is it called and where is it? Assess the configuration of legitimate access points. For example, test the guest network to make sure it really is doing what you’ve been told it is.

PowerPoint 演示文稿:

Of course, all of the above (and others) can be achieved in the same exercise. One of the fun things to do, back in the day, was to go on a “wardrive”. This is taking your setup, along with a GPS, on a drive to see what access points are out there and to see how many unsecured or poorly secured access points there are. There’s an important point here: under no circumstances should you attempt to access an access point that does not belong to you. It’s illegal and you could end up in jail. You have been warned! The picture below shows a typical wardriving set up (vehicle not shown in the picture, mainly because it won’t fit in the living room):

PowerPoint 演示文稿:

Conclusion Wireless networking is, literally, almost everywhere. Hotels, fast food joints, coffee shops, and even public transport provide WiFi connectivity. It’s almost as if we can’t do without some form of Internet connection. Wireless site surveys are helpful in determining what legitimate access points are in an environment and whether there are any rogue access points. It can also help in determining what the configuration is and therefore whether it matches what was expected. In my next blog post I’ll go into detail about tool use with Kismet.

PowerPoint 演示文稿:

You can always contact with SECURIUM FOX. You can contact us through our email addresses or by using the contact form on the side. INFO 3rd Floor,Lohia Towers, Nirmala Convent Rd, Gurunanak Nagar,Patamata,Vijyawada, Andhra Pradesh -520010 9652038194 08666678997 info@securiumfoxtechnologies.com

PowerPoint 演示文稿:

info@securiumfoxtechnologies.com Andhra Pradesh Office +91 8666678997,+91 91652038194 3rd Floor,Lohia Towers, Nirmala Convent Rd,Gurunanak Nagar,Patamata,Vijayawada, info@securiumfoxtechnologies.com UK Office +44 2030263164 Velevate, Kemp House, 152 - 160,City Road,EC1V 2NX London info@securiumfoxtechnologies.com Tamil Nadu Office +91 9566884661 Kailash Nagar, Nagar, Tiruchirappalli, Tamil Nadu 620019 info@securiumfoxtechnologies.com Noida Office +91 (120) 4291672, +91 9319918771 A-25, Block A, Second Floor,Sector - 3, Noida, India info@securiumfoxtechnologies.com USA Office +1 (315)933-3016 33 West,17th Street, New York, NY-10011, USA info@securiumfoxtechnologies.com Dubai Office +971 545391952 Al Ansari Exchange, Ansar Gallery - Karama Branch, Hamsah-A Building - 3 A St - Dubai - United Arab Emirates

authorStream Live Help