Tải bản đầy đủ (.pdf) (70 trang)

wireless hacking tricks

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.22 MB, 70 trang )




See-Security
Mar 04 2013 – Wireless Hacking - Haifux
Wireless Hacking
Wireless Hacking


Edri Guy
Edri Guy
Mar 04 ,2013
Mar 04 ,2013



See-Security
Mar 04 2013 – Wireless Hacking - Haifux


DISCLAIMER
DISCLAIMER


1 – The following discussion is for informational and education
1 – The following discussion is for informational and education


purpose only.
purpose only.



2 – Hacking into private network without the written permission
2 – Hacking into private network without the written permission


from the owner is Illegal and strictly forbidden.
from the owner is Illegal and strictly forbidden.


3 – Misused could result in breaking the law so use it at your own
3 – Misused could result in breaking the law so use it at your own


risk.
risk.



See-Security
Mar 04 2013 – Wireless Hacking - Haifux








 


!"

#$%
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux


!&'!""&

(!)*(#!"")+##
##
,"-#"$%%$%%.%/
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux



BSSID*!""&(!)!##

ESSID'!""&01#"2#$2
 "!&0 #"21
!#'"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux


Dipole* Standar, Omni directional

Hyperbolic – Mushroom Shaped signal

Yaggi – Very directional (Japanese R&D)

Pringles – Improvised(Hacker Style) Yaggi

WindSurfer – Improvised hyperbolic
Introduction
WiFi Classes
Vulnerabilities
Attack




See-Security
Mar 04 2013 – Wireless Hacking - Haifux


WindSurfer – Improvised hyperbolic
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux


"$+"$

) '3'4!

""## ,555
Introduction
WiFi Classes
Vulnerabilities
Attack




See-Security
Mar 04 2013 – Wireless Hacking - Haifux

Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
  

*6789%63( 

 *3789%( 


*3789%63( 

*3789%.( 

"#$*6789%:.7;;;
Introduction
WiFi Classes
Vulnerabilities
Attack




See-Security
Mar 04 2013 – Wireless Hacking - Haifux
!

2-2# "

--$6

)##<-=

5">"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
" 
(>1>!"
iw reg get
iw reg set BO
iwconfig wlan0 txpower 30(only if your card
support it)
Introduction
WiFi Classes
Vulnerabilities

Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
" #$ "
%"%&& %'%"&" 
 (
  "
  "
)%??? ?$??'# ?'# '.. @
 (
* "'$&#+$'+&#++",'
  "'$&#+$'+&#
-  "+
.'/$''/0/1/$23 43#52
./0&$56#51/$23 43#52
77
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
" #$ "
8% %+

%44"4 4+"44"4 4+"+"
%+"44"4 4
 (4 "
)%???##?"#?"#'. @
* &+&+#++",'
  &+&+#
%  " 9
%(4 "4 "'$&#+$'+&#4:++%"+%%"
77
%944+% "+44%4 8;;+<"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
=> 

('!""&1

(#',$"(#)

!#'8"*A>"A>"

(()#?B

C'C5-#


(C(DB
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux


Packet*$#$#

Frame*"""$#
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
=

%A&"
"#$%
8#2

&#2
,)")C)

8#%
"#A
5&"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
!

!C&*!##C&"

(!)*(#!"")

,&*,&"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security

Mar 04 2013 – Wireless Hacking - Haifux
?!!
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
==

(

)

A
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
@=

1"


& 

!"

!"
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
8=

!#>

"$,A2)#" 

$%
gksudo wireshark & disown

Wireshark filter:
wlan.fc.subtype == 0x08
Introduction
WiFi Classes
Vulnerabilities
Attack




See-Security
Mar 04 2013 – Wireless Hacking - Haifux
!"=

& C+'!$#E
$"F GG-3

& C',"#" $
$"F GG-6

A% 
airmon-ng start wlan2
airodump-ng mon0
Introduction
WiFi Classes
Vulnerabilities
Attack



See-Security
Mar 04 2013 – Wireless Hacking - Haifux
@=8
Introduction
WiFi Classes
Vulnerabilities
Attack




See-Security
Mar 04 2013 – Wireless Hacking - Haifux
@=!"?A
Introduction
WiFi Classes
Vulnerabilities
Attack

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×