

















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
“Wireless network” refers to any type of computer network commonly associated with telecommunications, whose interconnections between nodes are implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves such as radio waves for the carrier. The implementation usually takes place at the physical level or layer of the network. The objective of this lab is to protect the wireless network from attackers. In this lab, you will learn how to: Analyze Wireless Network Traffic using Wireshark Crack WEP using aircrack-ng Crack WPA using aircrack-ng
Typology: Study notes
1 / 25
This page cannot be seen from the preview
Don't miss anything!
“Wireless network” refers to any type of computer network commonly associated with telecommunications, whose interconnections between nodes are implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves such as radio waves for the carrier. The implementation usually takes place at the physical level or layer of the network. The objective of this lab is to protect the wireless network from attackers. In this lab, you will learn how to: ● Analyze Wireless Network Traffic using Wireshark ● Crack WEP using aircrack-ng ● Crack WPA using aircrack-ng
Wireless network technology is becoming increasingly popular, but at the same time, it has many security issues. A wireless local area network (WLAN) allows workers to access digital resources without being tethered to their desks. However, the convenience of WLANs also introduces security concerns that do not exist in a wired world. Connecting to a network no longer requires an Ethernet cable. Instead, data packets are airborne and available to anyone with the ability to intercept and decode them. Several reports have explained weaknesses in the Wired Equivalent Privacy (WEP) algorithm by 802.11x standard to encrypt wireless data. To be an expert ethical hacker and penetration tester , you must have sound knowledge of wireless concepts, wireless encryption, and their related threats. As a security administrator , you must protect your company’s wireless network from hacking.
A network monitoring system gives you a full overview of what’s going on in your network at all times. A network monitor has the ability to manage multiple servers and can also manage data from multiple devices such as switches, routers, firewalls, etc… Learning to monitor your network is a great way to know the stress on yout network infrastructure and to see what kind of demands it can handle form the users. By knowing about all the overview information it helps you to troubleshoot your network and a good amount of data to build your future growth plan for your networking infrastructure. Lab Scenario Wireless networks can be open to active or passive attacks. These attacks include DoS, MITM, spoofing, jamming, war driving, network hijacking, packet sniffing, and many more. Passive attacks that take place on wireless networks are common and are difficult to detect since the attacker usually just collects information. Active attacks happen when a hacker has gathered information about the network after a successful passive attack. Sniffing is the act of monitoring the network traffic using legitimate network analysis tools. Hackers can use monitoring tools, including AiroPeek, Ethereal, TCPDump, or Wireshark, to monitor the wireless networks. These tools allow hackers to find an unprotected network that they can hack. Your wireless network can be protected against this type of attack by using strong encryption and authentication methods. Because you are the ethical hacker and penetration tester of an organization, you need to check the wireless security and evaluate weaknesses present in your organization. Lab Objective The objective of this lab is to capture and analyze wireless packets in a network.
click Type Password.
WEPcrack-01.cap and click Open.
Similarly you can also analyze the WPAcrack-01.cap file for WPA packets.
Type root in the Username field and click Next.
Close the File Explorer window.
CEHLabs is just used for a demonstration purpose in iLabs. 11.On completion of the lab, close all the windows. Do not cancel the lab session. In this lab, you have learnt how to: ● Crack WEP using aircrack-ng
WPA is a security protocol defined by 802.11i standards; it uses a Temporal Key Integrity Protocol (TKIP) that utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit MIC integrity check to provide stronger encryption, and authentication. WPA uses TKIP to eliminate the weaknesses of WEP by including per-packet mixing functions, message integrity checks, extended initialization vectors, and re-keying mechanisms. WPA2 is an upgrade to WPA, it includes mandatory support for Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), an AES-based encryption mode with strong security. Lab Scenario Network administrators can take steps to help protect their wireless network from outside threats and attacks. Most hackers will post details of any loops or exploits online, and if they find a security hole, attackers will descend in droves to test your wireless network with it. WEP is used for wireless networks; always change your SSID from the default, before you actually connect the wireless router for the access point. If an SSID broadcast is not disabled on an access point, the use of a DHCP server to automatically assign IP address to wireless clients should not be used, because war-driving tools can easily detect your internal IP addressing if the SSID broadcasts are enabled and the DHCP is being used. As an ethical hacker and penetration tester of an organization, your IT director will assign you the task of testing wireless security, exploiting the flaws in WEP, and cracking the keys present in your organization’s WEP. In this lab, we discuss how WPA keys are cracked using standard attacks such as KoreK and PTW. Lab Objectives The objective of this lab is to protect wireless networks from attackers. In this lab, you will learn how to: ● Crack WPA using aircrack-ng