Using Kismet to enhance the security level in enterprise 通訊所 曹爾凱 Outline
Yüklə
445 b.
tarix
26.10.2017
ölçüsü
445 b.
#14205
Bu səhifədəki naviqasiya:
Reference Introduction
Attack Scenarios: Monkey-Jack
Implement Platform
Install target and host toolkits.
Test.. problems. Defence Scenarios
Reference WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
My suggest in Wireless LAN security
Using
Kismet
to enhance the
security level in enterprise
通訊所 曹爾凱
Outline
Introduction
Attack scenarios
Implement
Future work
Reference
Introduction
Why?
100% security is
Where happened?
More than 60% attack is start from
What can I do?
Defense
in depth
Attack Scenarios: Monkey-Jack
MITM Attack
Taking over connections at layer 1 and 2
Insert attack machine between victim and access point
Attack Scenarios: Monkey-Jack
Management frames
Deauthenticate
victim from real AP
Send Deauthenticate frames to the victim using the access point’s MAC address as the source
Victim’s 802.11 card scans channels to search for new AP
Victim’s 802.11 card associates with fake AP on the attack machine
Fake AP is on a different
channel than the real one
Attack machine’s fake AP is duplicating MAC address and ESSID of real AP
Attack machine associates with real AP
Attack machine duplicates MAC address of the victim’s machine.
Attack Scenarios: Monkey-Jack
Attack Scenarios:
From Internal
Attack Scenarios: From Internal
Attack Scenarios: From Internal
Implement
Platform
IXP 425
OS
MontaVista Linux
Software
Kismet
Snort
Develop environment
IXPD 425
Steps
Install target and host toolkits.
Porting the
hostap driver to MontaVista
Porting the Kismet to MontaVista
Porting the Snort to MontaVista
Config kismet and snort
Edit rc.local to load
hostap driver and start kismet
, snort automatically.
Test.. & problems.
Defence Scenarios
Future works
Future works
Combine Network Management system
Form passive mode to active mode
Locate attacker
Honey pot
Reference
WarDriving: Drive, Detect, Defend:
A Guide to Wireless Security
Kismet website
http://www.kismetwireless.net
AirJack
http://802.11ninja.net/airjack/
My suggest in Wireless LAN security
MAC Filtering.
Disable SSID Broadcasting.
Configure Power output.
Connection with VPN.
Using WPA!!
Yüklə
445 b.
Dostları ilə paylaş:
Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2025
rəhbərliyinə müraciət
gir
|
qeydiyyatdan keç
Ana səhifə
Dərs
Dərslik
Guide
Kompozisiya
Mücərrəd
Mühazirə
Qaydalar
Referat
Report
Request
Review
yükləyin