CEH.V6.-.Module.20.Hacking.Wireless.Networks

11x 80211 capture files decoder can decode wireless

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: uncil Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited ASLEAP: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tool: Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems It allows recovery of several kind of wireless network keys Features: • Password decoders to immediately decode encrypted passwords from several sources • WEP Cracker can quickly recover 64-bit and 128-bit WEP keys if enough unique WEP IVs are available • Wireless Scanner detects Wireless Local Area Networks (WLANs) using 802.11x • 802.11 capture files decoder can decode wireless capture files from Wireshark and/or Airodump-ng containing WEP or WPA-PSK encrypted 802 802.11 frames • Wireless zero configuration password dumper EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cain & Abel: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cain & Abel: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cain & Abel: Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cain & Abel: Screenshot 4 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MAC Sniffing and AP Spoofing Attackers can easily sniff MAC addresses because they must appear in the clear even when WEP is enabled Attackers can use those advantages in order to masquerade as a valid MAC address by programming the wireless card and getting into the wireless network and using the wireless pipes Spoofing MAC addresses is easy. Using packet-capturing software, attackers can can determine a valid MAC address using one packet To perform a spoofing attack, an attacker must set up an access point (rogue) near the target wireless network or in a place where a victim may believe that wireless Internet is available EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Defeating MAC Address Filtering in in Windows Changing MAC address is an easy job in Windows MAC Wi Mostly wireless networking equipments send the MAC address as a clear text even if WEP is enabled MAC address of machines in the wireless network can be sniffed using WireShark Next thing is to change your MAC address to the one in the ‘allowed access’ list EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Manually Changing the MAC Address Address in Windows XP and 2000 MAC address in Windows XP or 2000 can be changed by modifying Windows Windows registry Go to Start >>Run and type in regedit. It will start the Registry Editor EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Manually Changing the MAC Address in Windows XP and 2000 (cont’d) Expand folders the HKEY_LOCAL_MACHINE>>System>>CurrentControlSet>>Control Scroll down to the Class folder and expand it...
View Full Document

This note was uploaded on 02/12/2013 for the course CEH v6 taught by Professor John during the Summer '13 term at West Point.

Ask a homework question - tutors are online