CEH.V6.-.Module.20.Hacking.Wireless.Networks

Reproduction is strictly prohibited hijacking and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: tatus code. This causes most to drop the relevant associated session EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hijacking and Modifying a Wireless Wireless Network TCP/IP TCP/IP packets go through switches, routers, and routers and APs Each device looks at the destination IP address and compares it with the local IP addresses If the address is not in the table, the device hands the packet to its default gateway This table is a dynamic one that is built up from traffic passing through the device and through Address Resolution Protocol (ARP) notifications dd from new devices joining the network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hijacking and Modifying a Wireless Wireless Network (cont’d) There is no authentication or verification of the validity of request received by the device A malicious sends messages to routing devices and APs stating that his MAC address is associated th with a known IP address All traffic that goes through that device destined for the hijacked IP address will be handed off to the hacker’s machine EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Phone Jammers A cell-phone jammer transmits radio frequency signals similar to that used by cellular devices to cut off communications between cell phones and cell base stations Jammer’s signal has enough high power to cancel out cellular signals Some of the high-end jammers block all frequency signals disabling switching over different network types Range of the jammer depends on its power and the local environment (≈9m-1.6km) Phone jamming is also known as Denial-of-service EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Phone Jammers (cont’d) Jammers typically consists of: • Antenna • Circuitry Ci • Voltage-controlled oscillator • Tuning circuit • Noise generator • RF amplification (gain stage) • Power supply EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Phone Jammers (cont’d) Phone jammers provide solution for areas where cellular communications may cause inconvenience and ll violation of security policies as: • • • • • • • • • • • • • EC-Council Th Theatres and museums Lecture rooms, libraries, schools, and Universities Restaurants and public transport Places of Worship Recording studios Businesses (conferences, board of directors rooms, seminars, and meeting rooms) Government building and Government complexes Law enforcement facilities Police stations Drug enforcement facilities Prison facilities, jails, etc. Courts of law and court houses Military installations, military complexes, and military training centers Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Phone Jammers: Illustration Base Station EC-Council Jammer Area Copyright © by EC-Council All Rights Re...
View Full Document

Ask a homework question - tutors are online