Free Sample   Computer Security And Forensics Tools: Wireless Security

100000+

Students can't be Wrong!

785487

Orders

4.9/5

Ratings

4986

PhD Experts

GET BEST GRADE, ORDER NOW

250 Words

Computer Security And Forensics Tools: Wireless Security

  0 Downloads   |   8 Pages 1,995 Words   |   Published Date: 11/09/2017

Question:

Describe about the Report of Computer Security and Forensics Tools for Wireless Security.

 

Answer:

Executive Summary:

This report about Wireless Security Cracking tools covers all the aspects related to it. The report covers various types of attacks related to wireless security such as Confidentiality attacks, Integrity attacks, Authentication attacks and Bluetooth attacks. There are some tools related to these attacks which have been explained separately in this report. In the end, various wireless security cracking tools have been compared. So, this report helps reader to get knowledge about various security cracking tools.

Introduction:

This report is an analysis of wireless attack tools which emphasize mainly on 802.11 networks and Bluetooth. In this four types of attacks are included which are Confidentiality, Integrity, Authentication and Bluetooth. Confidentiality attack tools emphasize on the type of data and known for cracking the encryption. Integrity attack tools mainly emphasize on the data which is in transmission and in this, frame insertion, main in the middle and replay attacks are included. Authentication attach tools emphasize on crackin the authenticity of the data i.e. cracking the passwords, crackin the keys and credentials. Last but not the least, Bluetooth attack tools focus on attackin the Bluetooth devices and attempt to steal the information from the device with the help of Bluetooth connection. So, various hacking and cracking tools used for these purposes are discussed in this report. The tools have been compared on the basis of its purposes, availability, encryption type, authentication type, and data integrity type.

Wireless Security Cracking Tools:

Usually, Wireless networks come with a great security such as Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). Wireless Security is must to ensure confidentiality, privacy, availability, authenticity and integrity of the data. There are some kinds of attack which attack on the security of wireless networks are as follows:

  1. Confidentiality Attacks:

These are the types of attacks which attempt to intercept the confidential or private data over wireless networks.

  1. Integrity Attacks:

These are the types of attacks which try to send fraudulent control, data frames so that recipient gets mislead.

  • Authentication Attacks:

These attacks are basically used by the intruders for stealing the identities and credentials of users so that they could access private networks.

  1. Bluetooth Attacks:

Nowadays, attacks on Bluetooth are also emerging with growing popularity of Bluetooth devices. Bluetooth attacks are DoS, Bluesnarfing and Bump attack.

In Bluetooth DoS attack, a device is involved which is not a part of piconet interrupting the existing piconet of other devices. Bluesnarfing is an attack in which an attacker might get unauthorized data with the help of Bluetooth Connection. In Bump attack, attacker sends a request to the victim for accepting the connection for data transfer like photos, calendar notice or s on a PDA. Once the data is sent, attacker does not close the connection i.e. keeps the connection open due to which attacker is allowed for requesting key regeneration even after the victim deletes the pairing between them. Once the attacker is done with key regeneration, he/she may be able to access all the services of victim’s device.

To attacks on Security of Wireless Networks, some tools have been built up which try to crack the security of networks. Some of tools have been developed for compromising with 802.11 networks. Therefore, these kinds of tools are known as Wireless Security Cracking Tools.

Wireless Security Cracking Tools have been categorized as follows:

  • Confidentiality Cracking Tools:

Eavesdropping is an attack to intercept the real-time private communication such as instant messages, phone calls, or videoconferences. Tool used for such attack is Wireshark which is used to display the network traffic of both wireless and wired networks. This tool is used to show the captured data in an easy way so that anyone could read and follow it easily.

An encryption key cracker is a tool which is used to crack the encrypted information. There is a tool called AirSnort for WEP and AirCrack for WPA.

  • Integrity Cracking Tools:

Airpwn is a kind of wireless attack tool for packet injection of 802.11. File2air is also a similar type of tool but using this tool, user is allowed to specify an amount of  injected packets. There is one more tool called as AirJack which is used to run the actual frame injection.

Simple replay is an attack tool which allows for 802.11 packets which had been captured to be injected back into the network. Frame injection and frame relay attacks tools are the tools which attack directly on the integrity of data.

  • Availability Attack Tools:

Few of the availability tools are similar to those listed in the integrity attack tools because most of the attacks are similar in both availability and integrity.

But there are some specific tools which are used to attack availability because few of the attacks on availability are different from that of integrity.

FakeAP is one of the flooding attack tools which are used for generating thousands of 802.11.

  • Bluetooth Attack tools:

With the growing demands of Bluetooth devices, risk associated with Bluetooth i.e. attacks on Bluetooth are also growing. A BlueSmack tool is used for launching the ping of death attack on Bluetooth devices. This tool requests thousands of echoes from a Bluetooth devices and then the device gets unable to do anything only the echoes are returned which causes Denial of Service (DoS).

BlueChop and BluePass are also attacks tools for DoS. BlueChop is used to interrupt the existed piconet. BluePass attack tool is used for creating Bluetooth packets so that buffer overflow attack is caused.

 

Wireshark Tool:

This tool is basically a confidentiality attack tool which is also known as Ethereal and considered as the most powerful tool in network analysis toolkit. It works as a network packet analyzer which is peered inside the network and used to analyze the details of traffic at various levels. This tool is free of cost. It is much easier to install this tool. It can run on various platforms such as Windows, Macintosh OS X, Unix/Linux or any other operating systems.

Ettercap Attack Tool:

Ettercap is a free and open source tool which is used to launch the Man-in-Middle Attacks. This tool is used for the analysis of network and security auditing. It is run on various operating system platforms such as Linux, Windows, Mac OS, and BSD. Ettercap attack tool sniffs the captured passwords and network traffic.

AirCrack Wireless Password Cracking Tool:

Aircrack is a very famous tool developed by Thomas d'Otreppe de Bouvette and used for cracking the passwords of wireless networks. This tool is basically used as 802.11 WPA-PSK and 802.11 WEP keys cracking tools across the world. Firstly, this tool captures the network packets and then it attempts to crack the password by analyzing those packets. This tool is considered as the most powerful tool. In this tool, a console interface is offered. It can be run on various operating systems such as Linux, FreeBSD, OS X, OpenBSD and Windows. It is free of cost and can be downloaded from the internet.

Fern Wi-Fi Wireless Cracking Tool:

Fern Wi-Fi Tool is also one of the best tools which are used for network security. It is used to identify real time network traffic and hosts. The purpose of development of this tool was to identify flaws in computer networks and then fixing them. This tool can run on Apple, Windows and Linux Operating system platforms. With the help of this tool, WEP/WPS/WPA keys can be cracked very easily. Since this tool is in active development, one can get updates of new features on regular free. This tool has free access for a very limited period i.e. for 7 days, after that user has to purchase it for some cost.

WepAttack tool:

WepAttack is an open source tool for Linux for cracking the 802.11 WEP keys. This tool works by performing an active dictionary attack by doing test on millions and millions of words to find the working key of the network. To work with WepAttack, only a working WLAN is required. This tool runs on the Linux operating system platform. The software is free of cost and licensed under the GNU General Public License as published by the Free Software Foundation, either version2 or any latest version. 

CloudCracker tool:

CloudCracker tool is an online password cracking tool for hacking the password of WPA protected wi-fi networks. This tool is used for hacking the various password hashes. Working of the tool is very easy. One is require to upload the handshake file, enter the name of network and start the tool. The tool may contain large dictionary of around 300 million words for performing dictionary attacks. To access this tool, one has to visit its official website which is www.cloudcracker.com. There is no need to download any software to access the tool. So, it is one of the simpler and easier attack tool.

Comparison of Wireless Security Cracking Tools:

 

Wireshark

Aircrack

Ettercap

Fern Wi-Fi cracking tool

BTCrack

Purpose

This tool is used to see what is going on in network at a microscopic level.

The purpose of the tool is to crack the password of wireless networks.

The purpose of this tool is to analyze the network and for security auditing.

In Fern Wifi Cracking tool, the purpose is to identify the real time network traffic and hosts.

BTCrack is a Bluetooth pin and LINK-KEY cracker. Its purpose is to reconstruct the PIN and LINKEY with the data which is sniffed during a pairing exchange.   

Encryption Type

SSL

For Encryption OPN: no encryption, WEP: WEP Encryption, WPA or WPA2: WPA or WPA2 Encryption.

SSL

WPA

No Encryption

Authentication Type

WEP, WPA/WPA2

SKA (shared key for WEP), or OPN (open for WEP).

RSA

WEP, WPA, WPA2

Calculated Pin is used to authenticate in a Pairing Mode.

Data Integrity

CRC32 checksum

CRC32 checksum

Checksums

Not present

Not present

 

Conclusion:

In this report, various attack tools and attacks on the wireless security networks were discussed. Attacks usually occur on 802.11 networks and Bluetooth devices. Because Bluetooth and 802.11 networks are being used so widely these days, therefore there are many various types of attack tools which exist for the Bluetooth and 802.11 networks. Confidentiality attacks are comprised of encryption cracking, sniffing and AP attacks. Integrity attacks are comprised of the attacks which occur on data when the data is used to be in transmission.

These attack tools can easily be installed and there are many web pages or forums which act as tutorial to guide on how to use these tools. Many of them are multi-platform i.e. they can run on various operating systems.

 

References:

Roche, M. (2007). Wireless Hacking Tools. 1st ed. [ebook] .cse.wustl.edu. Available at: http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking [Accessed 10 Jul. 2016].

Chia, T. (2012). Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog. [online] Security.blogoverflow.com. Available at: http://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/ [Accessed 10 Jul. 2016].

Rensburg, J. and Irwin, B. (2006). WIRELESS SECURITY TOOLS. 1st ed. [ebook] citeseerx.ist.psu.edu. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.916&rep=rep1&type [Accessed 10 Jul. 2016].

Sukhija, S. and Gupta, S. (2012). Wireless Network Security Protocols A Comparative Study. 1st ed. [ebook] International Journal of Emerging Technology and Advanced Engineering. Available at: http://www.ijetae.com/files/Volume2Issue1/IJETAE_0112_61 [Accessed 10 Jul. 2016].

Sites.google.com. (n.d.). Confidentiality Attacks and Countermeasures - PCcare. [online] Available at: https://sites.google.com/a/pccare.vn/it/security-pages/confidentiality-attacks-and-countermeasures [Accessed 10 Jul. 2016].

InfoSec Resources. (2015). 13 Popular Wireless Hacking Tools - InfoSec Resources. [online] Available at: http://resources.infosecinstitute.com/13-popular-wireless-hacking-tools/ [Accessed 10 Jul. 2016].

InfoSec Resources. (2016). 20 Popular Wireless Hacking Tools [updated for 2016] - InfoSec Resources. [online] Available at: http://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/ [Accessed 10 Jul. 2016].

Chapple, M. (2008). Wireshark tutorial: How to sniff network traffic. [online] SearchSecurity. Available at: http://searchsecurity.techtarget.com/tip/Wireshark-tutorial-How-to-sniff-network-traffic [Accessed 10 Jul. 2016].

Thepeacekeepers.info provides guaranteed satisfaction with a commitment to complete the work within time. Combined with our meticulous work ethics and extensive domain experience, Thepeacekeepers.info is the ideal partner for all your homework/assignment needs. We pledge to provide 24*7 support to dissolve all your academic doubts. We are composed of 3000+ esteemed experts who have been empanelled after extensive research and quality check. Thepeacekeepers.info provides undivided attention to each assignment order with a methodical approach to solution. Our network span is not restricted to US, UK and Australia rather extends to countries like Singapore, Canada and UAE. Our assignment help services include thesis help, case study help, homework help, coursework help, MBA help and Programming help. Get your work done at the best price in industry.

Most Downloaded Sample of Programing

  167 Download  |   2 Pages 309 Words

1. How do these items act as barriers to intercultural communication?Answer:  The communication barriers Linguistic, Cultural and Emotional act as barriers for...

More

  65 Download  |   2 Pages 429 Words

A just and fair decision always reflects an objective process, however, not all decisions are fair and just because they have influences and impacts that is actuall...

More

  159 Download  |   10 Pages 2,301 Words

Question - Write a case study on Digital Forensic methodology?  ContentsExecutive Summary.Introduction.      Global F...

More

  39 Download  |   10 Pages 2,338 Words

 Table of ContentsIntroductionWeek 3: Critical ThinkingWeek 5: SWOT analysis of presentation skillsWeek 7: Reflective WritingWeek 11: Personal Ethi...

More

  90 Download  |   16 Pages 3,848 Words

Question-Write A report based on role of information technology of financial corporate sector company Aldermore bank?  Executive summaryThe report i...

More