Next talk about wireless network data Snoop Technology

Source: Internet
Author: User

Recently everyone is talking about WI-FI Hacking I am a wireless security enthusiast also talk about those wireless network data prying.
First, let's take a look at the encryption methods of wireless networks. There are three ways to encrypt wireless networks:
 
OPEN (OPEN): the so-called OPEN mode means that data is not encrypted and data is transmitted in wireless networks.
TKIP (WEP/WPA): TKIP (temporary Key Integrity Protocol) is used to encrypt wireless security issues, in the network environment of WEP and WPA, wireless data is encrypted by TKIP.
CCMP (WPA2): The complete code protocol of the blockchain message in CCMP counter mode. WAP2 is backward compatible with TKIP and CCMP. Generally, the existing WPA2 uses CCMP.
 
Open wireless network threats
Even so, some people will use the OPEN mode to build a WLAN Network, which is already around us and provides us with Internet access services. For example, Wi-Fi networks of carriers, hotels, and public networks all adopt open authentication to attract customers' resources. Some enterprise networks also use open authentication methods for access authentication, the backend uses Web or 802.1x authentication.
On the premise of an open wireless network, you only need to enable wireless listening to transmit data from other clients in plaintext. The listening technology is different from other network sniffing and scanning attacks. It does not need to establish a connection under a certain target AP or obtain the IP address of the target network through certain means, as long as you can scan the wireless band in which the target SSID is open, you can monitor the wireless network in this band.
For the wireless listening technology, in a wireless network environment, it studies what content can be listened to when the wireless listening function is enabled, which brings harm to wireless network users, here we will introduce in detail how to prevent wireless listener attacks.
The wireless listening technology is simple. You only need to enable the wireless network card as the listening mode. In BT5, use airmon-ng to flavor the network card. then, use airodump-ng to capture packets to complete the wireless listening process. This time I will introduce how to implement wireless listening on windows. OmniPeek is used here. Many installation and usage tutorials are skipped here.
1. Enable OmniPeek to configure the wireless network cardThe NIC must support the WildPackets API.
 
2. Enable the OmniPeek function for wireless listeningFor more information about how to use OmniPeek for wireless listening, you can search for it online. The listening result is as follows:
 
3. Use wireless listeners in open networks to submit URLs containing sensitive informationAttackers can exploit this sensitive information to launch attacks on users added to the wireless network, and perform session hijacking and other spoofing means to obtain the session on the user login page, thereby stealing user information. There are also various means, you can use it as needed.
 
4. DHCP information can be captured in the wireless listening environment.You can use the DHCP information to set your IP address to an IP address that has been verified on the Internet.
 
Filter all DHCP information. Expand the data packet to view the content.
 
View the specific content of the data packet. We can see the DHCP option. Expand all the options.
 


In this option, you can see the IP Address requested by the client through DHCP. In this way, you can replace the valid client with the IP address configured locally. Use its traffic to access the Internet.
Security suggestions
 

It is difficult to actively discover such wireless listener attacks because the wireless listener is in a passive role and does not show its specific characteristics, at the same time, wireless networks have powerful mobility, so the wireless listener location is not identified based on the characteristics of wireless listeners, so that the problem of wireless network listening cannot be effectively solved from the root cause, only by taking advantage of the disadvantages of wireless listening can the risks of some wireless listening be avoided, that is, some wireless interference devices can send some Wireless RF interference, it can interfere with the signal of these Wireless RF NICs based on the monitoring mode, which affects the packet capture quality of infinite listeners.
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.