Professional Documents
Culture Documents
SAYYAD SAJID
9021399298
The regular security issues, like weak passwords,
spyware, and missing patches are not the things
that are going to matter. Networking with no wires
brings in an intact new set of vulnerabilities from
Abstract – Wireless Networks or WLANS is an entirely different point of view. Here comes the
what everybody wants today. These networks concept of ethical hacking. Ethical hacking,
offer more mobility, more flexibility and more occasionally called as white-hat hacking is the use
cost effectiveness than the traditional wired of hacking to check and advance the defenses
networks. Wireless Networks are getting used in against unethical hackers. It may be compared to
houses, offices, organizations and many more. access testing and susceptibility testing, but it goes
With this huge demand many vendors are even deeper. Ethical hacking entails the usage of
coming forward with new devices and solutions. same tools and practices the bad guys make use of,
But are these networks offer the level of security however it also involves wide range forefront
that is offered by the wired networks? This is planning, a set of precise tools, multifaceted testing
what is discussed in this paper. Wireless methodologies, and adequate report to fix any
networks have their own and sometimes more problems before the bad guys exploit our privacy.
critical security issues. So the main focus of this
paper is Ethically Hacking the wireless II. EXPLORING ETHICAL HACKING
networks and checking the vulnerabilities
present in them. We will have a look at the We’ve all heard of hackers. Many of us have even
different hacking tools like NetStumbler, cain heard the consequences of hacker actions. So who
and kismet, using them ethically to protect our are these hackers? Why is it important to know
air privacy and making our network more about them? First we will see what is a Hacker
difficult to attack. actually,
D. Enable MAC Address Filtering Modern network routers contain built-in firewall
capability, but the option also exists to disable
Each piece of Wi-Fi gear possesses a unique them. Ensure that your router's firewall is turned
identifier called the physical address or MAC
on. For extra protection, consider installing and
address. Access points and routers keep track of the
MAC addresses of all devices that connect to them. running personal firewall software on each
Many such products offer the owner an option to computer connected to the router.
key in the MAC addresses of their home
equipment, that restricts the network to only allow I. Position the Router or Access
connections from those devices. Do this, but also Point Safely
know that the feature is not so powerful as it may
seem. Hackers and their software programs can Wi-Fi signals normally reach to the exterior of a
fake MAC addresses easily. home. A small amount of signal leakage outdoors
is not a problem, but the further this signal reaches,
E. Disable SSID Broadcast
the easier it is for others to detect and exploit. Wi-
Fi signals often reach through neighboring homes
In Wi-Fi networking, the wireless access point or and into streets, for example. When installing a
router typically broadcasts the network name wireless home network, the position of the access
(SSID) over the air at regular intervals. This feature point or router determines its reach. Try to position
was designed for businesses and mobile hotspots these devices near the center of the home rather
where Wi-Fi clients may roam in and out of range. than near windows to minimize leakage.
In the home, this roaming feature is unnecessary,
and it increases the likelihood someone will try to
log in to your home network. Fortunately, most J. Turn Off the Network During
Wi-Fi access points allow the SSID broadcast Extended Periods of Non-Use
feature to be disabled by the network administrator.
The ultimate in wireless security measures, shutting
F. Do Not Auto-Connect to Open Wi-
down your network will most certainly prevent
Fi Networks
outside hackers from breaking in! While
impractical to turn off and on the devices
Connecting to an open Wi-Fi network such as a frequently, at least consider doing so during travel
free wireless hotspot or your neighbor's router or extended periods offline. Computer disk drives
exposes your computer to security risks. Although have been known to suffer from power cycle wear-
not normally enabled, most computers have a and-tear, but this is a secondary concern for
setting available allowing these connections to broadband modems and routers.
happen automatically without notifying you (the
user). This setting should not be enabled except in
temporary situations. IX. CONCLUSION
G. Assign Static IP Addresses to
Wireless networks like Wi-Fi being the most
Devices spread technology over the world is vulnerable to
the threats of Hacking. It is very important to
Most home networkers gravitate toward using protect a network from the hackers in order to
dynamic IP addresses. DHCP technology is indeed prevent exploitation of confidential data. The better
easy to set up. Unfortunately, this convenience also way to do this is, just think like a hacker. At a
works to the advantage of network attackers, who glance, we've talked about the whole process of
can easily obtain valid IP addresses from your Ethical Hacking in this paper. All this is made only
network's DHCP pool. Turn off DHCP on the to figure out the necessity in getting touch with
router or access point, set a fixed IP address range some of the scanning tools like NetStumbler, Cain,
instead, then configure each connected device to Kismet, MiniStumbler etc to survey the Wireless
match. Use a private IP address range (like locality. The tools that have been stated will give
10.0.0.x) to prevent computers from being directly us the ability to break our own Wireless protection
reached from the Internet. and this may be the time to go to the next rank of
security, the WPA. Let us try to hack all the
standards of Wireless networks ethically in order to
make a system very protected.
2nd International Conference on Education
Technology and Computer (ICETC)
REFERENCES [4] Ankit Fadia, "The Ethical Hacking Guide To
Corporate Security," January 2005.
[1] Liza phifer, “List of wireless networks attacks”, [5] Stuart Mcclure, Joel Scambray, George Kurtz,
available at "Hacking Exposed™ 6: Network Security Secrets
http://searchsecurity.techtarget.com/generic/0,2955 & Solutions," 2009.
82,sid14_gci1167611,00.html [6] Michael Roche ,"Wireless Hacking Tools,"
[2] Bradley Mitchell,”10 tips for wireless network available at
security”, available at, http://www.cse.wustl.edul-jain/cse571-
http://compnetworking.about.com/od/wirelesssecur 07/ftp/wireless_hackingl
ity/tp/wifisecurity.htm [7] IEEE 802 standards,
[3] S Vinjosh Reddy, K Rijutha, K SaiRamani, Sk http://standards.ieee.org/getieeeS02
Mohammad Ali, CR. Pradeep Reddy, " Wireless [8] WiFi -Windows,
Hacking A Wi-Fi Hack By Cracking WEP”, 201O
-
http://www.oxid.it (Cain & Able)
http://www.NetStumbler.com