Difference between revisions of "User:Scott/27"
Jump to navigation
Jump to search
Line 13: | Line 13: | ||
__TOC__ | __TOC__ | ||
− | + | =Cracker Objectives= | |
Enumerate hosts, services, application versions | Enumerate hosts, services, application versions | ||
Elevate privileges and disguise presence | Elevate privileges and disguise presence | ||
create a back door - a covert channel | create a back door - a covert channel | ||
− | + | ||
+ | =Defense Objectives= | ||
IDS Intrusion detection system | IDS Intrusion detection system | ||
Log Files - automated reporting system | Log Files - automated reporting system | ||
Minimized access== | Minimized access== | ||
Update patches and firmware | Update patches and firmware | ||
− | + | ||
− | + | =Hacker/Cracker tools= | |
− | + | ||
− | ==== | + | ==NetStumbler & Kismet Windows== |
− | + | scans 2.4 & 5 GHz frequency fro 802.11a, b & g ieee | |
− | SSID | + | |
− | Access Point | + | ==NetStumbler reports== |
− | + | *MAC address | |
− | + | *SSID | |
− | + | *Access Point Name | |
+ | *broadcast channel | ||
+ | *vendor name | ||
+ | *signal strength | ||
+ | *gps coordinates | ||
+ | |||
+ | ==Passive Scanning== | ||
+ | ===Beacon Frames=== | ||
+ | SSID | ||
+ | Access Point Time | ||
+ | Capabilities | ||
+ | Supported Rates | ||
+ | |||
+ | ===Client Passive listening=== | ||
+ | *connects to strongest channel with SSID it wants to connect too | ||
+ | |||
+ | ===Client Active Listening=== | ||
+ | Sends a probe request frame with a null SSID field | ||
+ | works when SSID broadcasting is disabled. | ||
+ | |||
+ | ==Kismet - packet analyzer for 802.11== |
Revision as of 15:01, 4 December 2011
Wireless Security -------------------------------- Home Page user:scott Home-22 user:scott/22 Printers user:scott/23 Network user:scott/24 Troubleshoot user:scott/25 Virus Scan user:scott/26 WiFi Secure user:scott/26 Active Dir user:scott/29
Cracker Objectives
Enumerate hosts, services, application versions Elevate privileges and disguise presence create a back door - a covert channel
Defense Objectives
IDS Intrusion detection system Log Files - automated reporting system Minimized access== Update patches and firmware
Hacker/Cracker tools
NetStumbler & Kismet Windows
scans 2.4 & 5 GHz frequency fro 802.11a, b & g ieee
NetStumbler reports
- MAC address
- SSID
- Access Point Name
- broadcast channel
- vendor name
- signal strength
- gps coordinates
Passive Scanning
Beacon Frames
SSID Access Point Time Capabilities Supported Rates
Client Passive listening
- connects to strongest channel with SSID it wants to connect too
Client Active Listening
Sends a probe request frame with a null SSID field works when SSID broadcasting is disabled.