Warwalking - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Warwalking

Description:

Scratch built Famous Grouse Whiskey Tin Cantenna. http://flakey.info/antenna/waveguide ... 135 C&C controlled 'University of Washington' nodes. Over 33 default ... – PowerPoint PPT presentation

Number of Views:63
Avg rating:3.0/5.0
Slides: 12
Provided by: rmlins
Category:

less

Transcript and Presenter's Notes

Title: Warwalking


1
Warwalking
  • Lucas Jeff
  • Jon Leah
  • Kevin Oleg

2
Tools of the wardriver
  • Netstumbler
  • Identify SSID, MAC
  • Airsnort
  • Linux based
  • Kismet/KisMAC
  • Builtin WEP cracking
  • Prismdump
  • Use to capture packets
  • Wepcrack

3
Software we used
  • Netstumbler v 0.3.30
  • www.netstumbler.com
  • Cisco Aironet Client Utility V6.0
  • http//tinyurl.com/u0pr

4
Hardware we used
  • Notebook Fujitsu S-4572
  • Cisco 350 LM
  • Standard Type II PC card with RF connectors
  • 100mW
  • Antenna 1
  • Pacific Wireless PAWVA24-16  16dBi
  • http//www.pacwireless.com/html/vagi_series.html
  • Antenna 2
  • Scratch built Famous Grouse Whiskey Tin Cantenna
  • http//flakey.info/antenna/waveguide/

5
Where we went Night 1
6
Where we went Night 2
7
What we found
  • 114 AP Night 1
  • 280 AP Night 2
  • 339 TOTAL UNIQUE Access points
  • 235 nodes have no encryption
  • 135 CC controlled University of Washington
    nodes
  • Over 33 default SSID

8
Why this is not good
  • 339 access points that need to be managed.
  • No oversight.
  • Not easy to track down a user.
  • Session hijacking
  • The UW has no policy on wireless networking
  • Informal recommendation to consult CC
  • www.washington.edu/computing/wireless
  • Faculty and departments can install their own
    hardware

9
How to increase security at UW
  • Tunnel traffic
  • Set policy to prohibit use of sensitive
    applications on wireless networks
  • Identify and remove rogue nodes
  • Turn off unsecured nodes when not in use
  • Educate Admins Users

10
How you can increase security
  • Encrypt everything
  • Tunnel your traffic as well as use secure apps
    (ssh, ssl, etc)
  • Do not transfer sensitive data on wireless
    networks

11
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com