Wireless network hacking: Difference between revisions

From OLPC
Jump to navigation Jump to search
mNo edit summary
No edit summary
Line 43: Line 43:
==Securing your network==
==Securing your network==
TODO
TODO

==References:==
http://www.wireshark.org/



[[Category:Security|Wireless network hacking]]
[[Category:Security|Wireless network hacking]]

Revision as of 10:13, 25 February 2008

  Please copy/paste "{{Translationlist | xx | origlang=en | translated={{{translated}}}}}" (where xx is ISO 639 language code for your translation) to Wireless network hacking/translations HowTo [ID# 111907]  +/-  

These techniques describe how to test wireless networks for security holes. It is very important to check if your network is vulnerable.

Check if the network has some form of security

If you can connect to the access point without any trouble, the network is not secured. Check the instructions at #Security your network.

Install security related software

First, you need to install some tools. Execute the following command in the terminal application:

 sudo yum install wireshark kismet aircrack-ng nessus bind-utils traceroute

Probably you should use:

yum install wireshark_gnome 

Collect Network data

See these for more info:

http://wiki.laptop.org/go/Wireless_Driver_README
http://wiki.laptop.org/go/88W8388
http://wiki.laptop.org/go/Wireless#Capturing_wireless_traffic_on_the_xo
http://dev.laptop.org/ticket/4805
http://lists.infradead.org/pipermail/libertas-dev/2007-July/000607.html
http://lists.infradead.org/pipermail/libertas-dev/2007-December/001003.html
http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Linux.Wireless.drivers.802.11ag.html


Cracking a WEP key

Follow the instructions at this page: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks


TODO: We should write a short distillation of that wiki here.

Cracking a WPA key

Execute the following command in the terminal application while there is a client succesfully connected to the wireless access point:

 aireplay -0 5 -a <AP MAC> -c <Client MAC> ath0

Cracking mesh networks

TODO

Securing your network

TODO

References:

http://www.wireshark.org/