Wireless Hacking Tools HTTP://WWW - Cse.wustl - Edu/ Jain/cse571-07/ftp/wireless - Hacking
Wireless Hacking Tools HTTP://WWW - Cse.wustl - Edu/ Jain/cse571-07/ftp/wireless - Hacking
edu/~jain/cse571-07/ftp/wireless_hacking/
Wireless Hacking Tools
Author: Michael Roche mroche@wustl.edu
Abstract:
This paper is a survey of wireless attack tools focusing on 802.11 and Bluetooth. It includes attack tools
for three major categories: confidentiality, integrity, and availability. Confidentiality attack tools focus on
the content of the data and are best known for encryption cracking. Integrity attacks tools focus on the
data in transmission and include frame insertion, man in the middle, and replay attacks. Finally,
availability attack tools focus on Denial of Service (DoS) attacks.
Table of Contents
1.0 Introduction
1.1 Wireless Attack Tools 2.0 Confidentiality Attacks
2.1 Confidentiality Attack Tools 3.0 Integrity Attacks
3.1 Integrity Attack Tools 4.0 Availability Attacks
4.1 Availability Attack Tools 5.0 Bluetooth Attacks
5.1 Bluetooth Attack Tools Summary References List of Acronyms
1.0 Introduction
There are three main principles to computer network security. They are confidentiality, integrity, and
availability. All three concepts are needed, to some extent, to achieve true security. Not using all three
concepts in the security of the network will leave it vulnerable to attacks. Attackers strive to compromise
one or more of the three main security principles. [1]
The basic definition of confidentiality is assuring that sensitive information will be kept secret and access
limited to the appropriate persons. In network security, confidentiality can be achieved with data
encryption. Data encryption scrambles plaintext data into unreadable cipertext data.
Integrity can be defined as unimpaired, complete, undivided, or unbroken. In network security this means
that the message has not been tampered. No portion of the message has been removed, rearranged, or
changed. The basic security measure to ensure integrity is to generate a cryptographic checksum of some
sort to guarantee the message is unaltered.
Finally, availability means that data should be accessible and usable upon demand by an authorized user
or process. An availability attack consists of some sort of Denial of Service (DoS) attack. A DoS attack
prevents the user or device from accessing a particular service or application.
1 of 12 12/19/2007 5:16 PM
Wireless Hacking Tools http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/
Having strong network security does not mean one can prevent the network from being attacked. It simply
means that the security mechanisms implemented are just that secure and have not been broken yet.
Computer and network security is constantly evolving. Strong security mechanisms must also evolve. As
older mechanisms are broken or cracked, new ones must be developed.
Summary
In this paper we discussed several attack tools for 802.11 and Bluetooth systems. Since both of these
protocols are a major part of everyday lives, many attack tools exist. The attacks can be categorized into
three major categories: confidentiality, integrity, and availability. Confidentiality attac ks include sniffing,
encryption cracking, and AP attacks. Integrity attacks include attacks on the data while in transmission.
This includes frame manipulation, addition, and subtraction. Finally, the availability attacks in all DoS
attacks.
Presented were wireless hacking tools and possible attacks on wireless networks. Although wireless
networks will probably never be completely secure because research on protocol vulnerabilities will
always continue, one can keep their network as secure as possible. Staying educated on the latest
encryption schemes and other network security related items is probably the best way to keep your
network secure. You will not be able to stop the sniffing of your traffic; however, you can prevent the
attacker from being able to decipher the traffic. The protocols
Wireless Hacking Tools http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/
will continue to evolve to keep unauthorized devices from connecting to a wireless network. However,
even the latest security methods have their weaknesses. For example, WPA2, the latest encryption
method, does not address the problem of dissociation and deauthentication attacks, but does address many
of the issues with WEP.
The attack tools are easy to obtain, easy to install, and have detailed web pages or forums that include
directions on how to obtain, install and use. Many of the tools are multi-platform which makes it even
easier to use. As the network security field grows in complexity, the attack tools will evolve.
Back to Table of Contents
References
These reference are ordered approximately in usefulness and relevance to this survey paper.
[1] "Wireless Attacks A to Z",
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1167611,00.html March, 2006
[2] "Top 5 Wireless Tools", http://sectools.org/wireless.html, 2006
[3] "The Top 10 Hacker Attack Tools",
http://www.thenetworkadministrator.com/2005tophackingtools.htm
[4] "Recon and Attack Tools", http://www.wi-foo.com/index-3.html
[5] "Wireless Attack Primer", http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html,
July 2004
[6] "AirSnort", http://airsnort.shmoo.com/, The Schmoo Group
[7] "AirCrack", http://www.wirelessdefence.org/Contents/AircrackMain.htm
[8] "Ettercap", http://ettercap.sourceforge.net/
[9] Song, D., "dsniff", http://monkey.org/~dugsong/dsniff/
[10] Combs, G., "Wireshark", http://www.wireshark.org/
[11] Moser, M., "Hotspotter - Automatic wireless client penetration",
http://www.remote-exploit.org/codes_hotspotter.html
[12] "APsniff", http://www.zdnet.de/downloads/prg/w/i/de0DWI-wc.html, April 2004
[13] "APhunter", http://www.attackprevention.com/article/aphunter-2618.html
[14] "KNSGEM", http://www.rjpi.com/knsgem.htm
[15] "HermesAP", http://hunz.org/hermesap.html
[16] "OpenAP", http://www.seattlewireless.net/OpenAP
[17] "OpenWRT", http://openwrt.org/
[18] "HyperWRT", http://hyperwrt.org/
[19] "Airpwn", http://airpwn.sourceforge.net/Airpwn.html July, 2006
[20] "File2air", http://www.wolfslair.nl/php/modules.php?name=News&file=article&sid=62
10 of 12 12/19/2007 5:16 PM