个人照 |
团体照片 |
趁空档时间,忙着补妆~ |
All about SanSan personal life.
个人照 |
团体照片 |
趁空档时间,忙着补妆~ |
南怡岛 |
昌德宫后苑 |
昌德宫后苑 |
爱宝乐园 |
东大门玫瑰花海 |
爱宝乐园夜景 |
汝矣島漢江公園 |
南山塔 |
梨花壁画 |
大包小包 |
战利品 |
來源:網路 |
Today, Mr Zaki will show us how to hack the wireless in the lab. At the beginning, we have to detect the DLink wireless by using our own laptop because PC at lab does not provide the wireless driver. We need to connect it and the password is given as”1a2b3c4d”. The tools that will be use to hack wireless is wireless NIC(USB) and also backtrack either backtrack 2 or 3 or 4.
Firstly, we using command prompt to login with the username is “root” and the password is “toor”. Next, Mr. Zaki gave us a link and we download backtrack from www.remote-exploit.org/backtrack.html. We type “ipconfig” to know whether the network card can be used then type “iwconfig” to know whether the wireless network card can be used.
The real key is set on the wireless access point, 24 key is given by the IV and 40 key is given by us. To know it has been switch on, we need to type “ipconfig” then type “ iwconfig rausb0 mode monitor” following by “iwconfig”. We will see the Mode: Monitor”. After that, we start the backtrack and plugin USB.
Besides that, we use “kismet” to scan the wireless. Thus, we can get all the information of D-Link. In command prompt, we type “s” for sorting and “b” is for sorting according to BSSID. At this moment, we need an encryption key. We use airodump to cache the packet and save it in some path. Type “ airodump –ng –ivs –w output –abg rausb0” where the “output” is the filename and rausb0 is the wireless network card.
After that, type “aireplay-ng -3 -b 00:1E:58:FB:57:ED -h 00:22:6B:A9:59:AF -x 1024 rausb0” where the first address is the MAC address, the second address is local MAC address. If we send a lot of packet, then it will send back response.Next, Type 'aircrack-ng -0 -n 64 -f 4 output-06.ivs' where 'output' is the file name, this command is to use to get the password.
At the end of this lab, I have learnt how to hack the wireless password. But Mr Zaki advice us do not use in a wrong way.
Lecture today was talked about Legal & Ethical. Law is a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority. Law implies imposition by a sovereign authority and the obligation of obedience on the part of all subject to that authority. Ethics is a set of moral principles or values, the principles of conduct governing an individual or a group. Besides that, ethics is an objectively defined standard of right and wrong. The categories of law are civil law, criminal law, tort law. The categories of laws that affect the individual in the workplace are private law and public law.
The differences between laws and ethics are as below:-
LAW | ETHIC |
Interpreted by courts | Described by unwritten principles |
Established by legislature representing everyone | Interpreted by individuals |
Applicable to everyone | Presented by philosophers, religions, professional group. |
Priority determined by courts if two laws conflict | Personal choice |
Enforceable by police and courts | Priority determined b individual if two principles conflict. |
Formal, documented | |
Ethics concepts in information security are ethical differences across cultures, software license infringement, illicit use, misuse of corporate resources, ethics and education, deterrence to unethical and illegal behavior, three general categories of unethical and illegal behavior which are ignorance, accident, and intent, deterrence is also an ethics concept in information security.
There are three common used ways to provide protections by laws which are copyright, patent, trade secret. Copyrights is designed to protect the expression of ideas, applies to a creative work such as a story and song, intended to allow regular and free exchange of ideas, must apply to an original work and it must be in some tangible medium of expression, to cover works in the arts, literature and written scholarship. Besides that, Patents applies to the result of science, technology and engineering. Patent can protect a “new and useful process, machine, manufacture or composition of matter”, designed to protect the device or process for carrying out an idea, not the idea itself. Moreover, Trade Secret must be kept a secret. The owner must protect the secret by any means, such as by storing it in a safe, encrypting it and by making employees sign a statement that they will not disclose the secret. Trade secret protection can also vanish through reverse engineering.
Rights of employees and employers are ownership of a patent, ownership of a copyright, work for hire, licenses, trade secret protection, and employment contracts. A computer can be attacked, used to attack, and used as a means to commit crime. Computer crime is hard to prosecute because low computer literacy (lack of understanding), no physical clues (lack of physical evidence), intangible forms of assets, considered as juvenile crime, lack of political impact.
In this lecture, Mr Zaki gave us an assignment about the cyber laws. So, we need to finish our assignment and present when next week.
This lecture was talked about the wireless security. IEEE ratified 802.11 in 1997 and also known as Wi-Fi. 802.11 focus on Layer 1 & Layer 2 of OSI model which are physical layer data link layer. The wireless IEEE 802.11 standard offers two modes of operation for a wireless network; the Ad-Hoc mode and the Infrastructure mode. Infrastructure mode is used to connect computers with wireless network adapters, also known as wireless clients, to an existing wired network with the help from wireless router or access point. Ad hoc mode is used to connect wireless clients directly together, without the need for a wireless router or access point. An ad hoc network consists of up to 9 wireless clients, which send their data directly to each other.
For RTS / CTS, it is used to handle hidden nodes, sending station sends, access point responds with “Clear to Send”. Besides that, RTS / CTS is only used for larger pieces of data when retransmission may waste significant time. 802.11b is an extension to 802.11 that applies to wireless LANS and provides 11 Mbps transmission with a fallback to 5.5, 2 and 1-Mbps in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b was 1999 ratification to the original 802.11 standard, allowing wireless functionality comparable to Ethernet. In the other hand, 802.11a is an extension to 802.11 that applies to wireless LANs and provides up to 54-Mbps in the 5GHz band. 802.11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS. For 802.11g, it is applies to wireless LANs and is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands.
Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. For OSA to work, the service set identifier (SSID) of the computer should match the SSID of the wireless access point.Access points have Access Control Lists (ACL). ACL is list of allowed MAC addresses but MAC addresses are sniffable and spoofable.
Mr. Zaki had explained the three basic security services defined by IEEE for the WLAN environment in 802.11 wireless LAN are authentication, integrity, and confidentiality. Besides that, there are 2 security services are provided in 802.11b which are authentication included Shared Key Authentication and Encryption included Wired Equivalence Privacy. Moreover, RC4 is Ron’s Code number 4 that can use key sizes from 1 bit to 2048 bits.RC4 will generates a stream of pseudo random bits.
Wired Equivalent Privacy (WEP) is a security protocol for Wi-Fi networks. WEP was designed to provide the same level of security that a wired network provides. It provides security by encrypting data over the radio waves. For example, in order to have a more secure Wi-Fi network connection, it's important to enter a WEP key to protect your data. There are some WEP Security tools such as AirSnort and WEPCrack. AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11 WEP networks. AirSnort operates by passively monitoring transmissions and computing the WEP encryption key when enough packets have been gathered. Furthermore, WEPCrack is a tool that cracks 802.11 WEP encryption keys by exploiting the weaknesses of RC4 key scheduling.
In the end of this lecture, Mr. Zaki said he will show us how to hack the wireless in the tomorrow lab. It is just a demo and he hopes us do not use abuse.