Time
31 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hello. My name is Dustin, and welcome to wireless networks. Most wireless networks, um, with wife. I work in the 2.4 gigahertz range or the five gigahertz range, and are capable of ah, variety of different network speeds. You'll often see this in home environments, coffee shops and most public places
00:19
that offer WiFi and enterprise environments as well.
00:22
Some examples of common wireless protocols include the 802.11 b, which is probably one of the most prevalent. Still 802 11 g, which is a standard that improved upon the 802 11 be standard.
00:37
Then we've got 802 11 A, which started using the five gigahertz range
00:41
an 802.11 a C, which is a newer protocol finalized in 2013. And this is something you'll find in modern Cordless phones, laptops and smart TV's.
00:56
So the first type of attack on a WiFi network we're going to discuss is a man in the middle attack, and this is probably one of the most common attacks
01:03
in a man in the middle attack. An attacker works as the man in the middle of the network communication
01:10
This could be done in a couple of different ways, either close proximity to the target or with malware
01:17
evil. Twin attacks occur when an attacker spoofs illegitimate hosts like Starbucks WiFi and gets users to log into their hot spot versus the actual WiFi hot spot.
01:27
They can then intercept and modify any traffic that goes through them, stripping https and capturing credentials.
01:36
Another common attack you'll see in WiFi networks, especially public ones, are passive sniffing attacks, and attacker will connect to public WiFi
01:46
and then they, um oh, possible land as well. Then they can run a tool like wire shark to sniff or monitor all that traffic that's going through the network.
01:57
The last attack we're going to mention here and talk about a little more in detail. Um, just a couple slides is air crack N. G.
02:08
So there's a lot of different attacks on wireless networks. They need to protect yourself from the first things you want to do. This scarier WiFi, um, include
02:20
changing any default settings or passwords.
02:24
The first thing I do, any time I set up like a personal router or even ah, wireless Robert of business eyes change the default admin log in page to the router. Most newer routers usually prompt you to do this when you're setting it up.
02:38
When you do change that past, what do you want to use? A strong password or past phrase that isn't used anywhere else.
02:46
After that, the next thing I always do in setting up a personal wireless network is set the S Society, which is the network name Turnoff Broadcasting
02:55
and said a strong password or pass phrase with W P. A. To encryption.
03:00
Most modern
03:04
routers all use W p a two by default, but there are still a few that use Web weapon. It works can be cracked him as little as a few seconds up to maybe a few minutes. Um, I still see these networks all the time. People that have had their network set up for forever and just haven't updated anything.
03:23
Most of time are using
03:25
weapon EVP.
03:28
If you are still using that to protect your network, it's probably already owned.
03:32
Most newer wireless routers come with W. P s or Wife I protected setup, which allows users to configure their wireless networks without typing in the password every time. Instead they can enter a short pin to configure their devices.
03:50
It sounds convenient, but it's actually a pretty big security flaw. River is a
03:57
W. P s brute force, sir, and can discover most pins for these networks in less than 10 hours. Once it's got the pin, then it could discover the past phrase to both W p A and W P two networks. So it's recommended to disable W. P S on your router if it's possible.
04:15
And I say if it's possible because, unfortunately, some routers will not allow you to disable W. P s. Or even worse, you'll disable it in the router gooey.
04:28
But then you can scan for it. It's actually still on so it doesn't actually get disabled.
04:34
Security yourself on public networks can be relatively easy. First, if you're not planning on connected toe wife connecting toe WiFi,
04:43
turn the WiFi off on your phone
04:45
when your wife eyes on, it's always looking to connect to a network, and, um, usually previously known once was broadcasting out looking for those networks.
04:55
Next, if you are going to connect to a public network, always use a VPN. This will encrypt your traffic, helping to keep you safe
05:02
if you don't have to use the public. WiFi networks don't.
05:05
If you have to connect to a network,
05:08
don't do any business like banking or anything that you wouldn't want shared. It's probably okay to just be reading news, but you don't want anything. We're entering passwords or user names or any personal information.
05:20
It's probably not a bad idea to assume that network has already been compromised and someone is listening in.
05:28
Lastly, if you've got the band within data, use your phone is a hot spot and connect to it instead of using the public network. We talked about the attacks on lt and how they're usually a little more expensive and, ah, lot more difficult to do so you can use your phone is the hot spot with strong password
05:45
and protect yourself a little bit more and again. It's never a bad idea to combine all of these
05:50
protections with a VPN

Up Next

Wireless Network Fundamentals for Security Practitioners

In this course, the instructor covers the basics about wireless protocols which includes LTE, Bluetooth, Z-Qave, and zigbee. The instructor also goes more in-depth with Aircrack-NG by discussing the tools used to test the wifi networks, explaining how to install the tools on various OS, and demonstrating an Aircrack-NG lab.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor