Describe about the Report of Computer Security and Forensics Tools for Wireless Security.
This report about Wireless Security Cracking tools covers all the aspects related to it. The report covers various types of attacks related to wireless security such as Confidentiality attacks, Integrity attacks, Authentication attacks and Bluetooth attacks. There are some tools related to these attacks which have been explained separately in this report. In the end, various wireless security cracking tools have been compared. So, this report helps reader to get knowledge about various security cracking tools.
This report is an analysis of wireless attack tools which emphasize mainly on 802.11 networks and Bluetooth. In this four types of attacks are included which are Confidentiality, Integrity, Authentication and Bluetooth. Confidentiality attack tools emphasize on the type of data and known for cracking the encryption. Integrity attack tools mainly emphasize on the data which is in transmission and in this, frame insertion, main in the middle and replay attacks are included. Authentication attach tools emphasize on crackin the authenticity of the data i.e. cracking the passwords, crackin the keys and credentials. Last but not the least, Bluetooth attack tools focus on attackin the Bluetooth devices and attempt to steal the information from the device with the help of Bluetooth connection. So, various hacking and cracking tools used for these purposes are discussed in this report. The tools have been compared on the basis of its purposes, availability, encryption type, authentication type, and data integrity type.
Usually, Wireless networks come with a great security such as Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). Wireless Security is must to ensure confidentiality, privacy, availability, authenticity and integrity of the data. There are some kinds of attack which attack on the security of wireless networks are as follows:
These are the types of attacks which attempt to intercept the confidential or private data over wireless networks.
These are the types of attacks which try to send fraudulent control, data frames so that recipient gets mislead.
These attacks are basically used by the intruders for stealing the identities and credentials of users so that they could access private networks.
Nowadays, attacks on Bluetooth are also emerging with growing popularity of Bluetooth devices. Bluetooth attacks are DoS, Bluesnarfing and Bump attack.
In Bluetooth DoS attack, a device is involved which is not a part of piconet interrupting the existing piconet of other devices. Bluesnarfing is an attack in which an attacker might get unauthorized data with the help of Bluetooth Connection. In Bump attack, attacker sends a request to the victim for accepting the connection for data transfer like photos, calendar notice or contacts on a PDA. Once the data is sent, attacker does not close the connection i.e. keeps the connection open due to which attacker is allowed for requesting key regeneration even after the victim deletes the pairing between them. Once the attacker is done with key regeneration, he/she may be able to access all the services of victim’s device.
To attacks on Security of Wireless Networks, some tools have been built up which try to crack the security of networks. Some of tools have been developed for compromising with 802.11 networks. Therefore, these kinds of tools are known as Wireless Security Cracking Tools.
Wireless Security Cracking Tools have been categorized as follows:
Eavesdropping is an attack to intercept the real-time private communication such as instant messages, phone calls, or videoconferences. Tool used for such attack is Wireshark which is used to display the network traffic of both wireless and wired networks. This tool is used to show the captured data in an easy way so that anyone could read and follow it easily.
An encryption key cracker is a tool which is used to crack the encrypted information. There is a tool called AirSnort for WEP and AirCrack for WPA.
Airpwn is a kind of wireless attack tool for packet injection of 802.11. File2air is also a similar type of tool but using this tool, user is allowed to specify an amount of injected packets. There is one more tool called as AirJack which is used to run the actual frame injection.
Simple replay is an attack tool which allows for 802.11 packets which had been captured to be injected back into the network. Frame injection and frame relay attacks tools are the tools which attack directly on the integrity of data.
Few of the availability tools are similar to those listed in the integrity attack tools because most of the attacks are similar in both availability and integrity.
But there are some specific tools which are used to attack availability because few of the attacks on availability are different from that of integrity.
FakeAP is one of the flooding attack tools which are used for generating thousands of 802.11.
With the growing demands of Bluetooth devices, risk associated with Bluetooth i.e. attacks on Bluetooth are also growing. A BlueSmack tool is used for launching the ping of death attack on Bluetooth devices. This tool requests thousands of echoes from a Bluetooth devices and then the device gets unable to do anything only the echoes are returned which causes Denial of Service (DoS).
BlueChop and BluePass are also attacks tools for DoS. BlueChop is used to interrupt the existed piconet. BluePass attack tool is used for creating Bluetooth packets so that buffer overflow attack is caused.
This tool is basically a confidentiality attack tool which is also known as Ethereal and considered as the most powerful tool in network analysis toolkit. It works as a network packet analyzer which is peered inside the network and used to analyze the details of traffic at various levels. This tool is free of cost. It is much easier to install this tool. It can run on various platforms such as Windows, Macintosh OS X, Unix/Linux or any other operating systems.
Ettercap is a free and open source tool which is used to launch the Man-in-Middle Attacks. This tool is used for the analysis of network and security auditing. It is run on various operating system platforms such as Linux, Windows, Mac OS, and BSD. Ettercap attack tool sniffs the captured passwords and network traffic.
Aircrack is a very famous tool developed by Thomas d’Otreppe de Bouvette and used for cracking the passwords of wireless networks. This tool is basically used as 802.11 WPA-PSK and 802.11 WEP keys cracking tools across the world. Firstly, this tool captures the network packets and then it attempts to crack the password by analyzing those packets. This tool is considered as the most powerful tool. In this tool, a console interface is offered. It can be run on various operating systems such as Linux, FreeBSD, OS X, OpenBSD and Windows. It is free of cost and can be downloaded from the internet.
Fern Wi-Fi Tool is also one of the best tools which are used for network security. It is used to identify real time network traffic and hosts. The purpose of development of this tool was to identify flaws in computer networks and then fixing them. This tool can run on Apple, Windows and Linux Operating system platforms. With the help of this tool, WEP/WPS/WPA keys can be cracked very easily. Since this tool is in active development, one can get updates of new features on regular free. This tool has free access for a very limited period i.e. for 7 days, after that user has to purchase it for some cost.
WepAttack is an open source tool for Linux for cracking the 802.11 WEP keys. This tool works by performing an active dictionary attack by doing test on millions and millions of words to find the working key of the network. To work with WepAttack, only a working WLAN is required. This tool runs on the Linux operating system platform. The software is free of cost and licensed under the GNU General Public License as published by the Free Software Foundation, either version2 or any latest version.
CloudCracker tool is an online password cracking tool for hacking the password of WPA protected wi-fi networks. This tool is used for hacking the various password hashes. Working of the tool is very easy. One is require to upload the handshake file, enter the name of network and start the tool. The tool may contain large dictionary of around 300 million words for performing dictionary attacks. To access this tool, one has to visit its official website which is www.cloudcracker.com. There is no need to download any software to access the tool. So, it is one of the simpler and easier attack tool.
Wireshark |
Aircrack |
Ettercap |
Fern Wi-Fi cracking tool |
BTCrack |
|
Purpose |
This tool is used to see what is going on in network at a microscopic level. |
The purpose of the tool is to crack the password of wireless networks. |
The purpose of this tool is to analyze the network and for security auditing. |
In Fern Wifi Cracking tool, the purpose is to identify the real time network traffic and hosts. |
BTCrack is a Bluetooth pin and LINK-KEY cracker. Its purpose is to reconstruct the PIN and LINKEY with the data which is sniffed during a pairing exchange. |
Encryption Type |
SSL |
For Encryption OPN: no encryption, WEP: WEP Encryption, WPA or WPA2: WPA or WPA2 Encryption. |
SSL |
WPA |
No Encryption |
Authentication Type |
WEP, WPA/WPA2 |
SKA (shared key for WEP), or OPN (open for WEP). |
RSA |
WEP, WPA, WPA2 |
Calculated Pin is used to authenticate in a Pairing Mode. |
Data Integrity |
CRC32 checksum |
CRC32 checksum |
Checksums |
Not present |
Not present |
Conclusion:
In this report, various attack tools and attacks on the wireless security networks were discussed. Attacks usually occur on 802.11 networks and Bluetooth devices. Because Bluetooth and 802.11 networks are being used so widely these days, therefore there are many various types of attack tools which exist for the Bluetooth and 802.11 networks. Confidentiality attacks are comprised of encryption cracking, sniffing and AP attacks. Integrity attacks are comprised of the attacks which occur on data when the data is used to be in transmission.
These attack tools can easily be installed and there are many web pages or forums which act as tutorial to guide on how to use these tools. Many of them are multi-platform i.e. they can run on various operating systems.
References:
Roche, M. (2007). Wireless Hacking Tools. 1st ed. [ebook] .cse.wustl.edu. Available at: https://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking.pdf [Accessed 10 Jul. 2016].
Chia, T. (2012). Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog. [online] Security.blogoverflow.com. Available at: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/ [Accessed 10 Jul. 2016].
Rensburg, J. and Irwin, B. (2006). WIRELESS SECURITY TOOLS. 1st ed. [ebook] citeseerx.ist.psu.edu. Available at: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.916&rep=rep1&type=pdf [Accessed 10 Jul. 2016].
Sukhija, S. and Gupta, S. (2012). Wireless Network Security Protocols A Comparative Study. 1st ed. [ebook] International Journal of Emerging Technology and Advanced Engineering. Available at: https://www.ijetae.com/files/Volume2Issue1/IJETAE_0112_61.pdf [Accessed 10 Jul. 2016].
Sites.google.com. (n.d.). Confidentiality Attacks and Countermeasures – PCcare. [online] Available at: https://sites.google.com/a/pccare.vn/it/security-pages/confidentiality-attacks-and-countermeasures [Accessed 10 Jul. 2016].
InfoSec Resources. (2015). 13 Popular Wireless Hacking Tools – InfoSec Resources. [online] Available at: https://resources.infosecinstitute.com/13-popular-wireless-hacking-tools/ [Accessed 10 Jul. 2016].
InfoSec Resources. (2016). 20 Popular Wireless Hacking Tools [updated for 2016] – InfoSec Resources. [online] Available at: https://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/ [Accessed 10 Jul. 2016].
Chapple, M. (2008). Wireshark tutorial: How to sniff network traffic. [online] SearchSecurity. Available at: https://searchsecurity.techtarget.com/tip/Wireshark-tutorial-How-to-sniff-network-traffic [Accessed 10 Jul. 2016].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download