Professional Documents
Culture Documents
IP SPOOFING
A technical seminar report Submitted in partial Fulfillment of the requirement for the Degree of Bachelor of Engineering under BPUT
Submitted by
Chiranjeev kumar
Regd. No. : 0801215343 Year : 2011-2012
ABSTRACT
If we have a computer network in our home or office, there are several different ways to connect the computers together. Wi-Fi is the wireless way to handle networking. It is also known as 802.11 networking or wireless networking. The big advantage of Wi-Fi is its simplicity and inexpensive. We can connect computers anywhere in our home or office without the need for wires. The computers connect to the network using radio signals and computers can be up to 100 feet or so apart.
Wi-Fi stands for Wireless Fidelity. It is used to define any of the wireless technology in the IEEE 802.11 specifications. Wi-Fi is a brand originally licensed by the Wi-Fi Alliance which is a body responsible for promoting the term and its association with various wireless technology standards.
Wi-Fi was intended to be used for mobile devices and LANs, but is now often used for internet access. It enables a person with a wireless-enabled computer or personal digital assistant (PDA) to connect to the internet when in proximity of an access point. Wi-Fi also allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other.
Certificate
This is to certify that
Chiranjeev kumar
Technology,
Technology,
bearing Regd. No. : 0801215343 student of 7th semester, Branch: Information Eastern Academy of Science
and
IP SPOOFING
This is required for the fulfillment of Bachelors Degree in Information Technology underBPUT. GUIDED BY:
SEMINAR-IN-CHARGE
H.O.D
ACKNOWLEDGEMENT
I am heartily thankful to the Authority of my college and Information Technology Department for permitting me to undergo this useful and interesting seminar on the topic of IP SPOOFING. This topic mainly deals with the effects of technology in each and every individuals life, society and nation and its consequences.
I am grateful to H.O.D .......................................................and my seminar guide.& all faculty members of Information Technology who had given valuable guidance throughout the study of this topic. They not only supervised and guided the work but also were instrumental in creating an urge and insight necessary for this seminar.
CONTENTS
1. Introduction 2. Wi-Fi Technology 3. Wi-Fi Topology 4. Wi-Fi Architecture 5. Elements of Wi-Fi Network 6. How a Wi-Fi Network Works 7. Wi-Fi Applications 8. Wi-Fi Security Threats 9. Wi-Fi Security Techniques 10.Advantages 11.Limitation 12. Conclusion 13. Reference
INTRODUCTION WI-FI
Wi-Fi is acronym for wireless fidelity. Wi-Fi (also Wi-Fi, wifi, etc.) is a brand originally licensed by the Wi-Fi Alliance to describe the underlying technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications. Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. It was developed by Kye Brown to be used for mobile computing devices, such as laptops, in LANs, but is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions and DVD players, or digital cameras. More standards are in development that will allow Wi-Fi to be used by cars in highways in support of an Intelligent Transportation System to increase safety, gather statistics, and enable mobile commerce. The term Wi-Fi is a play upon the decades-old term Hi-Fi. Hi-Fi stands for High Fidelity Hi-Fi is a quality standard that means the reproduction of sound or images is very faithful to the original. The term High Fidelity is applied to any reasonable quality home music system. A person with a Wi-Fi enabled device such as a computer, cell phone or PDA can connect to the Internet when in proximity of an access point. Wi-Fi also allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other.
The standards 802.11b and 802.11g are used in the majority of commercial Wi-Fi devices. Both of these standards operate in the 2.4GHz band, and the only major difference between the two is the transfer rate.
I. IEEE 802.11b
Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) 100 -150 feet range Pros of 802.11bLowest cost, signal range is best and is not easily obstructed. Cons of 802.11bSlowest maximum speed; support fewer simultaneous users; appliances may interfere on the unregulated frequency band.
III.IEEE 802.11g
Introduced in 2003 Combine the feature of both standards (a,b) 100-150 feet range 54 Mbps Speed 2.4 GHz radio frequencies Pros of 802.11gFastest maximum speed; supports more simultaneous users Cons of 802.11gCosts more than 802.11b; appliances may interfere on the unregulated signal frequency.
WI-FI TOPOLOGY
WI-FI ARCHITECTURE
The typical Wi-Fi architecture shown below.
A typical Wi-Fi setup contains one or more Access points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier,
"Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at least 1 Mbit/s. based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to. The Wi-Fi standard leaves connection criteria and roaming totally open to the client.. Since Wi-Fi transmits in the air, it has the same properties as a non-switched Ethernet network.
10
Wi-Fi cards - They accept the wireless signal and relay information. They can be internal and external. (E.g. PCMCIA Card for Laptop and PCI Card for Desktop PC) Wireless router-The centerpiece product of many home computer networks is a wireless router. These routers support all home computers configured with wireless network adapters (see below). They also contain a network switch to allow some computers to be connected with Ethernet cables. Wireless routers allow cable modem and DSL Internet connections to be shared.
Belkin router
Wireless adapter- A wireless network adapter allows a computing device to join a wireless LAN. Wireless network adapters contain a builtin radio transmitter and receiver. Each adapter supports one or more of the 802.11a, 802.11b, or 802.11g Wi-Fi standards.
11
Install the drivers for the card Find an 802.11 hotspot. Access the hotspot. Hotspot: a connection point for a Wi-Fi network. It is a small box that is hardwired into the Internet. The box contains an 802.11 radio that can simultaneously talk to up to 100 or so 802.11 cards.
WI-FI APPLICATIONS
I. At home.
13
Eavesdropping o Easy to perform, almost impossible to detect. o By default, everything is transmitted in clear text Usernames, passwords, content ... No security offered by the transmission medium o Different tools available on the internet Network sniffers, protocol analysers . . . Password collectors o With the right equipment, its possible to eavesdrop traffic from few kilometers away.
14
Man-In-The-Middle Attacks
o Attacker spoofs a disassociate message from the victim. o The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real APs MAC address. o The attacker connects to the real AP using victims MAC address.
15
Denial of Service o Attack on transmission frequency used. i. ii. Frequency jamming Not very technical, but works
o Attack on MAC layer i. Spoofed deauthentication / disassociation messages ii. can target one specific user o Attacks on higher layer protocol (TCP/IP protocol) i. SYN Flooding
16
WI-FI SECURITY
(i) The requirements for Wi-Fi network security can be broken down into two primary components:
(ii)
(iii)
Privacy
Authentication
I.
II.
III.Risk: Data (username & password) send before secure channel established. Prone to passive eavesdropping by attacker
17
V. Server Authentication Digital Certificate is used. Validation of digital certificate occurs automatically within client software.
SSID is used to identify an 802.11 network It can be pre-configured or advertised in beacon broadcast It is transmitted in clear text. Provide very little security
18
Provide same level of security as by wired network. Original security solution offered by the IEEE 802.11 standard. Uses RC4 encryption with pre-shared keys and 24 bit initialization vectors (IV). Key schedule is generated by concatenating the shared secret key with a random generated 24-bit IV (initialization vectors). 32 bit ICV (Integrity check value). No. of bits in key schedule is equalto sum of length of the plaintext and ICV (Integrity check value). 64 bit preshared key-WEP 128 bit preshared key-WEP2 Encrypt data only between 802.11 stations. Once it enters the wired side of the network (between access point) WEP is no longer valid Security Issue with WEP Short IV(initialization vectors). Static key Offers very little security at all.
19
Designed as a general purpose network access control mechanism. a. Not Wi-Fi specific Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet). Authentication is done with the RADIUS server, which tells the access point whether access to controlled ports should be allowed or not. AP forces the user into an unauthorized state. User sends an EAP start message. AP returns an EAP message requesting the users identity. Identity send by user is then forwarded to the authentication server by AP. Authentication server authenticate user and return an accept or reject message back to the AP. If accept message is return, the AP changes the clients state toauthorized and normal traffic flows.
20
21
i)
WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system.
ii)
(i)
(ii)
Denial of Service
b. As a security precaution, if WPA equipment sees two packets with invalid. MICs within a second, it disassociates all its clients, and stops all activity for a minute.
22
IEEE 802.11i
(i)
(ii)
Authentication a. 802.1x
(iii)
(iv)
Secure fast handoff-This allow roaming between APs without requiring client to fully reauthenticate to every AP.
(v)
ADVANTAGES
(i) It facilitates mobility.
(ii)
Ease of Installation.
(iii)
High flexibility.
(iv)
(v)
(vi)
23
(ix)
Speed is very high it is even faster than the fastest cable modem connected to your personal computer.
LIMITATIONS
(i)
(ii)
Degradation in performance.
(iii)
(iv)
Limited range.
24
CONCLUSION
It is just the beginning of Wi-Fi. We are starting to see the next phase of the Wi-Fi movement. So Wi-Fi is expected to become an even bigger and hotter technology for both home and businesses in the years to come. We can soon expect Wi-Fi networks to emerge in urban areas providing coverage throughout the central city, lining major highways, and giving travelers network access anytime , anywhere. .Wired vs. Wireless Wired Wireless Installation moderate difficulty easier, but beware interference Less More Cost reasonably high Reliability High Good Performance very good reasonably good reasonably good Security Limited outstanding Mobility If we are very cost-conscious, need maximum performance of your home system, and don't care much about mobility, then a wired Ethernet LAN is probably right for us. If on the other hand, cost is less of an issue, we like being an early adopter of leading-edge technologies, and we are really concerned about the task of wiring our home or small business with Ethernet cable, then we should certainly consider a wireless LAN. Any PC brought in a year becomes the hub of a wireless network. An estimated 99 million people with Wi-Fi by 2006 according to Gartner. Wires may soon be power alone.
25
REFERENCE
1. http://compnetworking.about.com 2. http://www.tcil-india.com 3. www.nbc4i.com/technology 4. http://computer .howstuffworks.com 5. http://www.crutchfieldadvisor .com 6. http://en.wikipedia.org/wiki/Wi-Fi
26