Skip to main content

Wi-Fi Overview & Vulnerabilities

Wi-Fi (or) IEEE 802.11 x


Overall study of Wi-Fi



What is it?


                It is a device which allows to connect to network through wireless medium. It Is also represented as IEEE 802.11 x. Where x can be a\b\g\n\ac. It is most widely used in mobile, tablets and even more…applications. The name WIFI was given for the branding and commercializing the device.

Who is responsible for this?


                IEEE is the Institute of Electrical and Electronics Engineers Who are maintaining the WIFI standards. They are also known as WIFI alliance. They are responsible for the introduction of new standard in the market.

Uses of Wi-Fi:

·         Mostly it is used to connect to the internet.
·         For general network connectivity.
·         For wireless display.
·         For remote control.
·         For media streaming .etc


Wi-Fi spectrum:


                Wi-Fi uses 2.4-2.5 GHz frequency spectrum. It has 14 channels which varies depending on your country. Among this 1,6,11 are non-overlapping and mostly preferred channels.
                The most modern Dual band WiFi operates on 2.4-5 GHz. It has more channels when compared to single band.

Risks:



1. WEP Encryption:

                Since this is the first commercial Wi-Fi encryption system. But it had a very bad security feature such as it could be cracked easily without any pain using the Offensive security tools. But currently not used but available.

2. WPS(Wi-Fi protected setup):

                This feature was included after 2000. But later found that It also has a security vulnerability. This made the possibility of breaking security within 3 hours Approx.(Possible using Reaver)

3. WPA/WPA2:

                This is the most advanced security encryption available now. It mainly facilitates breaking the wi-fi in passive mode(Without Accessing the AP). The WPA hand shake is noted and Brute force or Dictionary attack is made to break the key. This is just Bit strength VS Computing Power.

4. DeAuth Attack:

                This simply disconnects user from the AP till the attack continues. Nothing special with this.

5. Mac Address:

                The MAC address is a unique ID for each device which connects to network. This address is assigned by the device manufacturer. But they can be easily cloned to desired address.
                               

                                These are the major risks in WIFI devices. 


Still More stuffs will be posted in upcoming weeks....

Comments

Popular posts from this blog

One of the best Torrent caching service.

Hi readers, It's been a long time since I made my last post on this blog. That's due to the migration of the blog to private servers.  Today I found a decent torrent caching service, which I have been looking for years. Initially, when I started, I couldn't find the services are really benefiting me. So I went with my own Virtual Private Server in Digital Ocean. I ran a five dollar per month instance for my torrent caching as well as a multipurpose server.  Of course, It has its pros and cons.  Pros: I was able to do anything I wanted. It served as a good multipurpose server. Relatively inexpensive. Cons: You need to be a computer geek for up and running. Even most of the things are automated, still few manual works have to be performed. It takes usual time for downloading unlike caching services(They can do it instantly). Finally, we have a hassle free torrent caching service  Seedr .  It is a free torrent caching servic...

2-Dimensional Array with Dynamic Rows and Columns.

In Programming many times we have to store and work  with the data. But choosing the right way of storing is important. Array is one of the most simple and effective way of storing list of data.Now we have to multiple array of data. Ohh! that sounds easy we can use 2 Dimensional Array. I agree 2 Dimensional array is suitable but I have arrays of variable lengths. So simply creating 2-D Array will not be efficient because I have to specify the column size as the highest of my arrays. So there will be lot of unused space. The good solution can be Dynamic 2D Array with variable columns. Also Array of vectors can also be used. But we are not discussing about STL. Algorithm: Create a ptr to ptr to ptr with the name of your 2D Array to hold the Array of Pointers. Now create an Array of pointers depending on the no of rows and store the base address on the ptr to ptr. For every Row allocate the required memory and store the address in the array of pointers. You own the 2D...

Merge Sort Implementation in C++

For a Programmer sorting is an easy task after writing the code for couple of pages. But there are many other sorting algorithms.  The question which is not being properly answered is which sorting algorithm you should choose.  This is the most frustrating situation where we feel bad about us. The best sorting algorithm depends only on the scenario in which you are intended to use.  Let us speak about the Merge sort. Merge sort uses the divide and conquer approach. Entirely the merge sort is an easy algorithm (Depends on the way you think). You cannot master merge sort until you think what is happening. It has a good worst case performance (0(N logN)). It uses an additional space to accomplish the goal. The implementation is mainly based on the recursion.  You can get real performance benefit when comparing to bubble,selection sort. That's enough for the quick intro. If you would like you know more do a research on yourself. The algorithm goes like th...