Introduction to Wireless LAN (WLAN)
Wireless LANs are often also called the Wireless Network or Wireless network. Wireless Local Area Network (WLAN) is a computer network that uses radio waves as transmission media. In this case means that the information / data is transferred from one computer to another using radio waves.
It all started from bermunculannya equipment based radio (walkie talkies, cordless phones, phone, etc. ..). From this came the idea to make computers as easy to carry something that can be used anywhere when needed. Things like this is what finally pushed the development for tecnology wireless computer networks.
HISTORY WLAN
1997. An independent agency called the IEEE to make specifications / standards of the first WLAN-coded 802.11. Appropriate equipment 802.11 standards work at a frequency of 2.4 GHz, and the data transfer speed (throughput) theoretical maximum of 2Mbps. But unfortunately, the equipment following the 802.11 specification is less acceptable in the market. Throughput of this magnitude are considered inadequate for multimedia applications and other heavy applications.
IEEE re-issued a new specification called 802.11b. Theoretical data transfer speed maximum that can be achieved is 11 Mbps. The speed of data transfer is comparable to traditional Ethernet (IEEE 802.3 10Mbps or 10Base-T). Tools that use the 802.11b standard works on the 2.4 Ghz frequency. But there are still flaws in wireless devices that work on this frequency is the possibility of interference with other devices that use radio waves at the same frequency.
At the almost same time, the IEEE 802.11a specification then made using different techniques. 5GHz frequencies used, supporting a theoretical data transfer speeds up to 54Mbps. However, the radio waves emitted by the 802.11a equipment is relatively difficult to penetrate barriers such as walls and so forth. Range of radio waves were relatively shorter than 802.11b. Technically, the 802.11b is not compatible with 802.11a. But it's been quite a lot of hardware manufacturers that make equipment that supports both these standards.
IEEE create a new specification that can combine the advantages 802.11b and 802.11a. This new specification coded 802.11g, works at a frequency of 2.4 GHz with a theoretical data transfer speeds up to 54Mbps. 802.11g equipment is compatible with 802.11b, so interchangeable.
Threats that may Happen
Every new technology is discovered, there is always a threat that arises. This is not inevitable. So also in the WLAN. Here are the threats that arise mungking.
Identity Theft
Use ADDRESS MAC (Media Access Control) to determine which machine is entitled to a connection from the wireless network had long since done. However, can not be denied, it is actually really does not provide meaningful protection in a computer network anywhere.
Intruders could commit identity theft with the Mac Address spoofing technique to double the SSID (Service Set Identifier) and the MAC Address of a network access PIN. Intruders can use the SSID and MAC from another computer to do things that harm tinadkan (such as bandwidth theft).
While yet a network has been equipped with data encryption or VPN (Virtual Private Network), the MAC address can still be traced and in-spoof. Information about the MAC address can be obtained from a program like Kismet. To commit identity theft, intruders will use spoofing program or change it via the Registry (Windows).
Man-in-the-Middle
Actually this is sebuatn for the intruder. Attack Man-in-the-Middle trick performed with a VPN connection between the official user's computer and access point by entering another computer in between as a provocation. This type of attack is similar to the type of attack on the cable network. The program used is the same, except wirelessnya device. By using a program, intruders can position yourself between the data communications traffic in wireless networks.
This attack is easy to do with the help of appropriate software, such as Wireless LANJack or AirJack. However, this type of attack is also relatively easily prevented with a reliable IDS is capable of monitoring 24 hours a day.
Denial of Service (DoS).
this is the most feared attack by the Admin. Denial of service is relatively difficult to prevent. These attacks can cause downtime on the network. Free tools such as Wireless LANJack and capable hunter_killer this attack. This attack could be directed at a normal user so that user can not connect with an access point. The aim is none other than that there is no user who can use network services Due to the chaos of traffic data (service denial).
An intruder could trick the Extensible Authentication Protocol (EAP) to perform DoS attacks against a server. This action coupled with the conduct of data flooding. Thus, no single user can connect to the network service.
Network Injection.
Aapbila an access point connected to the network that is not filtered properly, then the intruder has the potential to take action boardcast ï ¿½ such as spanning tree (802.1D), OSPF, RIP, and HSRP. In this condition, then all network devices will be busy and can no longer working properly. Routing attack is also included in this type of attack. The intruder can do this easily using such IRPAS program, which is used to perform injection routing update data on the network, change the gateway, or delete the existing routing table.
Secure Your Wireless Network!
The following solutions are not going to make your network 100% secure. Remember the words of the classic ... the world is not perfect, nothing is ever 100% secure! The following things will only minimize the potential for attacks that damage your network.
1. Change the Default Password Access Point. Many of the attacks that happened was because everything was left at the default settings, including passwords. Most attackers will usually berfikiran this one thing, which is hoping that the target has not changed the defaul password Access Point.
2. Change the default IP. In the past this is less possible to do. But this is much dewaas brands Access Point that has this facility.
¼ br> 3. Turn on encryption methods. Use WPA encryption with a Pre Shared Key (WPA-PSK). Give the password is also "safe", in the sense that is difficult to guess and do not have meaning. You also can use WPA encryption with Temporal Key Integrity Protocol.
4. Disable SSID Broadcast function. Thus, the SSID will not be in the process terdeksi War Driving. But .. The bad news (or good news??), currently there are already some applications that can scan menditeksi SSID terhidden. Yeah, however you can still protect the SSID name by changing the default SSID SSID name is difficult to predict.
5. Use MAC Address Filtering. This is useful for reducing penysupan activity.
6. Non Enable DHCP. Use Static IP with values rarely used.
7. Use additional security such as CaptivePortal or other applications that inject the firmware on the Access Point.
8. Use software such as Mc Afee Wireless Home Security to conduct Monitoring via Access Point Client.
Terms
1. Wi-Fi or WiFi (Wireless Fidelity)
Wi-Fi or is another name given to products that follow the 802.11 specification. Most computer users more familiar with the term Wi-Fi card / adapter, compared with 802.11 card / adapter. Wi-Fi is a trademark, and is more popular than the word ¿½ ï ¿½ 802.11ï IEEE.
2. Channel
Frequency band if a road. This channel is functioning as if As with the separator lines on the road. 802.11a equipment working at a frequency of 5.15 to 5.875 GHz, while the 802.11b and 802.11g equipment working at a frequency of 2.4 to 2.497 GHz. So, 802.11a uses a greater bandwidth than 802.11b or 802.11g. The more bandwidth, more channels are available.
3. MIMO
MIMO (Multiple Input Multiple Output) technology is the latest Wi-Fi. MIMO is based on Pre-802.11n specification. The word ï ¿½ Pre-ï ¿½ ï ¿½ said Prestandard versions of 802.11nï ¿½. MIMO offers increased throughput, superior reliability, and increase the number of clients connected reply. Some other advantages of MIMO are:
- Power through MIMO for better barrier.
- Wider reaching. MIMO Access Point can reach a variety of Wi-Fi equipment imaginable in every corner of the room.
- MIMO Access Point can identify radio waves emitted by Wi-Fi adapter 802.11a/b/g.
- MIMO support backward compatibility with 802.11 a / b / g. Wi-Fi equipment can produce MIMO data transfer speed of 108Mbps.
4. WEP
WEP (Wired Equivalent Privacy) is one of the security features / security that is build-in on Wi-Fi equipment. Radio waves emitted by Wi-Fi adapter can be accepted by all Wi-Fi equipment in the vicinity. This has become a serious threat because in this condition information information can easily be captured by the parties who are not supposed to. By skarena Wi-Fi was created by several types of encryption: 40 bits, 64 bits, 128 bits and 256 bits. However, the higher the security level, then decrease the data throughput is also larger.
5. SSID
SSID (Service Set Identifier) is the identification or name for the wireless network. Each Wi-Fi equipment must use a specific SSID. A Wi-Fi equipment is considered ebrada in a network when using the same SSID. Same as password, SSID is case-sensitive ie capital letters and small letters are distinguished.
6. SES
During these difficulties often experienced by most people is in terms of network security setup. Yet this is a very important thing in the network dunai. That's why created SES (SecureEasySetup). Now, just by pressing a button, automatically SES SSID and security code to the router and adapter and implement WPA security (Wireless Protected Access). To use the SES, the user need only press the button on the router's SES, then the client. Quite easily, Eden, the devices now have a traffic lane is safe.
Acquainted with Wireless Hacking
/ 2/26/2010 03:57:00 PM /
0 komentar:
Posting Komentar
pleas share your informations with me..