Skin has a new location audit dartless measure begins with these actions themselves:
- search for open doors
- search and evil measure with WEP encryption
- Search with WPS enabled, check for skill before Pixie Dust attack
- collecting handshakes and running them through dictionaries
These things are trivial, and WiFi-autopwner is aimed directly at this new automation, so as not to waste an hour on them.
After launch:
Sudo bash wifi-autopwner.sh
The text menu appears:
You don't have one dartless interface, the calls will be made automatically. As for the number of interfaces, go to the appropriate menu item and select the interface you want to use. Then switch this interface to monitor mode - the program has two options: one simply switches to monitor mode, and the other also closes programs that can interfere with your computer.
Now it’s enough to vibrate the ninth point Automatic Wi-Fi audit and take care of your rights. When choosing automatic audit, program:
- vikonaivaet the search for the closed measures
- I'm trying to figure out how to use WEP encryption and try to scratch the skin of it
- will search for a WPS measure and try a skin-to-skin attack Pixie Dust
- will try to select the hand grip for all areas within the reach radius.
Before each stage, you set your own timeouts, then. The program is not stuck in one stage.
We are planning to add a dictionary and function in the near future automatic start evil passwords from buried handshakes.
Searching through WPS pins
The program has built-in functionality for . To simply enumerate WPS pins (without Pixie Dust attack), select menu number 6 “ Attack on WPS" If your Reaver is constantly showing you Reaver warnings: WARNING: Failed to associate with and WPS transaction failed (code: 0x03), re-trying last pin, then there is a chance that WiFi-autopwner will fail.
The program itself searches for an access point with WPS, you just need to select the AP number you want to attack.
ElcomSoft Wireless Security Auditor Pro 6.04.416.0 – This is a program that effectively calculates the difficulty of current video cards for updating and auditing passwords in drone-free systems with a speed that is unattainable by special means. With this technology, the most resource-intensive parts of programs are built on powerful superscalar processors, which are used in modern ATI and NVIDIA video cards. There are one or more cards in the system the rest of the generation, the hardware speed is activated automatically. The program checks the security of the drone-free border, trying to penetrate it either in the middle or in the middle. You can download the program via direct instructions (z hmari) at the bottom of the page. The main capabilities of the Wireless Security Auditor programs:
click on the picture and it will get bigger
System benefits: | |
Operating system: | Windows XP,Vista,7,8 (x86,x64) |
Processor: | 1 GHz |
RAM: | 512 MB |
Place on hard drive: | 20 MB |
Interface language: | Russian |
Size: | 22 MB |
pharmacy: | included |
*archives WITHOUT password |
Check out the new window
Today we would like to hear about our approach to the creation of highly productive WLAN (wi-fi) connections in the context of a completed project for one of our deputies.
If we have previously signed an NDA (for the sake of confidentiality of data), we do not have the right to disclose: the name of the replacement company, however, and the development of the object.
The rest of the time, we are often confronted with questions about the growing problems of non-dart measures from representatives of small and medium-sized businesses. It is clear that even a great business, in the name of gravel-cobs, there are financial resources and reasonable prospects for the development of its IT park and, in most cases, to competently approach the organization prices of edge infrastructure. Companies in the SMB (small and medium business) segment often rely on primary SOHO access points, with no particular benefit to corporate wi-fi.
LWCOM's Deputy Chief of Staff with a further description of the problems:
- “Slow down” wi-fi and files will be enlarged;
- Bad signal In some parts of the office, and in others, he simply knows.
- access to the drone-free network of organizations via the SOHO access point;
- expansion of the access point - on the basis of office equipment;
- orientation external antennas- Satisfied;
- Setting the parameters of the radio module - factory settings, then. none dodatkovykh nalashtuvan I wasn’t timid.
As a rule, the deputy's description of the problem is the following reasons:
- The daily planning of a drone-free line before launch;
- Preservation of factory settings for radio settings;
- Continuous monitoring of radio parameters and adjustment of changes on the air.
- Minimum signal strength – 67dBm;
- The maximum transmission power is within the limits permitted by law (not more than 100 mW);
- Access points to replace the obvious ones are office-mounted with integrated antennas and the ability to be mounted on either a desk or a wall;
- Availability of centralized monitoring of all devices of drone-free surveillance from one WEB interface;
- Possibility of adjusting radio parameters in automatic mode without the participation of the administrator;
- The speed of transmission of drone-free data is no less than 20 Mbit/sec;
- Vikoristovanyi Frequency range- Only 2.4 GHz.
Small Office scheme. The numbers indicate the points where the vimirs were carried out: at the adjacent one, the separated access point, at the adjacent one, on the contrary, and at two distant ones.
Vimirs gave such unusual results
Speck vimiru No. 1
Speck vimiru No. 2
Speck vimiru No. 3
Vimiru point No. 4
At the current stage, radio survey was carried out using the specialized software package Ekahau Site Survey, which allows you to create a map of the drone-free area of a specific location, as well as automatically plan the WLAN design based on the transfer material. Their quantity. In our case, the partitions were made from concrete and plasterboard.
Based on the specifications, the experiments were carried out using an additional laptop equipped with an external drone-free USB adapter in the 2.4 GHz range. The inspection is carried out in a Stop-and-Go manner. tobto. die in rock mode Displayed with notches for recording.
Small Scheme of arrangement of route points at which tests were carried out.
Results of the radio survey report
Vessels without drones have been detected and radio channels are being monitored.
(SSID received)
8e:5d:4e:4d:f2:38, Unknown SSID |
||
ac:cf:23:03:c6:10, Unknown SSID |
||
32:cd:a7:36:5c:17, Unknown SSID |
||
02:15:99:e4:01:cf, Unknown SSID |
||
d4:ca:6d:92:b8:f7, Unknown SSID |
||
90:72:40:19:99:82, Unknown SSID |
||
6c:70:9f:eb:a8:ae, Unknown SSID |
||
90:72:40:1d:30:de, Unknown SSID |
||
74:d0:2b:58:b7:ec, Unknown SSID |
||
bc:ee:7b:56:44:9e, Unknown SSID |
||
50:46:5d:6d:de:e8, Unknown SSID |
||
bc:ae:c5:b0:ed:7c, Unknown SSID |
||
90:e6:ba:85:b6:63, Unknown SSID |
||
90:e6:ba:74:2f:04, Unknown SSID |
||
10:bf:48:92:a2:d0, Unknown SSID |
||
54:04:a6:5b:40:a4, Unknown SSID |
||
f4:6d:04:eb:07:4c, Unknown SSID |
||
54:a0:50:e3:29:58, Unknown SSID |
||
ac:f1:df:f2:28:b3, Unknown SSID |
||
78:54:2e:8e:25:45, Unknown SSID |
||
6c:72:20:77:04:b8, Unknown SSID |
||
14:cc:20:5c:b7:41, Unknown SSID |
||
10:7b:ef:61:b0:f0, Unknown SSID |
Visnovki
- It is not possible to ensure stable coverage of the drone-free line at the closest access point to part of the office. Weekday droneless connection on mobile devices.
- Low speed of interaction with Internet resources on mobile devices. It’s not comfortable to work with, and it’s also difficult to watch streaming audio and video content.
- The presence of anonymous local access points with a bridge of radio channels, which is how to “jam” the traffic control system. In a current situation without continuous monitoring of radio parameters and changing adjustments “on the fly”, the work may be impaired.
Cream vimog TZ accepted the following parameters:
- The measure plans to have up to 30+ clients per hour mobile devices iOS/Android and 10 laptops. These data are necessary for automatic planning of measures with the help of additional software.
- The power of transmitting points is up to 25 mW. In this case, when leaving one access point to another, increase the transmission intensity to update the coverage area (self-healing network).
- Wikoristan access points for Ruckus Wireless.
To organize drone-free surveillance, we assigned the Ruckus Wireless wireless access point model R500, which has the following characteristics:
- BeamFlex adaptive antenna technology – more durable;
- Small size and size – easy installation and impermeability;
- A single system without a vicarious controller – which allows you to significantly save on the purchase of a controller and licenses.
Small The theoretical strength of the signal that is received, and the newly expanded access point
After completing the theoretical planning, 2 Ruckus R500 access points were added, configured and mounted on the wall at the designated locations.
After installation, a control survey was carried out with the help of Ekahau Site Survey.
Small New scheme Rotating route points for vimiryuvannya.
Updated radio survey results
Also, after the launch of the updated drone-free measurement, the signal and speed of the Internet connection were re-tested using the Speedtest and Network Signal Pro software based on Android OS at the same points .
Speck vimiru No. 1
Speck vimiru No. 2
Speck vimiru No. 3
Vimiru point No. 4
As can be seen from the test results, having replaced SOHO equipment with two Ruckus R500 hardwired access points and selected the optimal locations for their placement, we made decisions that meet all the technical requirements deputy, and himself:
- Stable signal throughout the entire office area;
- Guaranteed speed of interaction with Internet resources > 20 Mbit/sec;
- Automatic adjustment of radio parameters to ensure broadcasting;
- Management from a single WEB interface;
- Aesthetic external look dot;
- Generator's guarantee for the entire system.
Basic course (Code BT09), 2 days
Abstract
The meta of this course is a practical introduction to food safety and particularities of the protection of dart-free measures. The course rationally emphasizes systematization theoretical information and practical hearing work under the care of a qualified instructor. The theoretical part of the course includes a basic overview of the architecture of dartless measures, the standards it has and the protection mechanisms used to enable dartless measures. In addition, it is expressed effective technique Integration of drone-free fencing with explicit fencing infrastructure while maintaining all security aspects. Over 50% of the initial hour is allocated practical robots on specially prepared stands, which illustrate various solutions for the protection of dartless measures.
In the process of learning, listeners become familiar with the programs NetStumbler, Kismet, AirSnort, aircrack and other tools for monitoring drone-free surveillance. Particular respect is given to the use of the most extensive tools for auditing drone-free surveys, both commercial and publicly traded.
Audience
- System border administrators, certifying for safety computer network organizations that want to provide practical training and advance their qualifications
- Members of the organization plan to develop dartless technologies.
- Administrator information security
Advance preparation
Basic knowledge of edge technologies, basic protocols and services of the TCP/IP stack, skills in working with Windows 2003 and Linux. You can verify your knowledge of the protocols of the TCP/IP stack by running a self-verification test in the Start Center. Knowledge is floating around current technologies and protocols: VPN, PKI, IPSec.
As a preliminary preparation, we recommend taking the following courses:
- BT05 "TCP/IP Basics"- Intensive course on the adjustment and development of protocols of the TCP/IP stack in various operating systems
- BT03 "Safety of computer measures" - loss of food supply and computer security
After finishing the beginning
You remove systematized knowledge from:
- Architectures of dartless fences
- Explicit protection mechanisms, introduced into equipment for dartless measurements
- Vikoristannya of additional mechanisms for the protection of dartless measures
- Peculiarities of attack detection systems and security scanners in dartless borders
- Security issues associated with Bluetooth devices
You can:
- Involvement of basic mechanisms for data protection in dartless lines
- Advance the security of drone-free surveillance, vikoryst and IEEE802.1x VPN technologies
- Implement monitoring of dartless lines
- Vikonuvati safety audit of dart-free measures
Dodatkovo
Navchannya on this course be insured in case of seizure of government documents by the facsimile of information security at the Initial Center "Informzakhist" in accordance with REGULATIONS about the removal of government documents by fakhivs to improve qualifications in the field of information security.
The hearing specialist receives a company certificate, specially allocated for this course chief companion and a CD that contains versions of the main protection features that are covered in the course, additional and additional information on the topics of the course.
Course program
- Drillless technologies – hidden views.
Entry 802.11 standard. Possession and architecture of dartless boundaries. Threats, tied with dartless lines. Working with the NetStumbler program. Revealed and connected to a dartless line (practice). - Basic mechanisms for the protection of data in dartless lines.
DSSS technology. Filtering based on MAC address. Unauthorized connections to the access point, as a result of vikorist access demarcation based on MAC addresses (practice). The choice of protection mechanisms installed at the access point. The WEP protocol, its advantages and disadvantages. Kismet and AirSnort programs. WEP wiki, WEP key hacking (practice). - Protection of the dart-less line on the merezhny level.
Vision of a dartless line in the next segment. IPSec wiki for protecting drone-free traffic (practice). Zastosuvannya VPN technology for zakhistu dartless merezh (practice). - Standard WPA (Wi-Fi Protected Access) and 802.11i.
IEEE802.1x standard. Authentication protocols EAP, PEAP. Implementation of edge infrastructure in accordance with the recommendations of the IEEE802.1x standard (practice). TKIP protocol, Michael method and WPA technology. 802.11 standard. - Revealed attacks at dartless lines.
Collecting information about drone-free driving (war driving). Detection of unauthorized access points and rogue clients. Vidmova at the service room. Access point bypass. Protection of clients of dartless survey (practice). Wikoristannya systems for detecting attacks. - Audit of drone-free survey.
Specifics of the safety analysis of dartless measurements. Security scanners for dartless surveying (demonstration). P_dumkov's recommendations. - WPAN Merezhi.
Bluetooth safety. WPAN standard. Bluetooth architecture. Robot modes of Bluetooth devices. Search for Bluetooth devices using other tools. The vulnerability of Bluetooth devices, tools for their detection.
Meta course - practical development of food safety and special features of protection of dart-free measures. The program rationally combines systematic theoretical assessments and practical hearing aids under the supervision of a qualified instructor. The theoretical part of the course includes a basic overview of the architecture of dartless measures, as well as the standards and protection mechanisms that are in this field, which are used to implement dartless measures. In addition, an effective method for integrating drone-free surveillance with explicit surveillance infrastructure is demonstrated, which covers all aspects of security. More than 50% of the initial hour is devoted to practical robots on specially prepared stands, which illustrate various solutions to protect dartless measures.
In the process of learning, listeners become familiar with the programs NetStumbler, Kismet, AirSnort, aircrack and other tools for monitoring drone-free surveillance. Particular respect is given to the use of the most extensive tools for auditing drone-free surveys, both commercial and publicly traded.
Audience
- System and network administrators responsible for the security of computer networks.
- Members of the organization plan to develop dartless technologies.
- Information security administrators.
Advance preparation
Basic knowledge of edge technologies, basic protocols and services of the TCP/IP stack, robotic skills operating systems(OS) Windows 2003 and Linux. There is knowledge of current technologies and security protocols: VPN, PKI, IPSec.
You can verify your knowledge of the protocols of the TCP/IP stack by running a self-verification test in the Start Center.
As a result of the beginning
You take away the knowledge:
- from the architecture of dartless fences;
- about the obvious protection mechanisms introduced into the equipment for dartless measures;
- To eliminate the need for additional mechanisms to protect dartless measures;
- for the peculiarities of the design of attack detection systems and security scanners at dartless borders;
- For security issues related to the use of Bluetooth devices.
You can:
- engaging the basic mechanisms for protecting data from dartless lines;
- promote the security of drone-free surveillance, VPN and IEEE802.1x technologies;
- carry out monitoring of dartless lines;
- vikonuvati safety audit of dart-free measures.
Hearing package
- The company's chief assistant.
- Versions of the main features of the defense, which are discussed in the course, are additionally Dovidkova information on the subject of the course in electronic form.
Dodatkovo
After successful completion of the course, graduates will receive their certificates Navchalny center"Informzahist".
Completion of this course is covered by the hour of obtaining in the Basic Center “Informzahist” the documents of the established document about the training for additional education. professional programs in the field of information security.
Graduates can receive cost-free consultations from specialists at the beginning center of the course completed.
Course program
- Drill-free technologies: hidden views. Entry Standard 802.11 and “substandard”. Possession and architecture of dartless boundaries. Threats, tied with dartless lines. Working with the NetStumbler program. Revealed and connected to a dartless line (practice).
- Basic mechanisms for the protection of data in dartless lines. Filtering based on MAC address. Unauthorized connections to the access point, as a result of vikorist access demarcation based on MAC addresses (practice). The choice of protection mechanisms installed at the access point. The WEP protocol, its advantages and disadvantages. Kismet and AirSnort programs. WEP wiki, WEP key hacking (practice).
- Protection of the dart-less line on the merezhny level. Vision of a dartless line in the next segment. IPSec wiki for protecting drone-free traffic (practice). Zachist of the droneless segment for additional L2TP help. Establishment of VPN technologies for the protection of drone-free surveillance (practice).
- Standard WPA (Wi-Fi Protected Access) and 802.11i. IEEE802.1x standard. Authentication protocols EAP, PEAP. Implementation of edge infrastructure in accordance with the recommendations of the IEEE802.1x standard (practice). TKIP protocol, Michael method and WPA technology. 802.11 standard.
- Revealed attacks at dartless lines. Types of dartless attacks. Collecting information about drone-free driving (war driving). Vidmova at the service room. MAC address spoofing. Attacks on the 802.1x authentication mechanism. Attacks on clients of dartless networks Architecture and features of systems for detecting dartless attacks Detection of unauthorized access points and dartless clients. Protection of clients of dartless survey (practice). Monitoring the safety of drone-free lines
- Analysis of the safety of dartless lines. Specifics and methodology for assessing the level of depredation of dartless fences. Tools and sequence of actions. Collecting information about the drone-free survey and determining the topology.
- WPAN Merezhi. Bluetooth safety. WPAN standard. Bluetooth architecture. Robot modes of Bluetooth devices. Search for Bluetooth devices using other tools. The vulnerability of Bluetooth devices, tools for their detection.
Protection of wireless communications (for an IB administrator, an IB specialist, an IB power analyst)