Team_Eta_FINAL_documentation

advertisement
IST 454 TEAM ETA
FINAL
DOCUMENTATION WARDRIVING
April 13, 2011. Professor Santoro.
Team Eta: Mike
Frank, Wes Connell,
Pat Mahar, Aritz
Kobayashi, Brian
Hiltner
Team Eta 1
Contents
Scenario: ....................................................................................................................................................... 2
Objectives: .................................................................................................................................................... 2
Tasks:............................................................................................................................................................. 2
Task 1: Conduct a security audit ............................................................................................................... 2
Task 2: Securing the Network ................................................................................................................... 5
Intro: ..................................................................................................................................................... 5
Steps:..................................................................................................................................................... 5
Conclusion/Lessons Learned:........................................................................................................................ 6
Team Report (Requirements): ...................................................................................................................... 7
Resources: ..................................................................................................................................................... 7
Team Eta 2
Scenario:
Recently, students living off campus have been reporting that their files have been
disappearing. There have also been reports of a Honda Accord sitting outside people’s
apartments while the missing file fiasco goes on. The department head of the PSU police have
come to you in order to figure out exactly what is going on. Knowing from IST454 the different
types of forensics on wireless networking, you immediately set out to do a security audit on the
open networks in the areas and help students with unsecured wireless networks learn the dangers
as well as help them secure their network.
In this lab, you will explore the different tools used to wardrive as well as login to a
router to secure your network. You will be familiarized with the tools needed to wardrive as well
as gain a better understanding of users’ knowledge on the subject of security (hint: it’s not good).
Objectives:




Familiarize yourself with inSSIDer
Learn how to conduct a security audit
Learn how to secure a wireless network
Learn the dangers of an unsecured wireless network
Tasks:
IMPORTANT: Before doing the tasks, read the project requirements section to know where you are
going to need to take screenshots for the report.
Task 1: Conduct a security audit
1. Equip your computer with a wireless network card. If you do not have one built into your
laptop, USB wireless cards can be purchased for a low price online for basic wardriving.
NOTE: If you wish to capture wireless N networks as well, make sure the adapter
supports both the 2.4Ghz and 5Ghz spectrum (dual band)
2. Download the latest version of inSSIDer from
http://www.metageek.net/products/inssider/download/
3. Install inSSIDer with the standard options.
Team Eta 3
4. Open inSSIDer and have a screen open that looks like this:
5. Once inSSIDer is open, select the wireless card you wish to use in the upper right hand
corner under the drop down box:
6. Click “Start” to begin capturing SSIDs:
7. At this point, the list will populate with all the wireless networks local to you and will
continue logging them until you click stop where you clicked start before:
Team Eta 4
8. Now drive around the area you wish to hold a security audit with the computer on and
inSSIDer capturing.
9. Once you are finished, you can sort the wireless networks in one of two ways. In the first
way, simply click the “Privacy” column and it will sort by privacy on the network:
10. The second way is to click filter tab in the bottom portion of the program
11. Then click on “Quick Filters”:
12. Hover over security and select “Any open network”
13. This will give you a list of all open networks in the area that you drove through.
14. BONUS: If you have a GPS chip in your laptop, you could also enable GPS to
simultaneously capture while SSIDs are being logged, which will allow you to see
exactly where the networks are.
15. Now that you have successfully completed a security audit of the area, it is your job to
provide the authorities with instructions on how the people with open networks can
secure them…
Team Eta 5
Task 2: Securing the Network
Intro:
In a shocking turn of events, your network at home has been one of the networks found to be
open. You decide you should really change that before the file-stealer in the Honda Accord hits
you next. You trace this lack of security back to your brother, of whom you room with, buying a
router to connect his Xbox360 to the internet. Thankfully, this can be changed in a few easy
steps.
Steps:
1. Login to the router by typing the routers IP address in the address bar (usually
192.168.1.1)
2. Type in the username and password. Chances are, if your brother didn’t know about Wifi
security, he hasn’t changed the default username away from “admin” and the default
password away from “password”.
3. Once logged in, click the “Wireless” tab at the top of the page
4. Then click the “Wireless security” in the new tab right below where you just clicked
“wireless”
5. Change the “Security Mode” to “WPA2 Personal” (or WPA if your router does not
support WPA2)
6. Make sure the algorithm is set to “AES” as it is the most common and no additional
configuration will be needed on each computer to connect to the router aside from the
password.
7. Type your password in the “WPA Shared Key:” area. This password should be strong,
containing a variety of letters and numbers and also be a non-dictionary word. In the
spirit of Easter, which is right around the corner, you decide to go with “Bu2007nny”.
8. The “Group Renewal Key” is how often the encryption will be changed so anybody
snooping the network would only have 10 minutes with a value of “600”. If you do not
use a dictionary word, it would be very hard to crack a password under 10 minutes at this
point.
Team Eta 6
9. Once all the values you set are finalized, click “Save Settings”.
10. The router reboots and you are finished! You now have a safe and secure wifi network.
Conclusion/Lessons Learned:
By having an open network, a person is open to all kinds of vulnerabilities. As you saw earlier in
the semester using wireshark, once an intruder is inside your network, if they have wireshark running,
they can see your data. That includes passwords if not sent over a secure source, which, sometimes in a
home network, encryption is forgone for ease of use. With these passwords, the intruders could then
take this information and attempt to break into your email, forum accounts, or even worse, your bank.
Also, if there are shared files on the network with read/write access, a malicious intruder could scour
these documents for information for identity theft or even delete the files “for fun”. Wardriving is a grey
area in the realm of legality, as it is your job, as a user, to secure your wireless network. So while the
things the intruders may be doing is illegal (breaking into your bank account, identity theft), actually
getting into your wireless network is not.
Team Eta 7
Team Report (Requirements):
Clearly state your results of this project. You are expected to hand in a report in the following
format:






A cover page (including project title) with team name and team members
A table of contents with page numbers
Use double-spaced type for convenient grading
Number pages. Font size 12, single column
Save the Microsoft Word document with the team name in the title.
Upload the document into the appropriate ANGEL dropbox.
The report should have the following sections – One on Task 1 and one on Task 2
Task 1: (Provide screenshots)
1.
2.
3.
4.
5.
How many SSIDs did you pick up in your audit?
How many were in the 2.4 Ghz range?
How many were in the 5.0 Ghz range?
How many were unsecured?
BONUS: How many were public wifi and how many were from private households?
Task 2: (Provide screenshots)
1. Show your unsecured wireless network in inSSIDer when it was unsecured.
2. Show the wireless settings page before you click “save settings”.
3. Show your now secured wireless network in inSSIDer once the settings are applied.
Resources:
"What Is Wardriving." Online Learning. Web. 04 Feb. 2011.
<http://www.learn.geekinterview.com/it/wireless/what-is-wardriving.html>.
"Wardriving Tools." WarDriving.com. Web. 04 Feb. 2011.
<http://www.wardriving.com/code.php>.
"Wireless LAN Security." Wardriving. Web. <http://www.wardrive.net>.
"Download InSSIDer." InSSIDer. CNet. Web. <http://download.cnet.com/inSSIDer/30002085_4-10848357.html>.
Download