Monday, April 14, 2014

Detection of SSID by gorvam saddar



2           Detection of SSID
The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
On a number of APs, it is possible to configure so that the SSID transmitted in the Beacon frames is masked, or even turn off Beacons altogether.  The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  In such a case, a station wishing to join a WLAN begins the association process by sending Probe Requests since it could not detect any APs via Beacons that match its SSID.
If the Beacons are not turned off, and the SSID in them is not set to null, an attacker obtains the SSID included in the Beacon frame by passive scanning.
When the Beacon displays a null SSID, there are two possibilities.  Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.  To such a request, there will be an Associate Response frame from the AP.  Both frames will contain the SSID in the clear, and the attacker sniffs these.  If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.  The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.  The attacker waits to sniff these Probe Responses and extract the SSIDs.
If Beacon transmission is disabled, the attacker has two choices.  The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legitimate station that already has a correct SSID and sniff the SSID as described above.  The attacker can also chose to actively probe by injecting frames that he constructs, and then sniffs the response as described in a later section.
When the above methods fail, SSID discovery is done by active scanning (see Section 5).

Wireless Network Sniffing , Authentication, Association, Passive Scanning by gorvam saddar



2.6           Authentication
Authentication is the process of proving identity of a station to another station or AP.  In the open system authentication, all stations are authenticated without any checking.  A station A sends an Authentication management frame that contains the identity of A, to station B.  Station B replies with a frame that indicates recognition, addressed to A.  In the closed network architecture, the stations must know the SSID of the AP in order to connect to the AP.  The shared key authentication uses a standard challenge and response along with a shared secret key.


2.7           Association
Data can be exchanged between the station and AP only after a station is associated with an AP in the infrastructure mode or with another station in the ad hoc mode.  All the APs transmit Beacon frames a few times each second that contain the SSID, time, capabilities, supported rates, and other information.  Stations can chose to associate with an AP based on the signal strength etc. of each AP.   Stations can have a null SSID that is considered to match all SSIDs.
The association is a two-step process. A station that is currently unauthenticated and unassociated listens for Beacon frames. The station selects a BSS to join. The station and the AP mutually authenticate themselves by exchanging Authentication management frames.  The client is now authenticated, but unassociated.  In the second step, the station sends an Association Request frame, to which the AP responds with an Association Response frame that includes an Association ID to the station.  The station is now authenticated and associated.

Wireless LAN,Stations and Access Points, Channels, WEPInfrastructure and Ad Hoc Modes, Frames by gorvam saddar



2.  Wireless LAN Overview
In this section, we give a brief overview of wireless LAN (WLAN) while emphasizing the features that help an attacker.  We assume that the reader is familiar with the TCP/IP suite (see, e.g., [Mateti 2003]).
IEEE 802.11 refers to a family of specifications (www.ieee802.org/11/) developed by the IEEE for over-the-air interface between a wireless client and an AP or between two wireless clients.  To be called 802.11 devices, they must conform to the Medium Access Control (MAC) and Physical Layer specifications. The IEEE 802.11 standard covers the Physical (Layer 1) and Data Link (Layer 2) layers of the OSI Model.  In this article, we are mainly concerned with the MAC layer and not the variations of the physical layer known as 802.11a/b/g.
2.1           Stations and Access Points
A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.  An access point (AP) is a station that provides frame distribution service to stations associated with it.  The AP itself is typically connected by wire to a LAN.
The station and AP each contain a network interface that has a Media Access Control (MAC) address, just as wired network cards do. This address is a world-wide-unique 48-bit number, assigned to it at the time of manufacture. The 48-bit address is often represented as a string of six octets separated by colons (e.g., 00:02:2D:17:B9:E8) or hyphens (e.g., 00-02-2D-17-B9-E8). While the MAC address as assigned by the manufacturer is printed on the device, the address can be changed in software.

All Hacking Techniques and methods in Wireless Networks by Gorvam saddar



This article is scheduled to appear in “The Handbook of Information Security”,

Monday, March 3, 2014

pet caring, monitor your pets, pets color

The domestic pets such as a dog, cat or any other animal can provide many therapeutic and health benefits to us. Pets can ease loneliness, helps in reducing stress, promote social interaction, encourage exercise and playfulness, and provide unconditional love and affection. Caring for a pet may even help you live longer.  Taking care of the pet is an important aspect to be noticed to maintain the proper and healthy relationship with the pets. Millions of beloved pets are lost each year and don’t find their way to home, because they didn't have their embroidered dog collar. Dog collars and leashes are designed to be used for several different purposes. The dog collar is what is placed around the neck of a dog. This may be for identification or for controlling the dog. A dog leash is a rope or similar type material that attaches to the collar that is on the dog. This allows the dog owner to help control a dog or restrain a dog from running away or attacking someone. Owners can have a personalized dog collars for their dogs. The owners can decide the color and the design to be used to decorate the dog collars for their pet. This personalized dog collars helps the owner to keep their pet under control and also helps to identify their pets. Personalized dog collars are simply for those who wants to put a unique collar on their dog. This collars could include the name of the pet or some other name sewn on it or  have some other embellishments added on it. There are many embroidered dog collar businesses who offer the facility to personalizeddog collars. However, personalizing the dog collars can be little bit expensive but it will surely be a unique gift for your pet. There are many different design or styles available for the embroidered dog collar to choose from. It is also possible to completely redesign a new collar for your lovely pet.
Proper understanding of the dog collar is very important and extremely helpful for the dog owners. Choosing a right dog collar for your dog is very necessary. Various factors like the size of the dog, how your dog behaves and many more must be noticed while choosing the correct dog collar. Correct dog collar will be comfortable for your pet and it will be easy for the pet to adjust with it. So it’s best to choose proper Embroidered Dog Collar for your dog.