Ασφάλεια στα ασύρματα τοπικά δίκτυα (DNS Tunneling)
Γαδανάκης, Αντώνιος Ν.
The purpose of this thesis is to describe the way wireless networks as well DNS Tunnels works and security violation with use of DNS Tunneling. Known DNS Tunneling utilities will be reported. The Iodine utility will be used to bypass a captive portal (or Hotspot‘s access control lists) and a host will gain access to Internet without to pay money. Afterwards, detection techniques and their implementation will be analyzed. More specifically, chapter one describes the human need for communication and networking, the definition, the architecture and the categories that wireless networks are divided into. Chapter two explains what is the wireless local network and the reasons that it is preferred contrary to the wired network. It describes the evolution, the components, the standards, the topologies of 802.11 standard and way it works. Chapter three describes the security in the wireless networks, the protocols, the authentication and the encryption. It analyzes known threats and the way that security should be implemented in a wireless local network. Chapter four describes the violation of wireless security. Overview of DNS and of DNS Tunneling. Known DNS Tunneling utilities are presented and one of them “Iodine” is selected to perform an attack in Starbuck’s Hotspot. In conclusion, chapter five describes general techniques of attacks mitigation, analyzes the two techniques of DNS Tunneling detection and presents the implementation of certain techniques of detection.