802.11b Wireless Network Security

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Ethical Hacking Module XV Hacking Wireless Networks.
Wireless LAN Security Understanding and Preventing Network Attacks.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
WLAN What is WLAN? Physical vs. Wireless LAN
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Confidential and Proprietary Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze Leo Walsh, GSNA Professional Jefferson Wells.
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
PRESENTATION ON WI-FI TECHNOLOGY
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Solving the Security Risks of WLAN Tuukka Karvonen
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Understand Wireless Security LESSON Security Fundamentals.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Ethernet Programming
TERMINOLOGY Define: WPAN
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Methods of Securing LANs
Security and Wireless LANs
Wireless Fidelity 1 1.
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
CSE 4905 Network Security Overview
Security of a Local Area Network
Wireless Networking Chapter 23.
Wi-Fi Technology.
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Configure a Wireless Router
By Markus Kriechhammer
LM 5. Wireless Network Security
Presentation transcript:

802.11b Wireless Network Security 11/20/2018

Agenda Background Discovery Vulnerabilities Whacking Solutions The Future 11/20/2018

Background 802.11 802.11b 802.11a finalised by IEEE 1997 2.4 GHz Data rate of 1-2 Mbps 802.11b Data rate of 11 Mbps Current Standard 802.11a 5 GHz Data rate of 54 Mbps Equipment soon to be available from Intel? 802.11a 5Ghz illegal in UK (Europe?) – military and satellites 11/20/2018

Background Client Stations are configured with a WLAN network card These communicate with Access Points which provide a bridge to the wired LAN Multiple Stations and a single Access Point is known as an BSS (Basic Set Service) Multiple Stations and multiple Access Points are known as an ESS (Extended Set Service) 11/20/2018

Background Each SS has an SSID (Service Set IDentifier) Replaces Layers 1 and 2 of OSI (Physical and Data Link) Effective range of 100 metres Can be extended using directional antennae Outside physical security controls 11/20/2018

Background - Security Encryption provided by: WEP (Wireless Encryption Protocol) Symmetric key Available in 64bit and 128bit key length versions Authentication provided by: WEP Access control based on: SSID MAC Address 11/20/2018

WLAN Discovery Range makes service sets easy to identify WarDriving, WarPeddling, WarWalking NetStumbler, APSniff Easy to associate with AP and receive an IP address by DHCP 11/20/2018

WLAN Discovery SSID Mac Address & Vendor Geographic Location Network Parameters (WEP, AP/Peer, Channel) Radio Signal Parameters (S/N ratio, Strength) 11/20/2018

WLAN Discovery - Equipment Mobile PC Windows (Netstumbler, APSniff) Linux/BSD (Pete Shipley’s scripts, bsd-airtools) WLAN Card Hermes Chipset (Lucent, ELSA etc.) Prism II Chipset (D-Link, Compaq etc.) GPS with serial link 2.4Ghz Omni-directional Antenna Transport 11/20/2018

WLAN Discovery - Netstumbler 11/20/2018

WLAN Discovery – The West End Run Over 40 networks discovered in an 8 mile drive 11/20/2018

WLAN Discovery – Results 80 unique WLANs identified 54 not WEP enabled 130 unique Access Points identified 84 not WEP enabled WEP usage rate is typical at around 33% 11/20/2018

WLAN Discovery – Some Observations Detection range generally 10m to 150m Obstructions Weather Antenna Travel speed affects detection rate Walking speed optimal Sometimes detectable at speeds of 90mph! 11/20/2018

WLAN Discovery – Important Points Legality may be ambiguous Interception of Communications and Computer Misuse Inadvertent reception of adjacent networks Be careful if publishing results Safeguards Un-bind all network protocols from WLAN card Turn off features such as auto-configure 11/20/2018

Vulnerabilities WEP is flawed and crackable Some packets are ‘weak’ and reveal information about the key in use Implemented in: WEPCrack AirSnort 11/20/2018

Solutions 802.11b security is flawed WLANs are easy to locate Risks can be mitigated: Treat WLANs as insecure networks Only use 128bit WEP Segregate WLANs with firewalls Use VPNs to connect through the firewalls Use application encryption e.g. SSH, HTTPS Use MAC address access control Disable SSID broadcasts if possible Use SSIDs that do not reveal information Use site surveys Change default passwords 11/20/2018

The Future Several IEEE working groups 802.11i 5GSG E to I Examining security enhancements WPA WPA2 Kerberos 5GSG Working on harmonisation of 802.11, Hiperlan etc. 11/20/2018

Author of WIDZ FATAJACK & the Wireless hacker survey Questions A 802.11 workshop by Loud-fat-bloke Author of WIDZ FATAJACK & the Wireless hacker survey Is available 11/20/2018