Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 Wireless Security. 2 Why Wireless is not secure ? Wireless LANs are inherently insecure because they transmit data as electromagnetic waves through.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Access Control and Site Security (Part 2) (Tuesday, January 22, 2008) © Abdou Illia – Spring 2008.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Security With a focus on Security Dr. Tulin Mangir Partially sponsored by NSF Grant No:
Wireless Security.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Securing a Wireless Network
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Access Control and Site Security (Part 2) (January 28, 2015) © Abdou Illia – Spring 2015.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
WIRELESS LAN SECURITY Using
Wireless Networking.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
PRESENTATION ON WI-FI TECHNOLOGY
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
CompTIA Security+ Study Guide (SY0-401)
Wireless Technologies
Securing A Wireless Network
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Wireless Hacking.
Chapter 12 Communications Security & Countermeasures
802.11b Wireless Network Security
LM 5. Wireless Network Security
Presentation transcript:

Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP

Demonstration of Wireless Insecurities Demonstration of Wireless Insecurities Agenda: Demonstrate ease of access to unprotected WLAN Setup standard security roll-out (SSID and MAC restrictions) Demonstrate ability to locate an AP and spoof MAC Adresses Set up WEP on AP and demonstrate WEP weaknesses Discuss methods of providing security over wireless

Equipment Layout Equipment Layout

Equipment / Tools Linksys Access Point Laptop with Linksys PCMCIA Wlan Cards Unauthorized “Hacker” Client System NetStumbler, SMAC, WEPCrack, and Ethereal Web Server

Rogue (unprotected) Access Point No Security Measures in place Access Point Advertises SSID Casual Users can browse your network Typical of departmental or “personal “ access points An intruder starts with internal access to your network

Baseline Wireless Security Disabling SSID Broadcast –Service Set Identifier Broadcasting MAC Restrictions –Limit participation to only allowed MAC addresses WEP –Wired Equivalent Privacy

Baseline Wireless Security ~ Disabling SSID Broadcast ~ ADDED SECURITY: SSID is not broadcast to unknown clients. CONS: Requires manual input of SSID on all client systems. SSID information is sent in “plain-text” from the client to the AP.

Getting past SSID Obscurity Sniffing traffic on the WLAN Identify SSID broadcast from employee system during AP association. Configure Wireless card with discovered SSID.

Baseline Wireless Security ~ MAC Filtering ~ ADDED SECURITY: WLAN association is restricted from unknown MAC addresses. CONS: Requires manual input of all client system MAC addresses into the AP. MAC “spoofing” is a trivial task.

Getting past MAC Filtering Sniffing traffic on the WLAN Identify valid MAC addresses from employee WLAN interaction. Spoof the MAC address of the employee’s system.

Baseline Wireless Security ~ WEP Encryption ~ ADDED SECURITY: Traffic is encrypted during transmission CONS: Requires distribution of WEP keys to employees. WEP keys can be broken easily

Getting past WEP Sniffing traffic on the WLAN Gather at least 500MB of traffic Process through Wepcrack Keys to the kingdom are revealed

Alternatives Limit Broadcast Range of Access Points Put the Access Points outside the Firewall –Use strong authentication –Encrypt traffic with IPSEC VPN (3DES or AES) Use proprietary Key Rotation Methods –EAP (LEAP – Cisco, EAP-TLS, EAP-TTS) Manually Scan for “Rogue” Access Points Install IDS for WLANs –Detects MAC Spoofing –Identifies “Rogue” Access Points.

Extensible Authentication Protocol (RFC 2284) Provides a flexible link layer security framework Simple encapsulation protocol –No dependency on IP –ACK/NAK, no windowing –No fragmentation support Few link layer assumptions –Can run over any link layer (PPP, 802, etc.) –Does not assume physically secure link Assumes no re-ordering –Can run over lossy or lossless media –Retransmission responsibility of authenticator (not needed for 802.1X or )

URLs for More Information IEEE 802 web page: IETF web page: The “Unofficial Security” Web Site: Planet