Presentation is loading. Please wait.

Presentation is loading. Please wait.

802.11 Wireless Insecurity By: No’eau Kamakani Robert Whitmire.

Similar presentations


Presentation on theme: "802.11 Wireless Insecurity By: No’eau Kamakani Robert Whitmire."— Presentation transcript:

1 802.11 Wireless Insecurity By: No’eau Kamakani Robert Whitmire

2 Outline  Background  Security Features  Attacks  Demonstrations  Conclusion

3 Background

4 Wireless Definitions  802.11 802 = LANs (Local Area Network)802 = LANs (Local Area Network) 11 = Wireless11 = Wireless  WiFi Wireless FidelityWireless Fidelity  Hotspots Connection point for a WiFi network hardwired to the InternetConnection point for a WiFi network hardwired to the Internet

5 How Does It Work?  Transmits over radio frequency 2.4 – 2.483 GHz2.4 – 2.483 GHz 5 GHz range5 GHz range  Channels (for B and G) Direct Sequence Spread SpectrumDirect Sequence Spread Spectrum USA 1-11USA 1-11 Europe 1-13Europe 1-13 Japan 1-14Japan 1-14

6 Protocols

7 Products

8 Why go wireless  Infrastructure easy Goes thru walls, no wiringGoes thru walls, no wiring  Portability and Flexibility Access from anywhereAccess from anywhere  Interoperability Compatible with all WiFi products certified by Wireless Ethernet Compatibility Alliance (WECA)Compatible with all WiFi products certified by Wireless Ethernet Compatibility Alliance (WECA)  Increased Productivity Endless connectivityEndless connectivity

9 Security

10 WEP  Wired Equivalent Privacy  Secret Key for encrypting data Shared between mobile card and access pointShared between mobile card and access point 40-128 bits (includes IV)40-128 bits (includes IV)  Initialization Vector (IV) 24 bit, randomly generated24 bit, randomly generated Sent in clear textSent in clear text FiniteFinite

11 RC4 Encryption Algorithm  Stream cipher Generates infinite pseudo-random keystreamGenerates infinite pseudo-random keystream  Keystream generated with key and IV XOR’ed with message and Checksum to generate ciphertextXOR’ed with message and Checksum to generate ciphertext Receiver generates same keystream and XOR’s with ciphertext to get message and checksumReceiver generates same keystream and XOR’s with ciphertext to get message and checksum

12 Visualizing RC4

13 CRC-32 Checksum  Linear Checksum algorithm Integrity checkingIntegrity checking A bit in message correlates directly to set of checksum bitsA bit in message correlates directly to set of checksum bits

14 WEP Vulnerabilities  Relies on flawed encryption method RC4 is crackable through statistical analysisRC4 is crackable through statistical analysis  IV’s collisions, calculate key from this Checksum is predictableChecksum is predictable  IV implemented incorrectly  Better than nothing Not on as defaultNot on as default Not end all security measureNot end all security measure  Easily Crackable (AirSnort)

15 WPA  WiFi Protected Access  Latest snapshot of 802.11i Explained laterExplained later  Rotating Keys Temporal Key Integrity ProtocolTemporal Key Integrity Protocol  Increased IV (24-48 bits)  Checksum  Order of magnitude harder to crack

16 802.1X  User not Machine Authentication  Supposed to provide a vendor- independent way to control access  Authentication through EAP (Extensible Authentication Protocol) Tokens, Kerberos, one-time passwords, certificates, etc..Tokens, Kerberos, one-time passwords, certificates, etc..

17 Other Security Attempts  802.11i IEEE attempt to provide strong securityIEEE attempt to provide strong security Dynamically updating WEP KeyDynamically updating WEP Key Not completeNot complete  VPN Providing security through VPN tunneling protocolsProviding security through VPN tunneling protocols Compatibility issues, better than WEP but not universal solutionCompatibility issues, better than WEP but not universal solution  MAC Filtering MAC addresses sent in clearMAC addresses sent in clear Easy to sniffEasy to sniff Easy to spoofEasy to spoof

18 Attacks  Passive attack to decrypt traffic Waits for keystream collisionWaits for keystream collision Gets XORGets XOR Statistically reveals plain textStatistically reveals plain text  Active attack to inject traffic RC4(X) xor X xor Y = RC4(Y)RC4(X) xor X xor Y = RC4(Y)  Unauthorized Access Points on a Network Attacker set up own access point on network effectively circumventing security measuresAttacker set up own access point on network effectively circumventing security measures Resetting access points to defaultResetting access points to default

19 Fun Demonstrations

20 War Driving

21 War Driving Silicon Valley

22 War Spying  Also called Warviewing  2.4 GHz wireless Cameras  Gear

23 Conclusion  WEP is better than nothing  Never settle for default settings  Base protection level on sensitivity of data  Provide backup network protection  Remember, anyone can sniff your wireless network.

24 Questions?


Download ppt "802.11 Wireless Insecurity By: No’eau Kamakani Robert Whitmire."

Similar presentations


Ads by Google