Wireless LAN Security Oleh: R. Muhamad Ramadan
Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain free internet access Hackers (Crakers) Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs Employees Plug consumer-grade APIs/gateways into company Ethernet ports to create their own WLANs Rogue Access Point is an access point placed on a WLAN that is used to interfere with normal network operation.
Ancaman Thd Keamanan Wireless 2 Man-in-the-Middle Attacks AP Client Attacker collects information Attacker intercepts traffic
Ancaman Thd Keamanan Wireless 3 Denial of Service b dan g menggunakan unlicensed 2.4 GHz ISM band. Band ini digunakan oleh banyak produk pelanggan spt microwave oven, cordless phone, dll.
Denial of Service Common consumer devices can Interfere with WLAN devices Causing denial of service
Denial of Service Attacker turns laptop into an access point. Attacker can send CTS messages or disassociate commands Clients flood WLAN causing collisions and denying service
Wireless Security Protocols 1 Wireless Protocol Overview
Wireless Security Protocols 2a Authenticating to the Wireless LAN Access PointClient Association
Wireless Security Protocols 2b Authenticating to the Wireless LAN AuthenticatorSupplicant EAP
Wireless Security Protocols 3 Encryption
Securing Wireless LAN Controlling Access to the Wireless LAN Methods for controlling wireless LAN access: SSID broadcasts from access points are off MAC Address filtering is enabled WPA2 Security implemented
Securing Wireless LAN Controlling Access to the Wireless LAN Probe request: SSID = NULL No probe respone MAC address not recognized Meets all requirements