Wireless Networks: There Be Dragons!

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
ECE 578: COMPUTER NETWORK AND SECURITY
1 Chapter Overview Wireless Technologies Wireless Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Wireless Networks Tamus, Zoltán Ádám
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Lecture 24 Wireless Network Security
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wi-Fi Technology.
Wireless Networks Dave Abbott.
Advanced Penetration testing
TERMINOLOGY Define: WPAN
By Sachin Kumar Korenga & Rochita Thakkallapally
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Securing A Wireless Network
Chapter 6 Wireless and Mobile Networks
Wireless Fidelity 1 1.
Wireless Network Security
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Chapter 4: Wireless LANs
Telecommunications, the Internet, and Wireless Technology
Wireless Networking Chapter 23.
Advanced Penetration testing
Wireless Security.
Wireless LAN Security 4.3 Wireless LAN Security.
802.11b Wireless Network Security
IS4680 Security Auditing for Compliance
Risks of Wireless Access Points
WLAN Security Antti Miettinen.
Telecommunications, the Internet, and Wireless Technology
Antti Miettinen (modified by JJ)
By Markus Kriechhammer
Bluetooth Bluetooth is a wireless LAN technology designed to connect devices of different functions when they are at a short distance from each other A.
LM 5. Wireless Network Security
Presentation transcript:

Wireless Networks: There Be Dragons! Marc Rogers PhD, CISSP Director of Information Security Services Manageworx Infosystems Inc.

Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Agenda The business impact of wireless Wireless Networking basics Brief history of WLAN WLAN threats (802.11b) WLAN risk mitigation Conclusions Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 The Impact Wireless is at the same state today that the Internet was in 1995 As of 2003, 1/5th of the world’s population using wireless devices WLAN Business Drivers: Faster realization of ROI 32 users with a total cost of ownership of $20,000 over three years would deliver a benefit of $300,000 over a three-year period. 150 users with a total cost of ownership of $60,000 over three years would deliver a benefit of $1,000,000 over a three-year period. 1000 users with a total cost of ownership of $400,000 over three years would deliver a benefit of $5,000,000 over a three-year period. (Source: IntelFinance 2002) Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Growth of WLAN Source: Gartner 2002 Copyright (C) Manageworx 2003

Vertical Mobile Application Trends Copyright (C) Manageworx 2003

Impact of Mobile Applications Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Basic Overview Wireless Networks Transport mechanism between devices and the traditional wired networks Covers various technologies 2G Cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communication (GSM), WLAN Ad Hoc Networks Shifting network topologies Short distances Blue tooth Cell phones Laptops PDAs Wireless LANS (WLANS) Connects computers and other components to networks using an access point device 802.11 IEEE Standard Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 WLAN History Late 1980’s Motorola developed the first commercial WLAN 1990 – IEEE initiated the 802.11 project 1997 - IEEE approves the 802.11 international interoperability standard 1999 – IEEE ratifies the 802.11a & 802.11b wireless network communication standard 802.11b is the current, most used standard Frequency 2.4GHz – 2.5GHz Industrial, Scientific, and Medical (ISM) Maximum transmission speed 11Mbits per second 802.11a is soon to be released 5 GHz frequency 54 Mbps Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 WLAN Threats All the vulnerabilities that exist in a wired network Plus others General consensus on at least 8 top issues Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 WLAN Security Top 8 Security Issues with 802.11b Access Point Mapping SSID Broadcasting SSID Naming Conventions Security Architecture Radio Frequency Management Default Settings Encryption Authentication Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 1. Access Point Mapping Access points can be monitored and located using freely available software, known as ‘war driving.’ Mapping tools can give you information that can allow you to become part of their network, such as channel number (you can change the name of your wireless to match the ssid, and at that point you can actually become part of the network, as long as they assign you an ip address, through dhcp, or if you can sniff an ip address you can simply change yours to match. You also get longitude and latitude parameters with gps capabilities. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 1. Access Point Mapping By getting the latitude and longitude parameters from the software, you can know exactly where the access points are, and at that point you can basically do anything you like within the realm of your creativity. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 2. SSID Broadcasting SSID = Company A SSID = Company A SSID SSID The ssid is essentially the network name, which allows an attacker to simply change the network name on his/her laptop, which in effect allows the attacker to become part of the network. That’s all it really takes. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 3. SSID Naming Conventions SSID = tsunami SSID Default SSID Cisco = tsunami 3COM = 101 Agere = WaveLAN Linksys = Linksys Dlink = default Vendors will have ‘default’ ids and passwords set that can be used by attackers. Shown in the box is the default Cisco wireless id. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 4. Security Architecture Internet DMZ (Web Servers, Mail Servers) Firewall If you’ve got an access point in the internal network, then you’ve basically opened it up to everyone. A better to solution is to create a dmz where you have an access point, which is shown on the next slide. Internal Network Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 5. Radio Frequency Management Building A Parking Lot Poor RF management will lead to unnecessary transmission of your RF signal into unwanted areas. Also consider other devices which may cause interference such as 2.4GHz cordless phones or Bluetooth. Making sure that your footprint doesn’t go past what you can control. Bluetooth can impact the availability of your 802.11b network, because bluetooth can disrupt your signals (that’s why they don’t allow you to use your cellphones in hospitals, etc.) Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 6. Default Settings Most Access Points come with no security mechanisms enabled. Unless you take some steps to increase the security of the ‘default’ shipment of wireless, then you don’t really have any security at all. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 7. Encryption Most Access Points are implemented without using some form of Encryption. Clear Text Passwords IP Addresses Encryption can protect your wireless transmissions. Company Data Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Top 802.11b Security Issues 8. Authentication 802.11b does not contain adequate authentication mechanisms. The two forms of authentication included with 802.11b are Open System Authentication (OSA) and Shared Key Authentication (SKA). Open System Authentication All you need is the SSID Negotiation is done in clear text Shared Key Authentication SSID and WEP Encrypted key required Request (SSID) Accepted (SSID) Challenge Text (WEP) Challenge Response (WEP) You need to add user and device authentication to increase the security of your wireless networks. Eg, two-factor, radius, tacacs, vpns,etc. Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Risk Mitigation Management Countermeasures Security Policy WLAN specific Policy Operational Countermeasures Physical security Access controls Placement of the AP Location Range Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Risk Mitigation Technical Countermeasures Hardware/Software solutions Access Point configuration Updating default passwords Proper encryption settings Controlling the reset function MAC ACL functionality Changing the SSID Changing the default crypto keys Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Risk Mitigation Technical Countermeasures (cont’d) Change default SNMP parameter Change default channel DHCP Authentication VPNs BIOMETERICS Personal firewalls IDS Security Assessments Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Conclusions Wireless technology is in boom phase Businesses are “leaping” into the wireless arena Caution is required Still an evolving technology WLAN has risks Need to properly manage the “risk” No magic bullet for complete protection Treat WLAN traffic as “Untrusted” traffic Copyright (C) Manageworx 2003

Wireless Security Tools Net Stumbler http://www.netstumbler.com WEP Crack http://wepcrack.sourceforge.net MAC Stumbler http://macstumbler.com Airsnort http://airsnort.shmoo.com Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 QUESTIONS Copyright (C) Manageworx 2003

Copyright (C) Manageworx 2003 Contact Information Dr. Marc Rogers (204) 989-8750 mkr@manageworx.com www.manageworx.com Copyright (C) Manageworx 2003