Chapter 5 Protecting Wireless Networks

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security+ Guide to Network Security Fundamentals, Third Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Security Awareness Chapter 5 Wireless Network Security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
Wireless Networking 102.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Chapter 8 Wireless Network Security
Wireless Access Point Product Overview
Chapter 5 LANs and WLANs.
Wireless Ethernet Programming
Wireless Networks Dave Abbott.
Advanced Penetration testing
Security+ Guide to Network Security Fundamentals, Fifth Edition
TERMINOLOGY Define: WPAN
Re-evaluating the WPA2 Security Protocol
CompTIA Security+ Study Guide (SY0-401)
CS1: Wireless Communication and Mobile Programming
Instructor Materials Chapter 6 Building a Home Network
Intro to MIS – MGS351 Network Basics
Wireless Technologies
Chapter 4 Computer Networks – Part 2
Wireless Protocols WEP, WPA & WPA2.
Wireless Access Point Product Overview
WEP & WPA Mandy Kershishnik.
Wireless Fidelity 1 1.
Presented by: Jeffrey D. Bombell, American Computer Technologies
Chapter 4: Wireless LANs
Firewalls.
Network Basics Extended Learning Module E
Wireless Networking Chapter 23.
Advanced Penetration testing
Chapter 12 Communications Security & Countermeasures
On and Off Premise Secure Access
Wireless LAN Security 4.3 Wireless LAN Security.
Chapter 6 Networks Communicating and Sharing Resources
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Chapter 5 Protecting Wireless Networks Security+ Chapter 5 Protecting Wireless Networks Modified 9/13/2016- jw

TJX Data Breach TJX used WEP security They lost 45 million customer records They settled the lawsuits for $40.9 million http://www.bankinfosecurity.com/articles.php?art_id=791

Man charged with hacking neighbor's Wi-Fi http://www.networkworld.com/article/2212621/malware-cybercrime/man-charged-with-hacking-neighbor-s-wi-fi-to-threaten-biden.html

Wireless router hijacked for child pornography Sarasota attorney Malcolm Riddell’s wireless router was used by a boat captain in Sarasota Bay, FL to download 10 million files of child pornography http://www.heraldtribune.com/article/20110131/ARTICLE/101311038

Chapter 5: Protecting Wireless Networks Describe the different types of wireless network attacks List the vulnerabilities in IEEE 802.11 security Explain the solutions for securing a wireless network

Introduction Wireless data communications have revolutionized computer networking Benefits of Wireless Increased flexibility Increased productivity Reduced costs Ability to grow and adapt to changing requirements 4.1.1.2 Benefits of Wireless

Introduction continued Wireless data networks have been targets for attackers Attacks can be directed against: Bluetooth systems Near field communication devices Wireless local area networks

Wireless Technologies

Bluetooth An IEEE 802.15 WPAN standard Personal Area Network (PAN) technology Uses a device-pairing process to wirelessly and virtually instant communication over distances up to .05 mile (100m). Uses short-range radio frequency transmissions Provides for rapid, ad-hoc device pairings Example: smartphone and Bluetooth headphones’

Cars Hands-free Calling Drive Smart, Drive Safe Consumer Electronics Music Photos & Video Home Entertainment Computers Health & Fitness Medical & Health Devices Sports & Fitness Devices Phones Smart Home http://www.bluetooth.com/Pages/Product-Directory.aspx

Bluetooth Two types of Bluetooth network topologies Piconet Scatternet

Bluetooth (cont’d.) Piconet Established when two Bluetooth devices come within range of each other One device (master) controls all wireless traffic Other device (slave) takes commands Active slaves can send transmissions Parked slaves are connected but not actively participating

Bluetooth (cont’d.) Scatternet Group of piconets with connections between different piconets Bluetooth scatternet © Cengage Learning 2012

Bluetooth Attacks Bluejacking Attack that sends unsolicited messages to Bluetooth-enabled devices Text messages, images, or sounds Considered more annoying than harmful No data is stolen

Bluetooth Attacks (cont’d.) Bluesnarfing Unauthorized access to wireless information through a Bluetooth connection Often between cell phones and laptops Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge

Bluetooth Attacks (cont’d.) Bluebugging Similar to Bluesnarfing, but the Attackers has full unauthorized access to a wireless device through a Bluetooth connection http://www.localsyr.com/content/news/real_deal/story/BBB-warns-of-Bluetooth-hacking-scams-The-Real-Deal/d/story/eAAJq9Dsu02cjD4ZZ8HKjQ

Near Field Communication (NFC) Near field communication (NFC) –Low speed and low power technology for smartphones and smart cards Used to establish communication between devices in close proximity Once devices tapped together or brought within several centimeters each other two-way communication established NFC’s ease of use opened door for wide range of practical short-range communications Near Field Communication (NFC) Near field communication (NFC) –Low speed and low power technology for smartphones and smart cards Used to establish communication between devices in close proximity Once devices tapped together or brought within several centimeters each other two-way communication established NFC’s ease of use opened door for wide range of practical short-range communications

NFC Contactless Payment NFC devices increasingly used in contactless payment systems so consumer can pay for purchase by tapping store’s payment terminal with smartphone Users store credit card and/or store loyalty card information in “virtual wallet” the smartphone to pay for purchases at NFC-enabled point-of-sale (PoS) checkout device NFC contactless payment systems has risks because of the nature of this technology NFC Contactless Payment NFC devices increasingly used in contactless payment systems so consumer can pay for purchase by tapping store’s payment terminal with smartphone Users store credit card and/or store loyalty card information in “virtual wallet” the smartphone to pay for purchases at NFC-enabled point-of-sale (PoS) checkout device NFC contactless payment systems has risks because of the nature of this technology

NFC Contactless Payment System Contactless Payment System (Figure 9-3) A figure. A hand holding a smartphone is help inches above a point-of-sale terminal.

NFC risks and defenses NFC risks and defenses (Table 9-2) A table with three columns and five rows. The first row is composed of column headers: Vulnerability, Explanation, and Defense. Row 2. Vulnerability: Eavesdropping Explanation: The NFC communication between device and terminal can be intercepted and viewed. Defense: Because an attacker must be extremely close to pick up the signal, users should be aware of this. Also, some NFC applications can perform encryption. Row 3. Vulnerability: Data manipulation Explanation: Attackers can jam an NFC signal so transmission cannot occur. Defense: Some NFC devices can monitor for data manipulation attacks. Row 4. Vulnerability: Man-in-the-middle attack Explanation: An attacker can intercept the NFC communications between devices and forge a fictitious response. Defense: Devices can be configured in active-passive pairing so one device only sends while the other can only receive. Row 5. Vulnerability: Device theft Explanation: The theft or loss of a smartphone could allow an attacker to use that phone for purchases. Defense: Smartphones should be protected with passwords or PINs.

Wireless Application Protocol Data transmission standard for accessing information over a mobile wireless network equivalent to TCP/IP A WAP browser is a web browser for mobile devices such as mobile phones that use WAP. Considered to be legacy because of HTML browsers on mobile devices

Institute of Electrical and Electronics Engineers (IEEE) In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802

Institute of Electrical and Electronics Engineers (IEEE) In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks) At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps) In 1997, the IEEE approved the IEEE 802.11 WLAN standard

IEEE 802.11 WLAN Standard Revisions IEEE 802.11a – 54Mbps 5GHz Specifies maximum rated speed of 54Mbps using the 5GHz spectrum IEEE 802.11b – 11Mbps 2.4GHz Ratified in 1999 IEEE 802.11g – 54Mbps 2.4Ghz Preserves stable and widely accepted features of 802.11b Increases data transfer rates similar to 802.11a

IEEE 802.11 WLAN Standard Revisions continued IEEE 802.11n – >100Mbps 2.4 & 5GHz Ratified in 2009 Improvements in IEEE 802.11n Multiple input/multiple output (MIMO) Speed – minimum 100Mbps Throughput Coverage area Interference Security

IEEE 802.11 WLAN Standard Revisions continued IEEE 802.11ac – Gigabit Wi-Fi 5Ghz Expected throughput of at least 1Gbps Initial products – up to 500Mbps throughput IEEE 802.11ad – WiGig Operates in 2.4GHz, 5GHz and 60Ghz Up to 7Gbps within line of sight using 60GHz Initial products in 2015

802.11 Standards 4.1.1.5 802.11 Standards

Wireless NICs Wireless deployment requires: End devices with wireless NICs Infrastructure device, such as a wireless router or wireless AP 4.1.2.1 Wireless NICs

Access Points Access point (AP) major parts Antenna and radio transmitter/receiver send and receive wireless signals Bridging software to interface wireless devices to other devices Wired network interface allows it to connect by cable to standard wired network

Access Points (cont’d.) AP functions Acts as “base station” for wireless network Acts as a bridge between wireless and wired networks Can connect to wired network by a cable

Access Points (cont’d.) Autonomous access points (WAP) Separate from other network devices and access points Have necessary “intelligence” for wireless authentication, encryption, and management Thin access point or Lightweight access points (LWAP) An access point without the authentication and encryption functions These features reside on the wireless switch or wireless controller

Access Points (cont’d.) Wireless Router - Multi-function Device Incorporates a switch, router, and wireless access point. Provides routing, switching and wireless connectivity.   Wireless routers, are simple in design and used in home networks providing services such as NAT and DHCP 11.5.1.1 Multi-function device 11.5.1.2 Types of Integrated Routers

Wireless Home Router A home user typically interconnects wireless devices using a small, integrated wireless router. These serve as: Wireless Access point Ethernet switch Router Firewall (Some Models) 4.1.2.2 Wireless Home Router

Access Points (cont’d.) Wireless networks have been vulnerable targets for attackers Not restricted to a physical location

Wireless Threats 4.3.1.1 Securing Wireless

Wireless LAN Attacks Types of wireless LAN attacks Discovering the network Attacks through the RF spectrum Attacks involving access points

Wireless LAN Attacks (cont’d.) Discovering the network One of the first steps in an attack is to discover presence of a network Beaconing APs send beacon frames at regular intervals to announce the SSID (network name) Wireless devices passively scan for beacon frames

War driving Process of passive discovery of wireless network locations Table 8-2 War driving tools

War chalking Documenting and then advertising location of wireless LANs for others to use Previously done by drawing on sidewalks or walls around network area Today, locations are posted on Web sites War chalking symbols © Cengage Learning 2012

Wireless LAN Attacks (cont’d.) Attacks through the RF spectrum Wireless protocol analyzer Generating interference Wireless traffic captured to decode and analyze packet contents Network interface card (NIC) adapter must be in correct mode

Wireless LAN Attacks (cont’d.) Six modes of wireless NICs Master (acting as an AP) Managed (client) Repeater Mesh Ad-hoc Monitor

Wireless LAN Attacks (cont’d.) Interference Signals from other devices can disrupt wireless transmissions Devices that can cause interference with a WLAN Microwave ovens Elevator motors Copy machines Outdoor lighting (certain types) Theft protection devices Bluetooth devices Other 802.11 Wireless Devices

Requires a powerful transmitter

Wireless LAN Attacks (cont’d.) Attacks using access points Rogue access points Evil twins Rogue access point Unauthorized access point that allows attacker to bypass network security configurations May be set up behind a firewall, opening the network to attacks

Rogue access point © Cengage Learning 2012

Wireless LAN Attacks (cont’d.) Man-in-the-Middle Attack “Evil twin AP” attack: A popular wireless MITM attack where an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are hotbeds for this type of attack due to the open authentication. Connecting wireless clients would see two APs offering wireless access. Those near the rogue AP find the stronger signal and most likely associate with the evil twin AP. User traffic is now sent to the rogue AP, which in turn captures the data and forwards it to the legitimate AP. Return traffic from the legitimate AP is sent to the rogue AP, captured, and then forwarded to the unsuspecting STA. 4.3.1.4 Man-in-the-Middle Attack

Vulnerabilities of IEEE 802.11 Security Original IEEE 802.11 committee recognized wireless transmissions could be vulnerable Implemented several wireless security protections in the standard Left others to WLAN vendor’s discretion Protections were vulnerable and led to multiple attacks

MAC Address Filtering Method of limiting / controlling WLAN access Media Access Control (MAC) address filtering Used by nearly all wireless AP vendors Permits or blocks device based on MAC address

MAC Address Filtering

MAC Address Filtering Usually implemented by permitting instead of preventing

MAC Address Filtering Weaknesses Addresses exchanged in unencrypted format An attacker can just sniff for MACs Scalability Issues - Managing a large number of MAC addresses is difficult MAC address filtering does not provide a means to temporarily allow a guest user to access the network Other than manually entering the user’s MAC address into the access point

MAC Address Filtering Weaknesses MAC Address Spoofing – Easy to accomplish since many operating systems have built in tools Technitium’s freeware MAC Address Changer software allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. Supports - Windows 2000/XP/Server 2003/Vista/Server 2008/7/Server 2008 R2/8/Server 2012 http://www.technitium.com/

SSID Broadcast Each device must be authenticated prior to connecting to the WLAN Open system authentication Device discovers wireless network and sends association request frame to AP Frame carries Service Set Identifier (SSID) User-supplied network name Can be any alphanumeric string 2-32 characters long AP compares SSID with actual SSID of network If the two match, wireless device is authenticated

Open System Authentication

SSID Broadcast (cont’d.) Open system authentication is weak Based only on match of SSIDs Attacker can wait for the SSID to be broadcast by the AP Users can configure APs to prevent beacon frame from including the SSID Provides only a weak degree of security Can be discovered when transmitted in other frames Older versions of Windows XP have an added vulnerability if this approach is used

Turning Off Beaconing For "security" some people turn off beacons This can annoy your legitimate users, who must now type in the SSID to connect It doesn't stop intruders, because the SSID is sent out in management frames anyway It can also affect roaming Many Operating Systems prefer networks that broadcast

Wired Equivalent Privacy (WEP) IEEE 802.11 security protocol Designed to ensure that only authorized parties can view transmitted wireless information Encrypts plaintext into ciphertext Uses encryption to protect traffic WEP was designed to be: Efficient and reasonably strong Secret key is shared between wireless client device and AP Key used to encrypt and decrypt packets

Wired Equivalent Privacy (WEP) WEP vulnerabilities WEP can only use 64-bit or 128-bit number to encrypt Initialization vector (IV) is only 24 of those bits Short length makes it easier to break

WEP encryption process © Cengage Learning 2012

Wired Equivalent Privacy (cont’d.) WEP vulnerabilities (cont’d.) Violates cardinal rule of cryptography: avoid a detectable pattern Attackers can see duplication when IVs start repeating Keystream attack (or IV attack) Attacker identifies two packets derived from same IV Uses XOR to discover plaintext

Cracking WEP With the right equipment, WEP can be cracked in just a few minutes You need a support wireless card Kismet Aircrack-ng

Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) - Optional means of configuring security on wireless local area networks Designed to help users with limited knowledge of security to quickly and easily implement security on their WLANs Accomplished by pushing button or entering PIN Design and implementation flaws in WPS using PIN method makes it vulnerable Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) - Optional means of configuring security on wireless local area networks Designed to help users with limited knowledge of security to quickly and easily implement security on their WLANs Accomplished by pushing button or entering PIN Design and implementation flaws in WPS using PIN method makes it vulnerable

Wireless Security Solutions Unified approach to WLAN security was needed IEEE and Wi-Fi Alliance began developing security solutions Resulting standards used today IEEE 802.11i WPA and WPA2

Wi-Fi Protected Access (WPA) Introduced in 2003 by the Wi-Fi Alliance A subset of IEEE 802.11i Design goal: protect present and future wireless devices Temporal Key Integrity Protocol (TKIP) Encryption Used in WPA Uses longer 128 bit key than WEP Dynamically generated for each new packet

Wi-Fi Protected Access (cont’d.) Preshared Key (PSK) Authentication After AP configured, client device must have same key value entered Key is shared prior to communication taking place Uses a passphrase to generate encryption key Key must be entered into both the access point and all wireless devices Not used for encryption Instead, it serves as the starting point (seed) for mathematically generating the encryption keys

Wi-Fi Protected Access (cont’d.) WPA support also supports Enterprise Authentication   Requires a Remote Authentication Dial-In User Service (RADIUS) authentication server. Provides additional security. Users must authenticate using 802.1X standard, which uses the Extensible Authentication Protocol (EAP) for authentication. 4.3.2.4 Authenticating a Home User

Wi-Fi Protected Access (cont’d.) Vulnerabilities in WPA Key management Key sharing is done manually without security protection Keys must be changed on a regular basis Key must be disclosed to guest users Passphrases PSK passphrases of fewer than 20 characters subject to cracking

Cracking WPA With the right equipment, WPA can be cracked in just a few minutes You need a support wireless card Kismet Aircrack-ng Source: 3/21/2011 http://www.backtrack-linux.org/forums/

Wi-Fi Protected Access 2 (WPA2) Second generation of WPA known as WPA2 Introduced in 2004 Based on final IEEE 802.11i standard Uses Advanced Encryption Standard (AES) Supports both PSK (Personal) and IEEE 802.1x (Enterprise) authentication AES-CCMP Encryption Encryption protocol standard for WPA2 CCM is algorithm providing data privacy CBC-MAC component of CCMP provides data integrity and authentication

Wi-Fi Protected Access 2 (cont’d.) AES encryption and decryption Should be performed in hardware because of its computationally intensive nature IEEE 802.1x authentication Originally developed for wired networks Provides greater degree of security by implementing port security Blocks all traffic on a port-by-port basis until client is authenticated Radius Server AP Client

Components Required for 802.1x Authentication Authentication server is an EAP-capable RADIUS server: Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis Local authentication service on Cisco IOS access point May use either local RADIUS database or an external database server such as Microsoft Active Directory Authenticator is an 802.1x-capable access point. Supplicant is an EAP-capable client: Requires 802.1x-capable driver Requires an EAP supplicant—either available with client card, native in operating system, or from third-party software This topology shows the components that a system needs for 802.1x authentication. An authentication server is required for 802.1x. 802.1x uses a RADIUS server to authenticate clients to the network. An authenticator can be a device such as a switch or an access point. This device operates on the enterprise edge, meaning that the device is the interface between the enterprise network and the public or semipublic network, where security is most needed. The client device contains a supplicant. The supplicant sends authentication credentials to the authenticator, and the authenticator then sends the information to the authentication server. At the authentication server, the login request is compared to a user database to determine whether and at what level the user is granted access to network resources.

Wi-Fi Protected Access 2 (cont’d.) Extensible Authentication Protocol (EAP) Authentication for WPA2 Enterprise model uses IEEE 802.1x standard Framework for transporting authentication protocols Defines message format Uses four types of packets Request Response Success Failure EAP created as more secure alternative than weak Challenge-Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) EAP is framework but not authentication protocol

EAP Protocols Lightweight EAP (LEAP) Protected EAP (PEAP) Proprietary method developed by Cisco Systems Requires mutual authentication used for WLAN encryption using Cisco client software Can be vulnerable to specific types of attacks No longer recommended by Cisco Protected EAP (PEAP) Simplifies deployment of 802.1x by using Microsoft Windows logins and passwords Creates encrypted channel between client and authentication server

Wireless Security Overview Use authentication and encryption to secure a wireless network. 4.3.2.1 Wireless Security Overview

Shared Key Authentication Methods

Table 8-3 Wireless security solutions

Enterprise Wireless Security Devices Thin Access Point or Lightweight Access Point (LWAP) An access point without the authentication and encryption functions These features reside on the wireless switch or wireless controller Advantages The APs can be managed from one central location All authentication is performed in the wireless switch

Enterprise Wireless Security Devices (continued) For larger organizations with many APs, controller-based managed solutions are used to simplify the wireless deployment. Using this architecture, APs are centrally managed from a controller in the cloud. 4.1.2.6 Large Wireless Deployment Solutions

Enterprise Wireless Security Devices (continued) 4.1.2.7 Large Wireless Deployment Solutions, Cont.

Enterprise Wireless Security Devices (continued) Wireless VLANs Can segment traffic and increase security The flexibility of a wireless VLAN depends on which device separates the packets and directs them to different networks

Enterprise Wireless Security Devices (continued) For enhanced security, set up two wireless VLANs One for employee access One for guest access

Site Survey In-depth examination and analysis of wireless LAN site Several reasons for conducting a site survey (example: achieving best possible performance from WLAN) Can be used to enhance security of WLAN Survey can provide optimum location of APs so minimum amount of signal extends past boundaries of organization to be accessible to attackers Site Survey Site survey - In-depth examination and analysis of wireless LAN site Several reasons for conducting a site survey (example: achieving best possible performance from WLAN) Can also can be used to enhance security of WLAN Survey can provide optimum location of APs so minimum amount of signal extends past boundaries of organization to be accessible to attackers

Antenna Types Antennas generally fall into two categories: Directional Radiate RF energy equally in all horizontal directions. Radiate RF energy predominantly in one direction. Antennas generally fall into two categories: Directional Omnidirectional

Antenna Types Vendor ranges are usually optimized for best conditions. A link distance can exceed standard distances, if consistently higher error rates are acceptable.

Antenna Types (cont’ d) Different types of antennas can be used to increase or reduce signals in certain directions

Wireless Power Level Controls Wireless Power can be: Increased (gain) Decreased (loss) Wireless power levels become very small, very quickly after leaving the transmitting antenna. Wireless power levels do not decrease linearly with distance, but decrease inversely as the square of the distance increases.

Wireless Power Level Controls Inverse Square Law Signal strength does not fade in a linear manner, but inversely as the square of the distance. If you are a particular distance from an access point and you move measure the signal level, and then move twice a far away, the signal level will decrease by a factor of four. Twice the distance Point A Point B ¼ the power of Point A

Wireless Power Level Controls As signal strength decreases, so will the transmission rate and the distances wireless signals travel. Reduce Transit Power on Access Point to limit wireless signal range

Wi-Fi-Blocking Wallpaper Protects Your Web Fortress by Keeping Neighbors Out http://www.itproportal.com/2012/05/08/anti-wi-fi-wallpaper-go-sale-2013-costs-tad-more-normal-ones/#ixzz1uHFfOUzq

Rogue AP Detection Several methods to detect rogue AP: Wireless device probe - Standard wireless device (i.e. portable laptop computer) can be configured as wireless probe Desktop probe – Desktop computer used as probe Access point probe – APs can detect neighboring APs Dedicated probe – Exclusively monitor RF frequency for transmissions Rogue AP Detection Several methods to detect rogue AP: Wireless device probe - Standard wireless device (portable laptop computer) can be configured as wireless probe Desktop probe – Desktop computer used as probe Access point probe – APs can detect neighboring APs Dedicated probe – Exclusively monitor RF frequency for transmissions

Rogue Access Points Organizations are becoming increasingly concerned about existence of rogue APs Rogue access point discovery tools Security personnel can manually audit airwaves using wireless protocol analyzer Continuously monitoring the RF airspace using a wireless probe

Rogue Access Point Video Video: Hacking at LAX Airport https://www.youtube.com/watch?v=lFo49yL06Qg

Follow-up http://news.yahoo.com/minnesota-wi-fi-hacker-gets-18-years-prison-032803295.html

Summary Bluetooth is a wireless technology using short-range RF transmissions IEEE has developed five wireless LAN standards to date, four of which are popular today (IEEE 802.11a/b/g/n) Attackers can identify the existence of a wireless network using war driving Wired Equivalent Privacy relies on a secret key shared between wireless client device and access point

Summary (cont’d.) Wi-Fi Protected Access (WPA) and WPA2 have become the foundations of wireless security today Other steps to protect a wireless network include: Antenna positioning Access point power level adjustment Detecting rogue access points