HACKING & INFORMATION SECURITY

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module Overview Overview of Wireless Networks Configure a Wireless Network.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
Wireless Local Area Network (WLAN)
Security in Wireless Local Area Networks
Wireless LAN Security CSE 6590.
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security in Wireless Local Area Networks
Presentation transcript:

HACKING & INFORMATION SECURITY Presents: WiFi SECURITY -With TechNext

We Are…The Speakers… Sudarshan Pawar Certified Security Expert(C.S.E.) Certified Information Security Specialist (C.I.S.S.) Security Xplained (TechNext Speaker) Computer Engg. & a Security Professional Prakashchandra Suthar Security Enthusiast Cisco Certified Network Associate Red Hat Linux Certified Security Xplained (TechNext Speaker) Computer Engg Security Researcher.

Topics to be covered Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools We are not including stats, history, who did what/when/why-> Bcoz it’s Booooring….!!! U can google them later….!

Current Generation

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

Wifi Basics WiFi(Wireless Fidelity)->Wireless networks(commonly referred as WLAN Developed on IEEE 802.11 standards Wireless networks include: Bluetooth, Infrared communication, Radio Signal etc. Components used: Wireless Client Receiver Access Point Antennas

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

Extension to a wired network (EXTENSION POINT) (BROADBAND ROUTER) (ACCESS POINT)

Multiple Access points (BROADBAND ROUTER) (ACCESS POINT-1)

LAN -2-LAN LAN-1 LAN-2

3g Hotspot Internet GPRS 3G 4G

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

How many of you have tried this???

WiFi Standards Points 802.11b 802.11a 802.11g 802.11n Extension to Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 40 (150Mbps) Frequency(Ghz) 2.4 5 2.4, 5 Pros Lowest cost; signal range is good and not easily obstructed fast maximum speed; regulated frequencies prevent signal interference from other devices fast maximum speed; signal range is good and not easily obstructed fastest maximum speed and best signal range; more resistant to signal interference from outside sources Cons slowest maximum speed highest cost; shorter range signal that is more easily obstructed costs more than 802.11b; appliances may interfere on the unregulated signal frequency standard is not yet finalized;

Are u seriously concerned about wifi security????? Be honest!

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

WEP(Wired Equivalence Privacy) The first encryption scheme made available for Wi-Fi. Uses 24 bit initialization vector for cipher stream RC4 for confidentiality CRC-32 bit checksum for integrity. Typically used by home users. Uses 64,128, 256 bit keys Flawed from the get go.

WEP Working WEP Key IV KEY STORE KEYSTREAM DATA ICV XOR ALGO. PAD KID RC4 CIPHER WEP Key IV KEY STORE KEYSTREAM DATA ICV XOR ALGO. CRC 32 CHECKSUM PAD KID CIPHERTEXT IV WEP ENCRYPTED PACKET(MAC FRAME)

WEP Weakness Key management and key size 24 bit IV size is less. The ICV algorithm is not appropriate Use of RC4 algorithm is weak Authentication messages can be easily forged

Wep Broken beyond repair

WPA (Wi-Fi Protected Access) Data Encryption for WLAN based on 802.11 std. Improved Encryption & Authentication Method. Uses TKIP Based on WEP Michael algorithm Hardware changes not required Firmware update Types Personal 2. Enterprise PSK 802.1x + RADIUS

WPA Working Temporary Encryption key Transmit Address T.S.C. KEYSTREAM RC4 CIPHER Temporary Encryption key Transmit Address T.S.C. KEYSTREAM KEY MIXING WEP SEED MAC HEADER IV KID EIV CIPHER TEXT ( PACKET TO BE TRANSMITTED ) MSDU MIC KEY MICHAELS ALGORITHM MSDU + MIC KEY MPDU ICV

WPA2 Long Term Solution (802.11) Stronger Data protection & Network access control Used CCMP Based on AES Hardware changes required Types Personal Pre Shared Key Enterprise 802.1x + RADIUS

WPA2 Working Source: EC Council

Source: someecards

Breaking WPA/WPA2 Dictionary Attacks(Not so successful, but yeah some time…) Brute Force(tools like: Kismac, Aireplay etc) WPA PSK

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

Security breaching sequence Find the network Study its traffic Study Security mechanisms ATTACK!!!!!!!! (i.e. Decrypt the packets)

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

DOS BEFORE ATTACK

Access point is busy handling attackers request AFTER ATTACK

Man In The Middle Attack(MITM) Before

After…

ARP Poisoning/Spoofing Source: http://securitymusings.com/wp-content/uploads/2008/12/arp-spoofing.png

WiFi JAMMING….

WiFi JAMMING….

Fake Access Points SSID: XYZ Bank

Fake Access Points SSID: XYZ Bank

Basics of Wifi Types of wireless networks Wireless Standards(802.11 series) Encryption Algorithms Wireless hacking methodology ATTACKS(commonly encountered) Staying secure(Defense) Security Tools

Defense against WPA / WPA2 attacks Extremely Complicated keys can help Passphrase should not one from dictionary, so use uncommon-senseless words. Key should be more than 20 chars with combination of special chars, numbers, alphabets. Change them at regular intervals.

#eY,t#!$c@/\/_B-gUd0n3?@$sW0rD

Security Checkboxes WPA instead of WEP WPA2 Enterprise implementation Place AP at secured location. Centralized authentication & Update Drivers regularly. Changing default SSID after Configuring WLAN Firewall policies & Router access Password

Security Checkboxes(contd…) MAC add. Filtering Encryption at Access Point Packet Filtering between AP Network Strength configuration. Use Ipsec’s for encryption on WLANS Check out for Rogue Access Points

Wi-Fi Security Auditing Tools AirMagnet Wifi Analyzer AirDefense Adaptive wireless IPS ARUBA RF Protect WIPS And many others…

?

Questions? What you want to ask, many already have that same question on their mind. Be bold and lead OK, if you don’t want to speak and keep shut and keep thinking about it in your mind and take those questions home, make sure you email those to us and sleep well at night!

What should be our topic for the next meet? I hate to ask but, how can we make this better?