Basic Network Security Perimeter devices – Firewall – Intrusion Detection/Prevention System – URL Filter/Web proxy – Spam filter If an attacker successfully.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Networking Wireless Vulnerabilities and Attacks Module-10 Jerry Bernardini Community College of Rhode Island 6/24/20151Wireless Networking J.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Web server security Dr Jim Briggs WEBP security1.
Computer Networks IGCSE ICT Section 4.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Securing a Wireless Network
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Ft. Smith Evil Twin Access Points: For fun but no profit.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
WEP Protocol Weaknesses and Vulnerabilities
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Wireless Network Design Principles Mobility Addressing Capacity Security.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Computer Security By Duncan Hall.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Chapter 10.  Upon completion of this chapter, you should be able to:  Understand.
Chapter-7 Basic Wireless Concepts and Configuration.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Network Security
CSE 4905 Network Security Overview
Security in Networking
Network Security: IP Spoofing and Firewall
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

Basic Network Security Perimeter devices – Firewall – Intrusion Detection/Prevention System – URL Filter/Web proxy – Spam filter If an attacker successfully breaches your wireless infrastructure, how valuable are your perimeter security devices? 10/15/2013CST Security1

Basic Network Security 10/15/2013CST Security2

Defining Wi-Fi Security How does one define Wi-Fi security? – Encryption of the data – Encryption of the transmission medium – Environmental shielding – User education Let’s take a closer look at attacks and countermeasures… 10/15/2013CST Security3

Attack Techniques How do attackers break into Wi-Fi networks? Are all attacks meant to gain unauthorized access? – No. Are all attacks technical in nature? – No. 10/15/2013CST Security4

Social Engineering Wiley attackers use knowledge gained through illegitimate means to present themselves as an initiated member of a company – After dumpster diving, an attacker may discover a hidden SSID written down on a post-it note – The attacker calls the help desk, pretending to be an employee – The attacker mentions the name of the hidden SSID but states that they have forgotten the WPA key Maybe the help desk agent gives them the WPA key… 10/15/2013CST Security5

Social Engineering Recognize this guy? – Kevin Mitnick – Once the most wanted computer criminal in the United States – Social Engineering since age 12. – Compromised systems without using hacking tools – only codes/passwords he obtained through social engineering. 10/15/2013CST Security6

Social Engineering Targets The Help Desk – Often holds the keys to accessing the wi-fi network – Can sometimes fall into routine of assisting users without asking for verification Verifying users may also not be a part of the company policy on the whole. – Often under-trained, from a security perspective. Attackers will often portray a user who is very smart, or very dumb, to get the info they want. – Some attackers will threaten users with manager engagement This is where having a good manager comes in… 10/15/2013CST Security7

Social Engineering Targets On-site Contractors – Not fully invested in the company, not loyal – May receive more access than necessary Contractors may also become the attackers – Too much access + excessive curiosity = potential for compromise – Mr. Mitnick is a good example. 10/15/2013CST Security8

Social Engineering Targets Employees/end users – Sometimes credentials are shared in order to provide access to resources on an interim basis There may be a lack of understanding of accountability – Wireless keys/passwords may be on post-its in plain sight – Leaving systems unlocked – Receiving calls from the “help desk” to confirm their credentials 10/15/2013CST Security9

Social Engineering Countermeasures Education, education, EDUCATION! – Ensure that your users know better than to leave passwords or WiFi keys written down Introduce software such as KeePass to users for storage of passwords and keys – Ensure that users are NOT sharing passwords for ANYTHING – Loose lips sink ships. Ensure that your help desk knows how to properly authenticate users If it’s written in policy, even the CEO can’t call in without proper identification and get access (and they can’t fire you because it’s written in a policy) 10/15/2013CST Security10

Social Engineering Countermeasures Shred-IT boxes – Most companies have shred-it boxes in their offices nowadays – Instead of providing information to those who are willing to dumpster dive, the info is disposed of securely Implement proper security policies – Follow the principle of minimal access – Users (especially contractors) should only have access to resources that are mission critical 10/15/2013CST Security11

Eavesdropping Wi-Fi signal is sent on an extremely tap-able distribution medium – The air! A well-placed antenna can view copies of the data being transmitted over the air War driving is a good example of eavesdropping Defined as the intercepting and reading of messages and information by unintended recipients. 10/15/2013CST Security12

Eavesdropping Analogy – verbal communication – When someone speaks to you, or to a group with which you are affiliated, it is a conversation, not eavesdropping – If someone is speaking to another individual, or to a group with which you have no affiliation, but you decide to listen in… that’s eavesdropping. And if you decide to chime in on a conversation to which you are not invited… that’s intrusion! 10/15/2013CST Security13

Eavesdropping Tools of the trade – Discovery NetStumbler (or MacStumbler for Mac) KisMet (or KisMac) Easy Wi-Fi Radar – Sniffing/Injection 10/15/2013CST Security14 Wireshark OmniPeek CommView AirPcap Javvin CAPSA MS NetMon

Eavesdropping Countermeasures Environmental shielding – If the signal can’t get through the walls, an attacker will have a hard time picking it up! Hidden SSID – Causes clients to send directed probes, which can be intercepted and provide an avenue for hijacking Disable mixed mode – Permitting clients to connect with b/g/n opens up more avenues for intrusion 10/15/2013CST Security15

Hijacking Commandeering a user’s wireless connection without consent Layer 2 hijacking = DoS – If the attacker provides layer 3 functionality, they can potentially take over the target system 10/15/2013CST Security16

Hijacking DoS - How it’s done – An attacker will run an AP using the same SSID as a legit AP to which the target is associated – The attacker helps the target de-auth from the AP through de-auth frames or excessive interference – The target must now re-associate to an AP – The attacker ensures that their rogue AP has a stronger signal than the legit AP to coax the target into associating to their equipment 10/15/2013CST Security17

Hijacking Layer 3 Attack – How it’s done – Start off with the same steps as the DoS – In this scenario, the rogue AP is equipped with DHCP connectivity – Target gets kicked off of the legit AP, re-associates to rogue AP – Rogue AP provides an IP address to the target – The attacker now has the target’s IP address and can commence with a full-scale attack 10/15/2013CST Security18

Hijacking 10/15/2013CST Security19 Legit AP Attacker Weaker signal from legit AP Rogue AP Stronger signal from rogue AP Target

Hijacking 10/15/2013CST Security20 If a user were to re-associate to the rogue AP, and then attempt a connection to an FTP site, a tool such as Karma could redirect the traffic, in turn intercepting the user’s credentials.

Hijacking Windows + Mobile Device Vulnerability – Preferred network list (PNL) List of preferred SSIDs for association – Devices will try to connect to each AP in the PNL Disclosure of each network in the PNL Great opportunity to find out which networks are preferred and stand up a rogue AP with an SSID from the list – Windows Specific If no SSIDs from the PNL are available, generate some random SSID and attempt to connect to that… this helps keep the adapter from turning off when not connected Software exists to respond to any SSID association requests 10/15/2013CST Security21

Hijacking Countermeasures WIDS/Rogue AP Detection – Split MAC w/ Controller Config – If the controller notices a rogue AP, it can drown it out Controller starts broadcasting the same AP as the rogue AP Controller increases the power until it is greater than that of the rogue AP 10/15/2013CST Security22

Denial of Service Launched against Layer 1 or 2 Layer 1 = RF Jamming – IE: cell phone jammers – High-power RF radiators across 2.4GHz or 5GHz spectrum – Signal generator strength is greater than that of your device, so users only get the noise from the signal generator, rather than your device 10/15/2013CST Security23

Denial of Service Accidental DoS can come from other appliances – Microwave or Cordless phone, for example Generally detected by users complaining of loss of service 10/15/2013CST Security24

Denial of Service Layer 2 Attack – Attacker spoofs BSSID and sends deauthentication frames from said BSSID De-auth frames are management frames, and therefore will not be ignored by the STA – Several different types PS-Poll Floods Association Floods Auth Floods Empty Data Floods 10/15/2013CST Security25

Denial of Service PS-Poll Flood – PS = Power Saving – STA tells the AP that it will enter PS mode – AP caches data frames for the STA while it sleeps – An attacker could spoof the STA MAC ID and send PS-Poll frames – The AP would then send all of the data frames to the attacker and the target, and the target may not get the data (if it is in PS mode) 10/15/2013CST Security26

Denial of Service Association Flood – Attacker floods the AP with association packets from random MAC IDs – This means that it will be less likely that a legit STA will authenticate Auth Flood – Same as association flood, only the attacker uses authentication packets instead of association packets 10/15/2013CST Security27

Denial of Service Empty Data Floods – Multiple WiFi adapters in an attacker STA – Attacker generates a multitude of packets of the maximum allowable size – Use up most of the WiFi bandwidth 10/15/2013CST Security28