Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Course 201 – Administration, Content Inspection and SSL VPN
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Mobile and Wireless Communication Security By Jason Gratto.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Network Security Revisited ITEC 370 George Vaughan Franklin University.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
Wireless Networking.
Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.
A History of WEP The Ups and Downs of Wireless Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 11: Remote Access Fundamentals
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Module 5: Configuring Access for Remote Clients and Networks.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless Networking & Security Greg Stabler Spencer Smith.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
A network without routers is a very simple concept. When information is sent across a network line, all devices connected to that line read the data. If.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Windows Vista Configuration MCTS : Advanced Networking.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Network System Security - Task 2. Russell Johnston.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Chapter 1 Introduction to Networking
Security in the layers 8: Network Security.
Securing the Network Perimeter with ISA 2004
Welcome To : Group 1 VC Presentation
Presentation transcript:

Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross

Faculty Advisor and team Dr. Steve Russell –Associate Professor Electrical and Computer Engineering Adrienne Huffman –Graduate Student Computer Engineering Jon Murphy Computer Engineering Steve Eilers Computer Engineering Alex Pease Computer Engineering Jessica Ross Computer Engineering and Mathematics

Definitions ARP – Address Resolution Protocol IV – Initialization Vector L2TP – Layer 2 Tunneling Protocol PPTP – Point to Point Tunneling Protocol Radius – Remote Authentication Dial In User Service SSL – Secure Socket Layer WEP – Wired Equivalency Privacy WPA – Wi-Fi Protected Access VPN – Virtual Private Network

What is SHARK? SHARK is a wireless security network to be used to study security related issues on wireless networks Tool to teach interested students about wireless security Report statistics about attackers and methods used to researchers at ISU Deployable to any remote location

Why SHARK? Client’s Last Semester as Professor, wants project finished Educated college students about security Give students something fun to do

Limitations SHARK must be portable and extendable Initial build of the SHARK system must consist of three or fewer computers SHARK must be built within a $150 budget Must use public domain software Must be capable of collecting research data

Intended Users Primary –College students in computer related fields –Know the basics of wireless networking Secondary –Interested community members –People looking for a free access point

Intended Uses Primary –Learning tool for students –Study methods of wireless attacks –Study basic network security –Legal and ethical way for students to participate in hacking exercises

SHARK Node

SHARK – Software Ubuntu Squid –Web proxy cache Direct traffic to appropriate places Apache –Used to create local web-server login/registration Keep track of users MySQL –Database WireShark/Ethereal –Network Protocol Analyzer Captures all traffic on SHARK Network

Levels of Security SHARK has five levels of security –Guppy No security, used for basic registering on network –Clownfish WEP security –Swordfish Rotating WEP security –Barracuda WPA security –SHARK RADIUS security Provides statistical data on hacking patterns

Wired Equivalent Privacy (WEP) 64-bit WEP 128-bit WEP Same 24bit IV Stream Flaws in WEP –Repeating IV –Short –Stream Cipher XOR is bad

Aircrack, airodump, airdecap No magic number of IV’s –250,000 – 400,000 for 40 bit –750,000 – 2M + for 104 bit More users = more IV’s sent = More IV’s that are re-used Can read packets if IV is re-used but key not broken yet Breaking WEP Down

WPA Software update to WEP (closely related to rotating WEP) –Re-keying –No more weak IV packets Pre-shared Key –Only as strong a pasephrase Extensible Authentication Protocol (EAP) –User authentication –Radius

Traffic Generator – Baiting the Hook Breaking WEP and WPA encryption –Attackers must analyze thousands of packets

7-of-9 Off-the-Shelf wireless access point –Provides generic internet access –Traffic is captured and compared to SHARK traffic

Network View Analysis Subnet

Network Pros/Cons Pros – One external IP – Firewall – branches Cons – extensive forwarding

Machine Breakdown

SmallBox Captures traffic on SHARK Stores and Analyzes data –Packet Capture WireShark –Filter Snort –Webserver Apache

Sharkweb When attackers break into SHARK, are forwarded here Logged into database –WebserverApache –Web UtilitiesMySQL, PHP

Virtualnet Simulates additional machines running services without adding cost of physical machines –OS Ubuntu –Virtual Machine ManagerXen

Virtual Machines VM 1 –Mimicking a standard server VM 2 –Tarpit Delays incoming connections for as long as possible VM 3 –HoneyD Confuse attackers to think it has open ports

Secure Tunneling VPN –Provide secure communications over unsecured networks Benefits –Provides the level of security we desire Downsides –If SHARK is compromised, they have direct access to our network Solution –Scripting for “on- the-fly” configuration

Secure Tunneling – VPN One of the only ways to provide a secure and extensible way to access the SHARK machines Need the ability to create multiple VPN sessions, so a VPN server is required Multiple solutions available –PPTP –L2TP –SSL

Status of SHARK Completed –All computers have main software packages installed and configured –Order for parts has been placed –Xen server fully configured –Portal redirect In Progress –Open access point for registering –Virtual machines up and running In Concept –VPN –Radius Server –Data Statistics and Heuristics

Testing Target Audience CPRE 537 wireless Security Class CONTEST –Open Registration week 1 –WEP weeks 2,3 –WPA week 4 –Rotating WEP week 5 –RADIUS week 6 –Results week 7 –Basic Analysis week 8

Hours and Resources Hours (current)Cost ($10.50/hr) Steve Eilers60$ Alex Pease86$ Jon Murphy58$ Jessica Ross50$ Wireless AP$49.99 Router$39.99 HubDonated (2) ComputersDonated (3) Wireless Cards$39.99 Total254$

Future Uses Make the automation of tasks smoother Better documentation Increase the number of fields for registration.

Commercialization This project is a research project and is not intended for commercialization.

Questions?