Wireless Weaponry The Shmoo Group. Intro a.k.a. WTF is Shmoo? Howdy! Who’s who up here? What the hell are we gabbing about? “Who’s Shmoo?” takes too long.

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
Overview How to crack WEP and WPA
AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
Filtering and Security By Mohammad Shanehsaz June 2004.
CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Security.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Ft. Smith Evil Twin Access Points: For fun but no profit.
A History of WEP The Ups and Downs of Wireless Security.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
sniffing Team #1. Easy to sniff To sniff wired communication, must connect the wire between sender and receiver. Because everybody shares the medium.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing your Personal Wireless Networks By: Bryan Oxendale.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Samantha Module Set up. Items required Samantha receiver NXT - named with your number(Can be done in the download Firmware section) Robot Battery Computer.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Everyday is a Story: Helping your child learn to listen and talk Maggie Kettler, Au.D. Pediatric Audiologist II Cincinnati Children’s Hospital.
Chapter-7 Basic Wireless Concepts and Configuration.
E-safety BE SAFE ON THE INTERNET! BY THE 6NS DIGITAL LEADERS.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Understand Wireless Security LESSON Security Fundamentals.
Wireless Networking What You need to remember. What you need: A wireless router (Microsoft MN-700 Wireless router shown) A Wireless Adapter (Microsoft.
James Tucker Dr. Durrett ISQS 6342
Instructor & Todd Lammle
Wireless Security.
Wireless LAN Security 4.3 Wireless LAN Security.
Introduction to WiFi Telephony
Wireless Network Security
Antti Miettinen (modified by JJ)
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Wireless Weaponry The Shmoo Group

Intro a.k.a. WTF is Shmoo? Howdy! Who’s who up here? What the hell are we gabbing about? “Who’s Shmoo?” takes too long to answer. Enjoy Let’s get rolling…

You vs The Industry Security terminology that's confusing... –WEP, WPA, 802.1x, EAP, TLS, i, TKIP, RSN Security OFF by default... –Security gets in the way of Plug n' Play, doesn't it? Security implemented poorly... –Newsflash: WEP sucks. Security by obscurity... –Disable SSID broadcast? Puh-LEEZE. MAC filters? Puh- LEEZE. Out of the box, wireless security is not easy, it is not on, it does not work, and it is a sham.

You vs Your Users Your users want to use wireless... NOW. –If you don't plug in an access point, they WILL. Your users don't WANT security. –Don't you REMEMBER? “They want to use wireless... NOW.” Your users are 0wn3d. –Worm traffic on a wireless network is a wonder to behold. Your users aren't YOUR users anymore. –They're MINE. Via rogue AP. And they don't even know it. Your users are... well, USERS.

You vs The Technology The packets are in the air. –Pop some popcorn, turn on the baby monitor, or answer your phone and say “bye-bye” to your packets. Too many packets cause problems. Duh. –The CERT “down under” just figured this out a couple months ago! One man's packets are another man's noise. –Channels, channels everywhere, but only THREE can blink. Some packets have more authority than others... – management = When bad-guys “talk”, EVERYbody “listens”. You can not put a leash on your packets. –They look just as good from the parking lot as they do in the office. Darn those pesky packets!

You vs The Future EVERY wireless security mechanism to date has had a flaw discovered within a few years of release... or a few months, in some cases. –But don't worry, the next fix is just around the corner. Watch out for security “features” that cause denial-of-service. –Some cures may be worse than the disease. WPA, anyone? i will not save you from yourself. –Too bad you can't use it on your existing hardware. –Too bad people can't figure out PKI on WIRED networks. –Too bad half of it is sure to be optional. Thanks, vendors! And now for something completely different...

Updated Hardware Hackerbot

Updated Software Airsnort Airsnarf HotspotDK Fine Tooth Comb

New Hardware Now, now. That’s a surprise.

New Software That’s a surprise, too!

Saved for DefCon Announcement One last surprise… ;)