FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE Intercontinental Group 1.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE Intercontinental Group.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Security With a focus on Security Dr. Tulin Mangir Partially sponsored by NSF Grant No:
Wireless Security.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Mobile and Wireless Communication Security By Jason Gratto.
WIRELESS LAN SECURITY Using
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Certain security vulnerabilities exist in every mode of wireless communications.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
WEP Protocol Weaknesses and Vulnerabilities
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
Wireless Networking & Security Greg Stabler Spencer Smith.
Wireless Authentication & 802.1X By Gareth Ayres.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Understand Wireless Security LESSON Security Fundamentals.
Security of a Local Area Network
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security Issues with Wireless Protocols
Introduction to Networking Security
Presentation transcript:

FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE Intercontinental Group 1

 Penetrate the Wireless network protected by Cisco security suite  Listen to the secure traffic and steal valuable information  Laugh at the Cisco security professionals while retiring young and wealthy in Russia 2

 To penetrate the WLAN, it is important to know the flaws.  The entire Cisco security suite is required. The problem with this is the price.  No mention of various authentication methods to the WLAN. Examples are 802.1x with IAS, Protected EAP (PEAP) with EAP-TLS.  Unified solution means a security breach on the wired network would likely compromise the WLAN

Price  Cisco Security agent – (Starter bundle – 1server with 10 desktops) - $2,027  NAC Appliance (3315) - $15,530  Cisco Firewall (ASA 5520) - $5,440  Cisco IPS (IPS 4240) - $8,103  CS-MARS (MARS 110R) - $37,153  Total - $68,253  Not included – Cisco WAP, WLC, POE Switches/Power injectors, SmartNet  This is a very costly solution 4

 We have to learn our enemy: get all available documentation about the Cisco wireless security: installation, development, any other documentation, known issues and weaknesses 5

 Following vulnerabilities were find during our research:  WPA wireless migration feature vulnerability  OTAP feature vulnerability 6

 Firewall – get on the company’s premises as a guest or for the “interview” and access the WLAN directly 7

 WEP  The same IV (initialization vector) can be used more than once. This feature makes WEP very vulnerable, especially to collision-based attacks.  With IV of 24 bits, you only have about 16.7 million of possible combinations.  Masters keys, instead of temporary keys, are directly used. 8

 WPA  Length of IV (initialization vector) is now 48, comparing to WEP’s 24. This gives you over 500 trillion possible key combinations.  IV has much better protection with better encryption methods. This is prevention of reuse of IV keys.  Master keys are never directly used. 9

 Security misconfiguration: Leaving a WPA wireless migration feature (WEP to WPA) enabled might lead to the security breach.  Force the access point to issue WEP broadcast packets, which are used to crack the encryption key and gain access to the network  Use Aircrack-ng tool to launch the active attack AirMonitor AirSend 10

 Process used for the wireless controller discovery during the initialization of the Wireless Local Access Point  WLAN Controller – device that provides real- time communication between Cisco Aironet access points, the Cisco Wireless Control System (WCS), and the Cisco Mobility Services Engine 11

 Enabled OTAP (Over-the-Air-Provisioning) service allows the sniffing of the network details from existing network traffic thanks to unencrypted multicast frames or sky-jack Cisco equipment every time an access point is connected to the network with the OTAP  All new Cisco access points introduced in a network will first scan and listen for multicast broadcasts in the WLAN to determine the location of its nearest controller. We will introduce our device as a controller, and get an access to a WLAN 12

 As a “controller” device, we will be able to launch the following passive attack:  Eavesdropping Capture network traffic for analysis using easily available tools, such as Network Monitor in Microsoft products, or TCPdump in Linux- based products, or AirSnort Passive attacks are stealthy and difficult to detect 13

 The system is only as good as the users who have been trained to use it. “People” are the weakest link.  Need “strong” education, frequent mock- exercises and practice-runs.  Need to be always one-step better than the bad-guys and a simple CCNA certification does not cut it. 14

15

 FTP stolen data to a server in Russia and enjoy your retirement 16

 Questions??  Thanks for listening!! 17