How to Secure a Home Wi-Fi S. Roy
Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor Gurdip Singh Professor Eugene Vasserman Alex Bardas 2
What is a home Wi-Fi? Provides a wireless access point (AP) via which household machines (e.g. laptops, tablets and smart phones in an apartment) can connect to the Internet The access point is also known as home router.
More about Home Wi-Fi Note: typically, the same router also supports wired connection at home as shown in the figure. The router (also called AP) is connected with the Internet via a modem. Any wireless-capable computer or smartphone in the house communicates with the router. AP
Risks in a Home Wi-Fi An insecure home Wi-Fi has all problems of using a free public Wi-Fi – A neighboring (e.g. nextdoor) attacker can launch similar attacks on the computers of a home Wi-Fi. And an additional concern: the admin responsibility – The intruder may use your network as a stepping stone for doing DoS, SPAMing, downloading music, and so on. – The home owner has to deal with the law enforcement agency for any wrong doing rooted at his/her network – Well before the police comes, the mobile intruder can flee away while the home owner will stay
Abusing a Home Wi-Fi network 1.The attacker M intrudes your home network 2.M uses it as a stepping stone for bad activities 3.You (the home owner) face FBI Pentagon Server Alice Mallory (M) AP A Home Wi-Fi with a user and an attacker DoS attack P2P Server download pirated items Internet
Securing a Home Wi-Fi: Task 1 Stop the intruder from joining the network – The AP employs an access control mechanism to authenticate the legitimate computers – Each legitimate computer may share the same key with the AP while the intruder does NOT have the key Alice Mallory AP A Home Wi-Fi with two users; an attacker M is denied access Bob hello; proof of the key authenticated hello Access denied
Securing a Home Wi-Fi: Task 2 Stop the intruder from eavesdropping – Encrypt the traffic (i.e. communicated messages) between the AP and each legitimate computer Mallory should NOT be able to decrypt the airborne traffic. Alice Malary AP Bob Encrypted mesg
Outdated Algorithms for Wi-Fi Security Wired Equivalent Privacy (WEP) algorithm has numerous flaws. – You should NOT use WEP in your home Wi-Fi. An attacker can easily break into the network. – Available attack/monitor tools: aircrack-ng, CommView The algorithm WPA (Wi-Fi Protected Access) is stronger than WEP – But, WPA still has some serious weakness – So, you should avoid WPA
Current Standard for a Wi-Fi Security: An overview The current standard WPA2 has replaced WPA Its Pre-shared Key (PSK) mode (also known as Personal mode) is designed for home network Caution: WPA and WPA2 remain vulnerable if users rely on weak password or passphrase – available attack/monitor tools: aircrack-ng, kismet – a passphrase longer than 13 characters is probably secure
Wi-Fi Protected Setup(WPS) A standard that attempts to allow establishment of a secure Wi-Fi (WPA) in an easy way But WPS has serious security flaws – We should not use the WPS An attacker can recover the WPS PIN in a few hours – and thus the network's WPA/WPA2 pre-shared key. Acknowledgement: wikipedia.org
Configuring a Router (AP) with WPA2 Walking through the setup procedure 1.Connect a computer to one of the LAN ports on the back of the router 2.Open a web browser and type (e.g It should be available in the router manual) to get the configuration page of the router. Then do the following. 3.Change the router’s administrative default password 4.Choose a SSID name (otherwise, the default one will be used) 5.Select WPA2-PSK among the available security algorithms 6.Set a password/passphrase for the WPA2-PSK protocol to use. 7.Give each user (each computer at home) the same passphrase. Check / ensure that WPA2 is ON on the router at the end of the above steps. Configuring Computer
More on Router Configuration Enable the built-in NAT/firewall in the router – the router has two sides i.e. the outside world (the Internet) and the inside network (home) – the outside world sees only the router public address (globally unique IP address) – multiple computers inside your home get local addresses (e.g. IP address like ) The DMZ option – router exposes some specific internal computer – router forwards incoming traffic to the specific host – this is an unsecure option; so, avoid DMZ
More on Router Configuration The router can be configured with remote access option – this option allows to access your router configuration page from the outside world – instead of using the router’s LAN IP Address you have to use the router’s Internet IP Address. Remote access can cause security problems – disable the remote access of the router as soon as it is installed.
Case Study: A Linksys Router E1200 is a Wireless router – It also has 4 Ethernet ports – the default IP address is – the admin username and the default password is “admin”. – the default SSID of the E1200 is CiscoXXXXX – supports security protocols e.g. WPA2, WPA, WEP – the WPS is Enabled by default; disable it Acknowledgement: Linksys E1200 manual
A Hands-On Activity: Configure a Router
A few additional security measures: Tradeoff b/w usability and security 1.Disable the SSID broadcast – SSID broadcast attracts the attacker. – But disabling it means each of your computer needs to remember the SSID 2.Assign static IP addresses to all computers at home; turn off DHCP – If DHCP (dynamic addressing) option is ON, the attacker may get a valid IP address from the AP. – Turn off DHCP; configure each connected device with a unique static IP. – Use a private IP address range (like x.x or x) to prevent computers at home from being directly reached from the Internet. 3.Use access control for any computers offering files and services.
Wireless Intrusion Detection Tools We should monitor our home Wi-Fi network whenever possible. The available tools are: – Wireshark : captures the wireless network’s all communications; analyzes the traffic to detect possible intrusion attempts – AirSnare: monitors for unfriendly MAC addresses and alerts us; also monitors DHCP requests from clients.
Case Study: The Att Wireless Router Discuss why this is an advanced router
Summary We discussed common security threats of an open Wi-Fi at home We presented a few standard countermeasures to mitigate the risks Remainder: – the next homework is due before the next class (1pm on February 21) – the next class will be held in Room