 2009 AirTight Networks. Financial Districts Wireless Vulnerability Study A study conducted by AirTight Networks, Inc. www.airtightnetworks.com.

Slides:



Advertisements
Similar presentations
A Study Conducted by AirTight Networks Wireless Vulnerability Assessment: Airport Scanning Report
Advertisements

Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security Issues in large scale wireless and VoIP deployment Andrew Yeomans VP Global Information Security Dresdner Kleinwort Wasserstein
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Network Security
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Vulnerability Management  2008 AirTight Networks, Inc. Wireless Vulnerability Assessment – Airport Scanning Report Part - II A study conducted.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Wireless Security Policy Gagan Jain Bommaiah Satish Shyam Sundar Vivekananda.
Wireless Hotspot Security
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
Insert presenter logo here on slide master. See hidden slide 2 for directions Deepak Gupta AirTight Networks Wireless Vulnerabilities in the Wild: View.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Presented by: Dr. Munam Ali Shah
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Network Security Lecture 8 Presented by: Dr. Munam Ali Shah.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Lecture 24 Wireless Network Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Computer Security By Duncan Hall.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
IS3220 Information Technology Infrastructure Security
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Chapter-7 Basic Wireless Concepts and Configuration.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Network System Security - Task 2. Russell Johnston.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
WIRELESS INTRUSION DETECTION SYTEMS
A Study Conducted by AirTight Networks
Wireless Network Security
Wireless Network Security
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Security of a Local Area Network
Security in Networking
IS4550 Security Policies and Implementation
Steven Branigan, President
September 2011 April 2009 doc.: IEEE /xxxxr0
Wireless Network Security
LM 5. Wireless Network Security
Presentation transcript:

 2009 AirTight Networks. Financial Districts Wireless Vulnerability Study A study conducted by AirTight Networks, Inc.

Page 2 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Study Purpose and Methodology Scan Financial districts for WiFi vulnerabilities  To assess adoption of WiFi security best practices by organizations in major financial districts Methodology  Visited 7 financial districts (6 in US, 1 in UK)  Scanned WiFi signal for 5 minutes at a randomly selected location  3632 APs scanned  547 Clients scanned

Page 3 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Financial Districts Covered in this Study  New York  Chicago  Boston  Wilmington, DE  Philadelphia  San Francisco  London  A sample WiFi trace tells a lot about network security posture in each location.  Picked up WiFi signals at 30 randomly selected points in:

Page 4 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential View from Wardriver’s Windshield

Page 5 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Key Findings: Widespread Use of Insecure Practices  57% of WiFi networks are either OPEN or using weak (WEP) encryption  Enterprise grade APs were found configured in WEP mode instead of WPA or WPA2  39% of threat posing APs (OPEN and WEP) are enterprise grade  27% of open APs (non hotspot and non guest) were hiding their SSIDs Overall Distribution of WiFi security Classification of OPEN/WEP Access Points based on vendor’s category

Page 6 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Key Findings: Client Vulnerabilities Everywhere  61% of threat posing (OPEN and WEP) APs are home/SOHO grade Such devices are operating beyond IT/Security group’s visibility and control Authorized client devices can connect and bypass security controls  13% of mobile WiFi clients were found operating in ad hoc mode Actively looking to connect to viral networks such as “Free Public WiFi” & “Free Internet Access” Vulnerable to wi-phishing or honeypotting Distribution of WiFi Clients Classification of OPEN/WEP Access Points based on vendor’s category

Page 7 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential A Closer Look at OPEN Access Points Page 7 Wireless Vulnerability Management  2008 AirTight Networks, Inc.

Page 8 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential What are OPEN APs being used for? Intended Uses Hotspot Access Guest Access Reality Personal WiFi devices Misconfigured APs Rogue APs Vulnerabilities Backdoor to the wired enterprise network Unwitting, impatient employee looking for WiFi access bypass security

Page 9 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Magnified Look at OPEN Access Points Non Guests/Hotspots APs  Acadian-Public  CCCFREE  tmobile  eMobile-Zone  attwifi  cityhallpublicwireless  visitor  WiFi Zone – The Cloud  WIZ  XCEWLAN-Guest  Wayport_Access  Martiz Guest 35%65%  (null ssid)  BE11g  any  linksys  monkey  nikwlan  WLAN  kellie  engineers  default  coair722  copysecure (1) Hotspot/Guests APs don’t hide SSID (2) Hotspot SSIDs are well known/published and advertised (3) Usually signal from multiple hotspot APs is visible at any coverage location Guests/Hotspots APs

Page 10 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Data Leakage Through Open APs Sensitive Data Storage Firewall Wired IPS SPAM/AV URL filtering OPEN AP  Hackers can gain direct access to sensitive data storage – remember TJX breach!  Hackers can scan all enterprise devices and servers for vulnerabilities and exploit them  Clients connecting to external APs expose data Organization identity & executive’s names were visible in clear text in the leaking packets! We found many instances of packets leaking out of OPEN APs attached to financial network’s internal network! Hacker External Open AP

Page 11 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Practice of SSID Hiding: Security Through Obscurity Observations about detected APsSo What? Majority of OPEN APs with hidden SSID are Enterprise grade! There is continued belief among security administrators that SSID hiding adds security. OPEN APs hiding SSIDsOPEN APs

Page 12 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential A Closer Look at WEP Access Points Page 12 Wireless Vulnerability Management  2008 AirTight Networks, Inc.

Page 13 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Very Low Adoption Rate of WPA2  33 % WiFi networks in financial districts using WEP!  No good justification for continued use of WEP  WEP cracking time reduced to less than 5 minutes!  APs intended for private applications must use WPA/WPA2 Observations about detected WEP APsSo What? 24% of WEP APs are Enterprise grade These APs are fully capable of supporting stronger encryption such as WPA/WPA2

Page 14 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Wi-Fi Security Footprint in Each Financial District

Page 15 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential A Closer Look at WiFi Clients, iPhones, Blackberry’s Page 15 Wireless Vulnerability Management  2008 AirTight Networks, Inc.

Page 16 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Trusted Network Information Leakage By Wi-Fi Users  Over 56 % of clients were broadcasting the name of their trusted Wi-Fi networks  34 % of them were willing to connect to “HIGHLY INSECURE” Wi-Fi networks Laptop is probing for SSIDs from preferred list (cached). Client Clients are vulnerable to “Honeypot” / “Caffe Latte” style attacks

Page 17 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Viral Wi-Fi Outbreak Continues Over 13% laptops found to be infected from Viral SSIDs Top 3 viral SSIDs found at almost all scan locations are: Free Public WiFi hpsetup Free Internet Access Active/Discovered Viral SSIDsWiFi Clients

Page 18 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Conclusions Page 18 Wireless Vulnerability Management  2008 AirTight Networks, Inc.

Page 19 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Weak Wi-Fi Security Policy Definition and Enforcement  Identity & data leakage from corporate Wi-Fi devices and clients  Alarming number of mis-configured, unmanaged Access Points  Clients actively probing for “familiar SSIDs”  Client ad-hoc connections bypassing security

Page 20 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential IT Lacks Wireless Security Expertise  Not limited to specific WLAN vendor  No limited to specific locations  Need to control resources - WiFi infrastructure and clients Cisco Motorola Aruba/Nortel Sample collected in Boston Sample collected in Chicago Sample collected in Boston/San Francisco WEP APs

Page 21 The Global Leader in Wireless Security  2009 AirTight Networks Inc. Proprietary & Confidential Five Steps to Protect Against WiFi Security Breaches Recommended Best PracticeWiFi deployed WiFi not deployed Use strong authentication and encryption: Use the best standards for authentication and encryption (e.g., WPA/WPA2) when deploying WiFi networks Monitor guest WiFi access: Authenticate guest users and monitor unauthorized access when providing guest access over WiFi networks Conduct wireless security audits and scans: Periodically conduct wireless scans to detect presence of unauthorized WiFi devices and activity in your premises. Follow endpoint wireless security best practices: Promote WiFi security best practices among laptop users. Using wireless security endpoint security agent, enforce your enterprise policies seamlessly across all laptops and secure them even when they are away. Use a Wireless Intrusion Prevention System (WIPS): Prevent leakage of sensitive data and protect your network from wireless security threats with 24/7 wireless monitoring