Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Crack WEP Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross.
Wireless and Switch Security NETS David Mitchell.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Implementing Wireless LAN Security
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
NETWORK SECURITY.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Mobile and Wireless Communication Security By Jason Gratto.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
COEN 252 Computer Forensics
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Chapter 9: Novell NetWare
Chapter 13 – Network Security
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Software Security Testing Vinay Srinivasan cell:
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
WEP Protocol Weaknesses and Vulnerabilities
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Wireless Networking & Security Greg Stabler Spencer Smith.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
CHAPTER 9 Sniffing.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 14 Network Encryption
Module 10: Windows Firewall and Caching Fundamentals.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Securing Interconnect Networks By: Bryan Roberts.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Network System Security - Task 2. Russell Johnston.
Top 5 Open Source Firewall Software for Linux User
Port Knocking Benjamin DiYanni.
Wireless Network Security
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
6.6 Firewalls Packet Filter (=filtering router)
Firewalls Routers, Switches, Hubs VPNs
Networking and Security
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross

What is SHARK? SHARK is a wireless security network to be used to study security related issues on wireless networks Meant to be a tool to teach interested students about wireless security Also meant to report statistics about attackers and methods used to researchers at ISU

Intended Users Primary –College students in computer related fields –Most likely ages 18 to 22 and male –Should already know the basics of wireless networking –Most likely uses a UNIX-based OS Secondary –Interested community members –People around campus looking for a free access point

Intended Uses Primary –To be used as a learning tool for students –To be used as a means of gaining information about methods of attack

Assumptions Software shall be freeware Traffic analyzer should be able to monitor connections, packet traffic, and activity inside of machines hosting WAPs Traffic generator shall generate authentic traffic Web server shall be secure Web server shall log names, s, and MAC addresses of prospective hackers There will be five levels of difficulty

Limitations Wireless access points must be portable Initial build of SHARK must consist of three or fewer computers SHARK must be built within a $150 budget

SHARK Node

SHARK – Software OS - Ubuntu –Linux operating system –Free/Open-source software –Latest distribution in Debian family –Excellent documentation and support –User Interface is easy to use

SHARK – Software Squid –Web proxy cache –Fairly well documented –Free, open-source software –Supports our needs and more Allows for use as transparent proxy Port 80 forwarding on SHARK and all 7-of-9 traffic to web Rest of traffic on shark, tunneled to virtual Machine

SHARK – Software Apache –Free, open-source software –Well documented –Used to create local web-server login/registration Keep track of users –Used to help analyze results –Monitor individuals and their specific techniques –Ability to determine what hardware is in use

SHARK – Software MySQL –Well documented –Free/Open Source software –Easy to use –Database Locally used store user login/registration Store captured data

SHARK – Software WireShark/Ethereal –Free/Open-Source Software –Well Documented –Experience using software –Network Protocol Analyzer Uses second wireless card Captures all traffic on SHARK Network –Attack attempts –Generated traffic

Levels of Security SHARK has five levels of security –Guppy No security, used for basic registering on network –Clownfish WEP security –Swordfish Rotating WEP security –Barracuda WPA security –SHARK RADIUS security Each level provides statistical data on hacking patterns

7-of-9 Off-the-Shelf wireless access point –Provides easy installation of open wireless network –Connects to Hub to provide generic internet access for comparison –Traffic is captured and analyzed on SHARK node.

Traffic Generator – Baiting the Hook To break WEP and WPA encryption, attackers must analyze thousands of packets – Not just any packets, but ARP packets Void11 –Forces the generator to disconnect from the network by generating de-authentication packets Homebrew daemon –will be running to reconnect the generator to the SHARK network when it gets disconnected –Acting as a normal user

Traffic Generator – Baiting the Hook Void11 + daemon = ARP flooding –Can produce on average of 75,000 ARP packets/hour ARP packets contain Initialization Vectors a block of bits that is required to allow a stream or block cipher executed in any of several streaming modes without having to go through a re-keying process. Takes 50k – 200k IV’s to crack 64-bit WEP Takes 200k – 700k IV’s to crack 128-bit WEP Takes 500k – 1 Million IV’s to crack WPA- PSK

Secure Tunneling VPN – Virtual Private Network – Provide secure communications over unsecured networks for data integrity Benefits – extensible and easy to manage while providing the level of security we desire Downsides – if the machine itself is compromised, they have direct access Solution – using scripts we are able to “on-the-fly” configure the SHARK box

Secure Tunneling – VPN One of the only ways to provide a secure and extensible way to access the SHARK machines Need the ability to create multiple VPN sessions, so a VPN server is required Multiple solutions available –Point to Point Tunneling Protocol –Layer 2 Tunneling Protocol –Secure Sockets Layer

Electrical View

Electrical View Pros/Cons One external IP Firewall branches Lots of port forwarding

Port Forwarding External->Internal 10022(non tunnel) -> Virtualnet(ssh) 10023(non tunnel)-> Smallbox(ssh) 10024(non tunnel)-> Sharkweb(ssh) 80(non tunnel)-> Sharkweb(http) All other tunnel -> Virtualnet All other non tunnel -> dropped

Machine Breakdown

Sharkweb OS FreeBSD WebserverApache Web UtilitiesMySQL, PHP

SmallBox OS SuSE LINUX Packet CaptureWireShark FilterSnort WebserverApache

Virtualnet OS Ubuntu Virtual Machine ManagerXen

Virtual Machine 1(trophy) OSFreeBSD Remote Log onSSH WebserverApache MailSquirrelmail Programming Gcc, G++

Virtual Machine 2 OSDebian Linux UtilitiesTarPit

Virtual Machine 3 OSRedHat SoftwareHoneyD

Design Evaluation Form SHARK Wireless Network Functionality Relative Importance Evaluation Score Resultant Score Create Secured Wireless Network20%100%20% Virtual Net to direct user traffic to.10%100%10% Web server to register users10%100%10% Generate traffic to populate the network10%100%10% Security levels for users to break through.15%80%12% Secure tunnel from SHARK node to15%60%9% Capture data from access attempts.10%100%10% Analyze captured data10% 1% Total100%82%

Questions?