Certain security vulnerabilities exist in every mode of wireless communications.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
WLAN What is WLAN? Physical vs. Wireless LAN
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
6.1. Communication Methods Revision using Qwizdom.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
PRESENTATION ON WI-FI TECHNOLOGY
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Computers Are Your Future Eleventh Edition
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Wireless Networking & Security Greg Stabler Spencer Smith.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Ingredients of Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Chapter 14 Network Encryption
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
ICT Unit 4: Network and the effects of using them
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Understand Wireless Security LESSON Security Fundamentals.
Networking and Health Information Exchange
Introduction to Computers
Topic 5: Communication and the Internet
Advanced Penetration testing
Security Issues with Wireless Protocols
Lecture 36.
Lecture 36.
Presentation transcript:

Certain security vulnerabilities exist in every mode of wireless communications.

Wired and wireless IP communications concerns Traffic Sniffing Traffic Sniffing Wrong location delivery Wrong location delivery Logging Logging Corporate espionage and spying Corporate espionage and spying Identity Theft Identity Theft Man in the middle captures Man in the middle captures

IP traffic sniffing may be different depending on the mode of communications used. Wireless Wireless – WiFi – EV-DO – CDMA – TDMA – GPRS – GSM – iDEN (Nextel) – CDPD Wired Wired – Dedicated LAN – DIA Leased Lined – Frame Relay – PRN – ISDN – DSL – Cable

Sniffing WiFi Plain Text Plain Text –Everything is readable WEP WEP –Encryption is easily broken WPA WPA –More difficult to break –More difficult to manage WPA2 WPA2 –Harder to break –Difficult to manage –Unmanageable for road warriors

Sniffing EV-DO Encrypted with 128 bit known method Encrypted with 128 bit known method Requires at this time special hardware to monitor and read (i.e. test equipment not readily accessible) Requires at this time special hardware to monitor and read (i.e. test equipment not readily accessible) Black Hat has published a calculator for decryption (takes 100 hours on pentium 200 which breaks down to 1 hour on an HP 2620) Black Hat has published a calculator for decryption (takes 100 hours on pentium 200 which breaks down to 1 hour on an HP 2620)

EV-DO Specific Concerns 1) The data is transmitted in Encrypted using a 64bit key from the card and 64bit key from the base station (see pppext-eap-cave-00.txt). I am looking for a more up to date version of this document. Note: not able to find on US search engines. 2)There is a (black hat) paper out there that includes a link to a calculator program to decrypt the communication. 3) Working on receiver modifications so I can capture the packets from the air and put them back together. Steps 1 and 2 are done waiting on hardware for step 3

Sniffing a Dedicated Connection Only sniffable with a tap into the circuit or access point in the network Only sniffable with a tap into the circuit or access point in the network Still vulnerable through wireless devices connected to the wired network Still vulnerable through wireless devices connected to the wired network

Sniffing DSL Less difficult to sniff than dedicated wired connections Less difficult to sniff than dedicated wired connections DSL can be connected into at different connection points along the way DSL can be connected into at different connection points along the way Still vulnerable through wireless devices connected to the wired network Still vulnerable through wireless devices connected to the wired network

What do you need to sniff cable? Requires a modified cable modem Requires a modified cable modem Access to all traffic along the cable Access to all traffic along the cable More open than WiFi, since few people know about the modified cable modems More open than WiFi, since few people know about the modified cable modems

Breaking SSL Subject to man in the middle attack (see Blue Coat – commercial product) Subject to man in the middle attack (see Blue Coat – commercial product) Can be broken if the handshake is captured but reqiures significant cpu resources (5 to10 hours of crunch time on dual Itanium server) Can be broken if the handshake is captured but reqiures significant cpu resources (5 to10 hours of crunch time on dual Itanium server)

Sniffing is sent and received via open text is sent and received via open text Utilizes no author validation Utilizes no author validation Username and password can be used to access other messages in the account even though those messages were not captured directly Username and password can be used to access other messages in the account even though those messages were not captured directly

Why Use Protexx? High level of encryption (2048 bits) High level of encryption (2048 bits) Runs inside of all modes of wireless transmission and encryption (WEP, WPA, EVDO…) Runs inside of all modes of wireless transmission and encryption (WEP, WPA, EVDO…) Wrappers around all known TCP/IP based technologies such as VPN(s) and SSL connections Wrappers around all known TCP/IP based technologies such as VPN(s) and SSL connections Provides a certificate for user that can be used to sign and/or encrypt s in outlook and thunderbird Provides a certificate for user that can be used to sign and/or encrypt s in outlook and thunderbird Dual level (client/server) authentication Dual level (client/server) authentication

Any Questions?