Wireless Security on the Philippine Setting. Introduction: WHOAMI What’s this all about?

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Overview How to crack WEP and WPA
Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Insecurity.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Securing a Wireless Network
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
AP (Access Point) Client Operation Mode : Bridge Mode: AP IP Address: DHCP: Server Operation Mode : Bridge Mode: Client IP Address:
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
A History of WEP The Ups and Downs of Wireless Security.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Encryption: WEP and cracking it. Eric Shea.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
Wireless Networking & Security Greg Stabler Spencer Smith.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
1 Wireless Hacking Joffrey Czarny, SRC TELiNDUS State of the Art Wireless Hacking Workshop.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Chapter3 Wireless how safe it is NOT! By: Brett Hoff.
Wireless Access Point Product Overview
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Protocols WEP, WPA & WPA2.
Methods of Securing LANs
Securing A Wireless Network
802.11b Wireless Network Security
إعداد : Alberto Escudero Pascual/ IT +46 النسخة العربية: أنس طويلة
Wireless Network Security
Presentation transcript:

Wireless Security on the Philippine Setting

Introduction: WHOAMI What’s this all about?

The Philippine Wee-fee setting 2004 German hacker finds open Wi-Fi networks in Manila Sept 2004: Van Hauser discovered that only 15 out of the 66 wireless APs were encrypted More Wifi networks on Homes and small businesses Unaware and indifferent Low or no security (due to cost and convenience) More direct targets

Wireless Security History Open Wireless WEP - Use of Streaming Algorithm - Per packet master key re-use - Group use and sharing of the same PSK - Lack of Authentication from network to client - Confidentiality vulnerabilities with header - Integrity vulnerability and replay attacks WPA WPA2

Top Wireless Tools 1.Kismet 2.NetStumbler 3.Aircrack 4.Airsnort 5.Kismac * Pyrit

DEMO Click Me!

How to Secure? -Change the defaults -Long key with wide characters set - MAC Address filtering -Limit connections -Disable DHCP -Hide SSID or a creative SSID -Change your key -Tools -Active security

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” - Gene Spafford

Credits: SecurityUncorcked.com InfosecPhils.wordpress.com PGHO (Nogie and Aphro)