Download presentation
Presentation is loading. Please wait.
Published byAmie Mathews Modified over 8 years ago
1
Wireless LAN Security Oleh: R. Muhamad Ramadan
2
Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain free internet access Hackers (Crakers) Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs Employees Plug consumer-grade APIs/gateways into company Ethernet ports to create their own WLANs Rogue Access Point is an access point placed on a WLAN that is used to interfere with normal network operation.
3
Ancaman Thd Keamanan Wireless 2 Man-in-the-Middle Attacks AP Client Attacker collects information Attacker intercepts traffic
4
Ancaman Thd Keamanan Wireless 3 Denial of Service 802.11 b dan g menggunakan unlicensed 2.4 GHz ISM band. Band ini digunakan oleh banyak produk pelanggan spt microwave oven, cordless phone, dll.
5
Denial of Service Common consumer devices can Interfere with WLAN devices Causing denial of service
6
Denial of Service Attacker turns laptop into an access point. Attacker can send CTS messages or disassociate commands Clients flood WLAN causing collisions and denying service
7
Wireless Security Protocols 1 Wireless Protocol Overview
8
Wireless Security Protocols 2a Authenticating to the Wireless LAN Access PointClient Association
9
Wireless Security Protocols 2b Authenticating to the Wireless LAN AuthenticatorSupplicant EAP
10
Wireless Security Protocols 3 Encryption
11
Securing Wireless LAN Controlling Access to the Wireless LAN Methods for controlling wireless LAN access: SSID broadcasts from access points are off MAC Address filtering is enabled WPA2 Security implemented
12
Securing Wireless LAN Controlling Access to the Wireless LAN Probe request: SSID = NULL No probe respone MAC address not recognized Meets all requirements
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.