Download presentation
Presentation is loading. Please wait.
1
Chapter 8 Wireless Network Security
Modified 9/17/ jw
2
TJX Data Breach TJX used WEP security
They lost 45 million customer records They settled the lawsuits for $40.9 million Link Ch 6a
3
Wireless router hijacked for child pornography
Sarasota attorney Malcolm Riddell’s wireless router was used by a boat captain in Sarasota Bay, FL to download 10 million files of child pornography
4
Objectives Describe the different types of wireless network attacks
List the vulnerabilities in IEEE security Explain the solutions for securing a wireless network
5
Introduction Wireless data communications have revolutionized computer networking Benefits of Wireless Increased flexibility Increased productivity Reduced costs Ability to grow and adapt to changing requirements Benefits of Wireless
6
Introduction continued
Wireless data networks have been targets for attackers Attacks can be directed against: Bluetooth systems Near field communication devices Wireless local area networks
7
Bluetooth An IEEE 802.15 WPAN standard
Personal Area Network (PAN) technology Uses a device-pairing process to wirelessly and virtually instant communication over distances up to .05 mile (100m). Uses short-range radio frequency transmissions Provides for rapid, ad-hoc device pairings Example: smartphone and Bluetooth headphones’
8
Cars Hands-free Calling Drive Smart, Drive Safe Consumer Electronics Music Photos & Video Home Entertainment Computers Health & Fitness Medical & Health Devices Sports & Fitness Devices Phones Smart Home
9
Bluetooth Two types of Bluetooth network topologies Piconet Scatternet
10
Bluetooth (cont’d.) Piconet
Established when two Bluetooth devices come within range of each other One device (master) controls all wireless traffic Other device (slave) takes commands Active slaves can send transmissions Parked slaves are connected but not actively participating
11
Bluetooth (cont’d.) Scatternet
Group of piconets with connections between different piconets Figure 8-2 Bluetooth scatternet © Cengage Learning 2012
12
Bluetooth Attacks Bluejacking
Attack that sends unsolicited messages to Bluetooth-enabled devices Text messages, images, or sounds Considered more annoying than harmful No data is stolen
13
Bluetooth Attacks (cont’d.)
Bluesnarfing Unauthorized access to wireless information through a Bluetooth connection Often between cell phones and laptops Attacker copies s, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge
14
Bluetooth Attacks (cont’d.)
Bluebugging Similar to Bluesnarfing, but the Attackers has full unauthorized access to a wireless device through a Bluetooth connection
15
Bluetooth Attacks (cont’d.)
Bluebugging Similar to Bluesnarfing, but the Attackers has full unauthorized access to a wireless device through a Bluetooth connection
16
Near Field Communication (NFC)
Near field communication (NFC) –Low speed and low power technology for smartphones and smart cards Used to establish communication between devices in close proximity Once devices tapped together or brought within several centimeters each other two-way communication established NFC’s ease of use opened door for wide range of practical short-range communications Near Field Communication (NFC) Near field communication (NFC) –Low speed and low power technology for smartphones and smart cards Used to establish communication between devices in close proximity Once devices tapped together or brought within several centimeters each other two-way communication established NFC’s ease of use opened door for wide range of practical short-range communications
17
NFC Contactless Payment
NFC devices increasingly used in contactless payment systems so consumer can pay for purchase by tapping store’s payment terminal with smartphone Users store credit card and/or store loyalty card information in “virtual wallet” the smartphone to pay for purchases at NFC-enabled point-of-sale (PoS) checkout device NFC contactless payment systems has risks because of the nature of this technology NFC Contactless Payment NFC devices increasingly used in contactless payment systems so consumer can pay for purchase by tapping store’s payment terminal with smartphone Users store credit card and/or store loyalty card information in “virtual wallet” the smartphone to pay for purchases at NFC-enabled point-of-sale (PoS) checkout device NFC contactless payment systems has risks because of the nature of this technology
18
NFC Contactless Payment System
Contactless Payment System (Figure 9-3) A figure. A hand holding a smartphone is help inches above a point-of-sale terminal.
19
NFC risks and defenses NFC risks and defenses (Table 9-2)
A table with three columns and five rows. The first row is composed of column headers: Vulnerability, Explanation, and Defense. Row 2. Vulnerability: Eavesdropping Explanation: The NFC communication between device and terminal can be intercepted and viewed. Defense: Because an attacker must be extremely close to pick up the signal, users should be aware of this. Also, some NFC applications can perform encryption. Row 3. Vulnerability: Data manipulation Explanation: Attackers can jam an NFC signal so transmission cannot occur. Defense: Some NFC devices can monitor for data manipulation attacks. Row 4. Vulnerability: Man-in-the-middle attack Explanation: An attacker can intercept the NFC communications between devices and forge a fictitious response. Defense: Devices can be configured in active-passive pairing so one device only sends while the other can only receive. Row 5. Vulnerability: Device theft Explanation: The theft or loss of a smartphone could allow an attacker to use that phone for purchases. Defense: Smartphones should be protected with passwords or PINs.
20
Institute of Electrical and Electronics Engineers (IEEE)
In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802 In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks) At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps)
21
IEEE WLAN Standard In 1997, the IEEE approved the IEEE WLAN standard Revisions IEEE a – 54Mbps 5GHz Specifies maximum rated speed of 54Mbps using the 5GHz spectrum IEEE b – 11Mbps 2.4GHz Ratified in 1999 IEEE g – 54Mbps 2.4Ghz Preserves stable and widely accepted features of b Increases data transfer rates similar to a
22
IEEE 802.11 WLAN Standard Revisions continued
IEEE n – >100Mbps 2.4 & 5GHz Ratified in 2009 Improvements in IEEE n Multiple input/multiple output (MIMO) Speed – minimum 100Mbps Throughput Coverage area Interference Security
23
IEEE 802.11 WLAN Standard Revisions continued
IEEE ac – Gigabit Wi-Fi 5Ghz Expected throughput of at least 1Gbps Initial products – up to 500Mbps throughput IEEE ad – WiGig Operates in 2.4GHz, 5GHz and 60Ghz Up to 7Gbps within line of sight using 60GHz Initial products in 2015
24
Standards Standards
25
Wireless NICs Wireless deployment requires:
End devices with wireless NICs Infrastructure device, such as a wireless router or wireless AP Wireless NICs
26
Access Points Access point (AP) major parts
Antenna and radio transmitter/receiver send and receive wireless signals Bridging software to interface wireless devices to other devices Wired network interface allows it to connect by cable to standard wired network
27
Access Points (cont’d.)
AP functions Acts as “base station” for wireless network Acts as a bridge between wireless and wired networks Can connect to wired network by a cable
28
Figure 8-3 Access point © Cengage Learning 2012
29
Access Points (cont’d.)
Autonomous access points (WAP) Separate from other network devices and access points Have necessary “intelligence” for wireless authentication, encryption, and management Thin access point or Lightweight access points (LWAP) An access point without the authentication and encryption functions These features reside on the wireless switch or wireless controller
30
Access Points (cont’d.)
Wireless Router - Multi-function Device Incorporates a switch, router, and wireless access point. Provides routing, switching and wireless connectivity. Wireless routers, are simple in design and used in home networks providing services such as NAT and DHCP Multi-function device Types of Integrated Routers
31
Wireless Home Router A home user typically interconnects wireless devices using a small, integrated wireless router. These serve as: access point Ethernet switch router Wireless Home Router
32
Access Points (cont’d.)
Wireless networks have been vulnerable targets for attackers Not restricted to a physical location
33
Wireless Threats Securing Wireless
34
Wireless LAN Attacks Types of wireless LAN attacks
Discovering the network Attacks through the RF spectrum Attacks involving access points
35
Wireless LAN Attacks (cont’d.)
Discovering the network One of the first steps in an attack is to discover presence of a network Beaconing APs send beacon frames at regular intervals to announce the SSID (network name) Wireless devices passively scan for beacon frames
36
War driving Process of passive discovery of wireless network locations
Table 8-2 War driving tools
37
War chalking Documenting and then advertising location of wireless LANs for others to use Previously done by drawing on sidewalks or walls around network area Today, locations are posted on Web sites Table 8-4 War chalking symbols © Cengage Learning 2012
38
Wireless LAN Attacks (cont’d.)
Attacks through the RF spectrum Wireless protocol analyzer Generating interference Wireless traffic captured to decode and analyze packet contents Network interface card (NIC) adapter must be in correct mode
39
Wireless LAN Attacks (cont’d.)
Six modes of wireless NICs Master (acting as an AP) Managed (client) Repeater Mesh Ad-hoc Monitor
40
Wireless LAN Attacks (cont’d.)
Interference Signals from other devices can disrupt wireless transmissions Devices that can cause interference with a WLAN Microwave ovens Elevator motors Copy machines Outdoor lighting (certain types) Theft protection devices Bluetooth devices Other Wireless Devices
41
Requires a powerful transmitter
42
Wireless LAN Attacks (cont’d.)
Attacks using access points Rogue access points Evil twins Rogue access point Unauthorized access point that allows attacker to bypass network security configurations May be set up behind a firewall, opening the network to attacks
43
Figure 8-6 Rogue access point
© Cengage Learning 2012
44
Wireless LAN Attacks (cont’d.) Man-in-the-Middle Attack
“Evil twin AP” attack: A popular wireless MITM attack where an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are hotbeds for this type of attack due to the open authentication. Connecting wireless clients would see two APs offering wireless access. Those near the rogue AP find the stronger signal and most likely associate with the evil twin AP. User traffic is now sent to the rogue AP, which in turn captures the data and forwards it to the legitimate AP. Return traffic from the legitimate AP is sent to the rogue AP, captured, and then forwarded to the unsuspecting STA. Man-in-the-Middle Attack
45
Vulnerabilities of IEEE 802.11 Security
Original IEEE committee recognized wireless transmissions could be vulnerable Implemented several wireless security protections in the standard Left others to WLAN vendor’s discretion Protections were vulnerable and led to multiple attacks
46
MAC Address Filtering Method of limiting / controlling WLAN access
Media Access Control (MAC) address filtering Used by nearly all wireless AP vendors Permits or blocks device based on MAC address
47
MAC Address Filtering
48
MAC Address Filtering Usually implemented by permitting instead of preventing
49
MAC Address Filtering Weaknesses
Addresses exchanged in unencrypted format An attacker can just sniff for MACs Scalability Issues - Managing a large number of MAC addresses is difficult MAC address filtering does not provide a means to temporarily allow a guest user to access the network Other than manually entering the user’s MAC address into the access point
50
MAC Address Filtering Weaknesses
MAC Address Spoofing – Easy to accomplish since many operating systems have built in tools Technitium’s freeware MAC Address Changer software allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. Supports - Windows 2000/XP/Server 2003/Vista/Server 2008/7/Server 2008 R2/8/Server 2012
51
SSID Broadcast Each device must be authenticated prior to connecting to the WLAN Open system authentication Device discovers wireless network and sends association request frame to AP Frame carries Service Set Identifier (SSID) User-supplied network name Can be any alphanumeric string 2-32 characters long AP compares SSID with actual SSID of network If the two match, wireless device is authenticated
52
Open System Authentication
Figure 8-8 Open system authentication © Cengage Learning 2012
53
SSID Broadcast (cont’d.)
Open system authentication is weak Based only on match of SSIDs Attacker can wait for the SSID to be broadcast by the AP Users can configure APs to prevent beacon frame from including the SSID Provides only a weak degree of security Can be discovered when transmitted in other frames Older versions of Windows XP have an added vulnerability if this approach is used
54
Turning Off Beaconing For "security" some people turn off beacons
This can annoy your legitimate users, who must now type in the SSID to connect It doesn't stop intruders, because the SSID is sent out in management frames anyway It can also affect roaming Many Operating Systems prefer networks that broadcast
55
Wired Equivalent Privacy (WEP)
IEEE security protocol Designed to ensure that only authorized parties can view transmitted wireless information Encrypts plaintext into ciphertext Uses encryption to protect traffic WEP was designed to be: Efficient and reasonably strong Secret key is shared between wireless client device and AP Key used to encrypt and decrypt packets
56
Wired Equivalent Privacy (WEP)
WEP vulnerabilities WEP can only use 64-bit or 128-bit number to encrypt Initialization vector (IV) is only 24 of those bits Short length makes it easier to break
58
Figure 8-9 WEP encryption process
© Cengage Learning 2012
59
Wired Equivalent Privacy (cont’d.)
WEP vulnerabilities (cont’d.) Violates cardinal rule of cryptography: avoid a detectable pattern Attackers can see duplication when IVs start repeating Keystream attack (or IV attack) Attacker identifies two packets derived from same IV Uses XOR to discover plaintext See Figures 8-10 and 8-11 for details
60
Figure 8-10 XOR operations
© Cengage Learning 2012
61
Figure 8-11 Capturing packets
© Cengage Learning 2012
62
Cracking WEP With the right equipment, WEP can be cracked in just a few minutes You need a support wireless card Kismet Aircrack-ng
63
Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) - Optional means of configuring security on wireless local area networks Designed to help users with limited knowledge of security to quickly and easily implement security on their WLANs Accomplished by pushing button or entering PIN Design and implementation flaws in WPS using PIN method makes it vulnerable Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) - Optional means of configuring security on wireless local area networks Designed to help users with limited knowledge of security to quickly and easily implement security on their WLANs Accomplished by pushing button or entering PIN Design and implementation flaws in WPS using PIN method makes it vulnerable
64
Wireless Security Solutions
Unified approach to WLAN security was needed IEEE and Wi-Fi Alliance began developing security solutions Resulting standards used today IEEE i WPA and WPA2
65
Wi-Fi Protected Access (WPA)
Introduced in 2003 by the Wi-Fi Alliance A subset of IEEE i Design goal: protect present and future wireless devices Temporal Key Integrity Protocol (TKIP) Encryption Used in WPA Uses longer 128 bit key than WEP Dynamically generated for each new packet
66
Wi-Fi Protected Access (cont’d.)
Preshared Key (PSK) Authentication After AP configured, client device must have same key value entered Key is shared prior to communication taking place Uses a passphrase to generate encryption key Key must be entered into both the access point and all wireless devices Not used for encryption Instead, it serves as the starting point (seed) for mathematically generating the encryption keys
67
Wi-Fi Protected Access (cont’d.)
WPA support also supports Enterprise Authentication Requires a Remote Authentication Dial-In User Service (RADIUS) authentication server. Provides additional security. Users must authenticate using 802.1X standard, which uses the Extensible Authentication Protocol (EAP) for authentication. Authenticating a Home User
68
Wi-Fi Protected Access (cont’d.)
Vulnerabilities in WPA Key management Key sharing is done manually without security protection Keys must be changed on a regular basis Key must be disclosed to guest users Passphrases PSK passphrases of fewer than 20 characters subject to cracking
69
Cracking WPA With the right equipment, WPA can be cracked in just a few minutes You need a support wireless card Kismet Aircrack-ng Link : Ch 6c – Cracking Wifi Source: 3/21/2011
70
Wi-Fi Protected Access 2 (WPA2)
Second generation of WPA known as WPA2 Introduced in 2004 Based on final IEEE i standard Uses Advanced Encryption Standard (AES) Supports both PSK (Personal) and IEEE 802.1x (Enterprise) authentication AES-CCMP Encryption Encryption protocol standard for WPA2 CCM is algorithm providing data privacy CBC-MAC component of CCMP provides data integrity and authentication
71
Wi-Fi Protected Access 2 (cont’d.)
AES encryption and decryption Should be performed in hardware because of its computationally intensive nature IEEE 802.1x authentication Originally developed for wired networks Provides greater degree of security by implementing port security Blocks all traffic on a port-by-port basis until client is authenticated Radius Server AP Client
72
Components Required for 802.1x Authentication
Authentication server is an EAP-capable RADIUS server: Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis Local authentication service on Cisco IOS access point May use either local RADIUS database or an external database server such as Microsoft Active Directory Authenticator is an 802.1x-capable access point. Supplicant is an EAP-capable client: Requires 802.1x-capable driver Requires an EAP supplicant—either available with client card, native in operating system, or from third-party software This topology shows the components that a system needs for 802.1x authentication. An authentication server is required for 802.1x x uses a RADIUS server to authenticate clients to the network. An authenticator can be a device such as a switch or an access point. This device operates on the enterprise edge, meaning that the device is the interface between the enterprise network and the public or semipublic network, where security is most needed. The client device contains a supplicant. The supplicant sends authentication credentials to the authenticator, and the authenticator then sends the information to the authentication server. At the authentication server, the login request is compared to a user database to determine whether and at what level the user is granted access to network resources.
73
Wi-Fi Protected Access 2 (cont’d.)
Extensible Authentication Protocol (EAP) Authentication for WPA2 Enterprise model uses IEEE 802.1x standard Framework for transporting authentication protocols Defines message format Uses four types of packets Request Response Success Failure EAP created as more secure alternative than weak Challenge-Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) EAP is framework but not authentication protocol
74
EAP Protocols Lightweight EAP (LEAP) Protected EAP (PEAP)
Proprietary method developed by Cisco Systems Requires mutual authentication used for WLAN encryption using Cisco client software Can be vulnerable to specific types of attacks No longer recommended by Cisco Protected EAP (PEAP) Simplifies deployment of 802.1x by using Microsoft Windows logins and passwords Creates encrypted channel between client and authentication server
75
Wireless Security Overview
Use authentication and encryption to secure a wireless network. Wireless Security Overview
76
Shared Key Authentication Methods
77
Table 8-3 Wireless security solutions
78
Enterprise Wireless Security Devices
Thin Access Point or Lightweight Access Point (LWAP) An access point without the authentication and encryption functions These features reside on the wireless switch or wireless controller Advantages The APs can be managed from one central location All authentication is performed in the wireless switch
79
Enterprise Wireless Security Devices (continued)
For larger organizations with many APs, controller-based managed solutions are used to simplify the wireless deployment. Using this architecture, APs are centrally managed from a controller in the cloud. Large Wireless Deployment Solutions
80
Enterprise Wireless Security Devices (continued)
Large Wireless Deployment Solutions, Cont.
81
Enterprise Wireless Security Devices (continued)
Wireless VLANs Can segment traffic and increase security The flexibility of a wireless VLAN depends on which device separates the packets and directs them to different networks
82
Enterprise Wireless Security Devices (continued)
For enhanced security, set up two wireless VLANs One for employee access One for guest access
83
Site Survey In-depth examination and analysis of wireless LAN site
Several reasons for conducting a site survey (example: achieving best possible performance from WLAN) Can be used to enhance security of WLAN Survey can provide optimum location of APs so minimum amount of signal extends past boundaries of organization to be accessible to attackers Site Survey Site survey - In-depth examination and analysis of wireless LAN site Several reasons for conducting a site survey (example: achieving best possible performance from WLAN) Can also can be used to enhance security of WLAN Survey can provide optimum location of APs so minimum amount of signal extends past boundaries of organization to be accessible to attackers
84
Antenna Types Antennas generally fall into two categories: Directional
Radiate RF energy equally in all horizontal directions. Radiate RF energy predominantly in one direction. Antennas generally fall into two categories: Directional Omnidirectional
85
Antenna Types Vendor ranges are usually optimized for best conditions.
A link distance can exceed standard distances, if consistently higher error rates are acceptable.
86
Antenna Types (cont’ d)
Different types of antennas can be used to increase or reduce signals in certain directions
87
Wireless Power Level Controls
Wireless Power can be: Increased (gain) Decreased (loss) Wireless power levels become very small, very quickly after leaving the transmitting antenna. Wireless power levels do not decrease linearly with distance, but decrease inversely as the square of the distance increases.
88
Wireless Power Level Controls
Inverse Square Law Signal strength does not fade in a linear manner, but inversely as the square of the distance. If you are a particular distance from an access point and you move measure the signal level, and then move twice a far away, the signal level will decrease by a factor of four. Twice the distance Point A Point B ¼ the power of Point A
89
Wireless Power Level Controls
As signal strength decreases, so will the transmission rate and the distances wireless signals travel. Reduce Transit Power on Access Point to limit wireless signal range
90
Wi-Fi-Blocking Wallpaper Protects Your Web Fortress by Keeping Neighbors Out
91
Rogue AP Detection Several methods to detect rogue AP:
Wireless device probe - Standard wireless device (i.e. portable laptop computer) can be configured as wireless probe Desktop probe – Desktop computer used as probe Access point probe – APs can detect neighboring APs Dedicated probe – Exclusively monitor RF frequency for transmissions Rogue AP Detection Several methods to detect rogue AP: Wireless device probe - Standard wireless device (portable laptop computer) can be configured as wireless probe Desktop probe – Desktop computer used as probe Access point probe – APs can detect neighboring APs Dedicated probe – Exclusively monitor RF frequency for transmissions
92
Rogue Access Points Organizations are becoming increasingly concerned about existence of rogue APs Rogue access point discovery tools Security personnel can manually audit airwaves using wireless protocol analyzer Continuously monitoring the RF airspace using a wireless probe
93
Rogue Access Point Video
Video: Hacking at Heathrow Airport
94
Summary Bluetooth is a wireless technology using short-range RF transmissions IEEE has developed five wireless LAN standards to date, four of which are popular today (IEEE a/b/g/n) Attackers can identify the existence of a wireless network using war driving Wired Equivalent Privacy relies on a secret key shared between wireless client device and access point
95
Summary (cont’d.) Wi-Fi Protected Access (WPA) and WPA2 have become the foundations of wireless security today Other steps to protect a wireless network include: Antenna positioning Access point power level adjustment Detecting rogue access points
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.