Download presentation
Presentation is loading. Please wait.
Published byTeresa Caldwell Modified over 9 years ago
1
Insert presenter logo here on slide master. See hidden slide 2 for directions Deepak Gupta AirTight Networks Wireless Vulnerabilities in the Wild: View From the Trenches Acknowledgement: Based on work presented by K N Gopinath at RSA 2011
2
Agenda 2 Why care about Wireless Vulnerabilities? (Motivation) What’s new in this talk and what are its implications? Wireless Vulnerability Analysis (Measurements) Threat/Vulnerability Mitigation
3
Era of Wireless Consumerization
4
Real Life Breaches due to Insecure Use of Wi-Fi Marshalls store hacked via wireless Hackers accessed TJX network & multiple servers for 18+ months 45.7 million payment credit accounts compromised Estimated liabilities > 4.5B USD
5
5 Are today’s enterprises secure enough to prevent the recurrence of such attacks?
6
Enter War Driving 6 WPA/WPA2 AP (%) NYLondonParis Not all APs are WPA/WPA2. How many of these are actually connected to my network?
7
War Driving Insufficient for Enterprise Threat Classification Our Study Authorized External Rogue
8
Sensor Based Statistical Sampling Data collected over last two years 8 Total Number ofCount Sites/Locations2,155 Organizations156 Sensors4501 Total Access Points268,383 Enterprise Clients427,308 Threat Instances Analyzed82,681
9
Enterprises Deal With Lot of Non-Enterprise Devices 268,383 APs 80,515 187,868 Authorized External/ Unmanaged 70% APs do NOT belong to the studied Organizations! Similarly, About 87% Clients are Unmanaged/External!
10
Rogue APs AP mis- configurations Soft/Client Based APs Wireless Threat Space AP Based Threats AP
11
Adhoc Network Wireless Threat Space Client based threats Client extrusions Connections to neighbors, evil twins Adhoc networks Client bridging Banned devices
12
T 3 (T-Cube) Parameters Threat Presence Threat Duration Threat Frequency Presence of an instance of a threat (%) Likelihood of presence of a threat instance Window of opportunity for an attacker
13
Real-life data & Accurate picture of Threats How does this information help you? Get an idea of Wi-Fi threat scenario in enterprises that may be like yours Which wireless threats you should worry about first? Plan your enterprise mitigation strategy
14
14 Threat Presence Threat Duration Threat Frequency Threat Frequency Simple (Yes/No) metric based on the presence of an instance of a threat (%)
15
Results From Our Survey Randomly Chosen set of IT Security Professionals Rogue APMisconf. APAdhocClient ExtrusionOther % Response
16
Results Based on Our Data Key Observations -Prominent Threats -Client extrusions -Rogue APs -AP mis-configurations -Adhoc clients Key Implications -Organization data is potentially at risk via Wi-Fi
17
Let’s Dive Deeper into Nature of Threats Rogue APs Client Extrusions Adhoc Clients
18
Enterprise Wireless Consumerization: Rogue APs 1521 Rogue APs seen in our study 163 Different type of Consumer Grade OUIs seen
19
Rogue AP Details About 1 in 10 Rogue APs have Default SSIDsAbout Half of Rogue APs Wide Open
20
Rogue AP Details An open Rogue AP is Virtually THIS!
21
Client Consumerization: Client Extrusion Client (Smartphones & laptops both) probes for these SSIDs.
22
Topic of Hot Discussion Today!
23
23
24
Client Probing For Vulnerable SSIDs Retail/SMB Organizations 118,981 Clients 12,002 106,979 AuthorizedUnmanaged 21,777 (20.4%) 636 (5.3%) Power of Accurate threat classification. 5.3% Vs 20.4%
25
“Known” Vulnerable SSIDs Probed For 103 distinct SSIDs recorded Certain (8%) Authorized Clients Probing for 5 or more SSIDs
26
Adhoc Authorized Clients! 565 distinct Adhoc SSIDs found, About half of them Vulnerable 15% of these are default SSIDs. 26,443 (7%) clients in adhoc mode.
27
VIDEO DEMO: Smartpot MITM Attack So What? Illustrative Exploit via Client Extrusion Smartphone as an Attacker App1: Mobile Hotspot App2: SSLStrip Attack Tool
28
VIDEO DEMO: Smartpot MITM Attack 28
29
29 Threat Presence Threat Duration Threat Frequency Threat Frequency How long (time interval) a threat is active before removal?
30
AP Threats live “longer” than Client Threats 15% client threats & 30 % AP threats live for > hr Threat Duration % Threat Instances with Given Threat Duration Histogram indicating that AP threats live longer AP Misconf. Rogue AP Client Extrusion Adhoc networks Some AP based threats are active for a day or more! Data from SMB/Retail (PCI) Segment
31
31 Threat Presence Threat Duration Threat Frequency Threat Frequency Threat instances per Sensor per month
32
Threat Frequency Large Enterprise Segment: Threats Per Month Per Sensor (Approx. 10,000 sq feet area) Bigger your organization, higher the likelihood of finding the threats Threat Category Threat Frequency
33
Key Takeaways Summarized Wireless threats due to unmanaged devices are present Enterprise wireless environment influenced by consumerization Certain threats more common than others Client extrusions Rogue AP AP Mis-configurations Adhoc clients Common threats affect large enterprise and SMB organizations Wireless threats persist regardless of sophistication of wired network security
34
34 Threat Mitigation
35
Let’s Ban Wi-Fi!
36
Use WPA2 For Your Authorized WLAN! But, WPA2 does not protect against threats due to unmanaged devices
37
Threat Mitigation Intrusions (AP Based Threats) Wire side controls as a first line of defense (e.g., 802.1X port control) Wireless IPS to automatically detect & block intrusions Extrusions (Client Based Threats) Educate users: clean up profiles, Use VPNs & connect to secure Wi-Fi Deploy end point agents to automatically block connections to insecure Wi-Fi Wireless IPS to automatically detect & block extrusions in enterprise perimeter Regular wireless scans to understand your security posture - Cloud based solutions are available to automate wireless scans Defense-In-Depth Mitigation
38
Apply Slide: Recommended Best Practices Self Assessment Test Scan your network to find out how vulnerable you are Good chance that you will find a Rogue AP, higher chance that you will find client extrusion Follow best practices Educate your users to connect to secure Wi-Fi Use VPN for remote connections Clean up the Connection profiles of Wi-Fi clients periodically Deploy end point agents to automate some of the above Adopt a “defense in depth” security approach Employ wire side defenses against Rogue APs (first line of defense) Regularly scan your wireless perimeter If risk assessment is high and/or you store super sensitive data Threat containment via wireless IPS should be considered
39
Apply Slide: Recommended Best Practices Go Wi-Fi, But, The Safe Way!
40
40 Questions? Thank You deepak.gupta@airtightnetworks.com
41
A1: Location/Site Wise Distribution Key Observations Prominent threats are distributed across multiple sites. Key Implications You need an ability to monitor the entire organization, not just 1 or 2 sites
42
A2: Enterprise Vs PCI (SMB/Retail) Key Observations Similar pattern with respect to prominent threats Some difference w.r.t other threats Increased adhoc connections in PCI
43
A3: North America, Asia (Overall Threat Occurrence)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.