Presentation is loading. Please wait.

Presentation is loading. Please wait.

WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.

Similar presentations


Presentation on theme: "WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007."— Presentation transcript:

1 WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007

2 2 Agenda Wireless Technology1 Auditing Wireless2 Wireless Hacking Examples3 Closing4

3 3 Wireless Technology Wireless, Wireless Everywhere

4 4 Wireless Technology With Great Power, Comes Great Responsibility Ben Parker, Spiderman Every Convenience Has A Cost Todd Kendall, Symantec

5 5 The Wireless Threat Gartner Says Wireless LANs are the Major Wireless Security Problem Facing Businesses Through 2008 Analysts Discuss How to Secure a Wireless Network at Gartner IT Security Summit 2004 WASHINGTON, D.C., June 9, 2004 — Through 2006, 70 percent of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points (AP) and client software...

6 6 Wireless Risk Misconceptions regarding wireless security Wireless threats in production, rogue and hotspot networks DoS attacks, eavesdropping, protocol weaknesses, information disclosure

7 7 Wireless Auditing Wireless Auditing Is Essential to the Security of NOT ONLY your wireless network, but the rest of your environment –By finding and mitigating wireless vulnerabilities you are performing the appropriate due diligence and fiduciary responsibility as an organizations representative

8 8 Wireless Auditing Auditing Goals –What role do you play in organization CEO, Administrator, Security Team –Identify AP’s and Clients –Examine Network Configuration What Security Mechanisms Are in Use –Map the Network Range and Coverage –Assess Data Traffic for Information Disclosure –Ensure Policy Compliance

9 9 Wireless Auditing

10 10 Action Plan Auditing Results –Auditing provides an organization with and understanding of their current security posture and allows them to address the risks within your environment –Helps determine whether you have properly enforced your wireless policy –Helps determine security requirements for wireless technology, especially from a budgeting perspective –Helps determine your risks –Provides solutions for mitigating risks

11 11 Action Plan Benefit –Cost or ROI –Satisfy due diligence –Satisfy fiduciary responsibility –Protects the organization from negative press –Protects other network segments –Protect employees –Satisfy Compliance Efforts

12 12 WEP

13 13 Wired Equivalent Privacy (WEP) Basic encryption mechanism for wireless networks Uses RC4 for encryption Designed to prevent casual traffic sniffing attacks There are a number of failures associated with WEP and a variety of attacks to defeat it

14 14 WEP Attacks Vendor Implementation Weakness –Neesus Datacom Key Generation Algorithm –wep_crack (effective for 40-bit only) Dictionary Attacks –WEPAttack FMS Attacks –Aircrack(ng)

15 15 Vendor Implementation Weakness Example wep_crack

16 16 Dictionary Attack Example WEPAttack

17 17 FMS Attack Example Aircrack-ng

18 18 LEAP

19 19 802.1x/EAP Overview Weaknesses and Administrative Problems of Wireless Networks –How do you distribute dynamic keys? –How do you authenticate users? Solution: A LEAP of Faith!

20 20 LEAP Dictionary Attack Asleap

21 21 WPA

22 22 Wi-Fi Protected Access (WPA) WPA is a part of the 802.11i specification, which is dedicated to improving the security of wireless networks Two Major Problems with upgrading the security of wireless networks –Had to be fixed as a software upgrade –Lack of available processing capacity in wireless equipment Temporary Solution: Temporal Key Integrity Protocol (TKIP)

23 23 WPA Pre-shared Key (PSK) Attack cowpatty

24 24 Closing Wireless Auditing Is Essential to the Security of NOT ONLY your wireless network, but the rest of your environment –By finding and mitigating wireless vulnerabilities you are performing the appropriate due diligence and fiduciary responsibility as an organizations representative Only through auditing can an organization understand their current security posture and address the risks within the environment –Knowledge is Power Organizations benefit from auditing in a variety of ways, but essentially it all comes down to cost –Incident Response costs exponentially more than an audit

25 25 References Wireshark – http://www.wireshark.orghttp://www.wireshark.org Kismet – http://www.kismetwireless.nethttp://www.kismetwireless.net wep_crack – http://www.lava.net/~newsham/wlan/http://www.lava.net/~newsham/wlan/ WEPAttack – http://wepattack.sourceforge.nethttp://wepattack.sourceforge.net Aircrack-ng – http://www.aircrack-ng.orghttp://www.aircrack-ng.org Asleap – http://asleap.sourceforge.nethttp://asleap.sourceforge.net Cowpatty – http://sourceforge.net/projects/cowpattyhttp://sourceforge.net/projects/cowpatty File2air- http://secwatch.org/wifidownload.php?cat=5http://secwatch.org/wifidownload.php?cat=5 http://wirelessdefence.org

26 26 & ANSWERS QUESTIONS Todd Kendall todd_kendall@symantec.com

27 Thank You Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Download ppt "WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007."

Similar presentations


Ads by Google