ARUBA INSTANT ROGUE AP TROUBLESHOOTING

Size: px
Start display at page:

Download "ARUBA INSTANT ROGUE AP TROUBLESHOOTING"

Transcription

1 ARUBA INSTANT ROGUE AP TROUBLESHOOTING Technical Climb Webinar 10:00 GMT 11:00 CET 13:00 GST Feb 28th, 2016 Presenter: Anshul Bharthan

2 INTRODUCTION TO WIDS/WIPS

3 Classification of APs The Aruba system classifies APs on a number of factors. The classification for these devices is handled automatically, but it can be overridden by the administrator. Here are the types: Valid AP: An Aruba IAP which is a part of the cluster is marked as valid. Rogue: An AP that is detected wirelessly and on the wired network. Suspected rogue: An AP that has been detected wirelessly, has some indicators that lead the Instants to believe it may be attached to the network, but to avoid false positives, it has not yet been marked as a rogue. Interfering: An AP that has been detected wirelessly, but has not been seen on the wired network. All APs begin with this setting. Neighbor: An AP that is marked as either belonging to a neighbor by an administrator manually. 3

4 Different Modes of Access Points : The three main wireless security areas to keep in mind when evaluating a WIDS system are rogue detection, rogue containment and wireless intrusion detection needs. Wireless detection happens at the radio level and then gets fed upstream. Aruba radios can be deployed in three different modes: AP mode, Air Monitor (AM) mode and Spectrum Monitor (SM) mode. 4

5 Different Modes of Access Points: AP MODE: AP mode radios focus on serving clients and pushing wireless traffic but they also perform IDS detection, Rogue detection and spectrum analysis. AP will perform off channel scanning every 10 seconds for slightly less than 100 milliseconds. The AP uses a bucketing based algorithm for channel scanning. When the AP boots, all channels are divided into 2 different buckets, regulatory channels and non-regulatory channels. The third channel bucket, active channels, is populated as the AP scans and detects channels with wireless traffic. APs can perform wireless containment but they will prioritize pushing client traffic over containment. This is a very important distinction and the reason why AMs are recommended if wireless containment is enabled. APs can also perform spectrum analysis on the channel where they are serving clients. 5

6 Different Modes of Access Points: AM MODE: AM s don t serve clients and are dedicated to wireless security. AMs typically do not need to be deployed at the same density an AP would since they do not serve clients. AMs use a channel scanning algorithm that is similar to an AP but has an extra bucket for Rare channels. Rare channels - Channels that do not belong to any country s regulatory domain and fall into a frequency range outside of the regulatory domain; 2484 MHz and 4900MHz-4995MHz (J-channels), and Mhz. We only do rare channel scanning in AM mode The AM will spend ~500 milliseconds on active channels, ~250 ms on channels in AP s regulatory domain, ~200 ms in any regulatory domain and ~100 ms on rare channels. SPECTRUM MODE: SMs are designed for spectrum classification scans every channel within 1 second. It doesn t follow the bucketing system used by APs and AMs. SMs will not perform any wireless containment since the time spent containing a rogue would impact the accuracy of the spectrum classifications. 6

7 ROGUE AP DETECTION

8 Rogue Detection Basics In order to detect Rogue AP, IAP cluster has to find all the foreign APs via the scanning algorithm. The list of all foreign APs seen by the cluster is "show ap monitor ap-list". NOTE: It is AP specific command, it only shows the current single AP data on which command is run. Please make sure that radio is up and one SSID is configured for IAP to start scanning. A foreign interfering AP, will become a rogue, when it is diagnosed to be on the same wired network as the IAP. IAP does that by looking at its show ap monitor arp-cache and/or show ap monitor enet-wired-mac <IAP wired MAC>. This cache is built based on ARP messages seen on VLANs trunked to the IAP. To successfully detect/contain rogue, it is recommended to extend the VLAN, and add required vlans on the trunk to IAP. Else IAP will not have visibility on the network, where you want rogue detection to occur. If only one IAP has trunked to the VLAN, then only that IAP has the capability to detect this rogue from other specified vlans, however it also requires the rogue AP is near by this IAP for detecting BSSID. From cluster design, it is needed to trunk the VLAN, where rogue detection is needed, to all the IAPs in the cluster. 8

9 Rogue Detection Basics and Types What does IAP do in the background to detect Rogue? The IAP constantly builds and updates an internal table of MAC addresses by collecting all MAC addresses on its Ethernet interface. This table is called the Ethernet wired MAC table. Here is the command to view this table: show ap monitor enet-wired-mac <Wired MAC of the IAP> While the IAP is up, it also constantly monitors wireless frames outgoing from other APs. As soon as a new AP is detected (regardless whether this AP is classified as Rogue / Valid / Interfering), the IAP internally creates a separate table for it. Here is the command to view this table: show ap monitor ap-wired-mac <BssID of the Rogue AP> There are few match types, on the basis of which IAP detects the rogue, a) Eth-Wired-MAC b) Eth-GW-Wired-Mac c) System-Wired-Mac, d) System-Gateway-Mac 9

10 Rogue AP Detection Sample Diagram 10

11 Rogue Detection Type Here is an example, explaining Match-Type - Eth-Wired-Mac: Two scenarios would trigger a rogue detection based on Eth-Wired-Mac: - a) An Instant AP/AM detects that the same device MAC is contained in both its Ethernet wired MAC table and in one of its non valid AP wired MAC table. b) When a nonvalid AP is acting as Layer 3 (with potentially NAT service enabled), it sends frames that have srcmac=bssid, but more importantly that have BSSID=Ethernet MAC of the AP +/- 1. In this case, the Aruba AP checks whether a src mac either equals the BSSID +/-1 that can also be found in its Ethernet wired MAC table. If there is a match, rogue detection is triggered Aruba AP : IP address : , DG Eth MAC : 18:64:72:cd:76:96 MAS Switch: IP Address: VLAN /24, VLAN /24 VLAN Mac for 10,170-00:0b:86:95:81:37 Cisco AP: IP Address : , DG Eth MAC : a8:9d:21:e1:aa:e4 BSSID 1) 84:b8:02:c9:56:60 -G 2) 84:b8:02:c8:8e:a0 -A 11

12 Rogue Detection Type In this scenario, we will check a case from the previous slide, When the IAP detected the foreign (interfering) AP, Here is what it looked like: 12

13 Rogue Detection Type Now, as soon as a client connects (g-radio in this case), we could see that the radio was marked as rogue, and similarly the other radio would be detected as rogue as client connected to it starts passing traffic. 13

14 Rogue Detection Type Earlier, we saw that the Match MAC is 84:b8:02:c9:56:60 à BSSID of Cisco AP, We see that Cisco BSS Mac information is reached to the IAP as a source mac from the wired side. There is packet dump show this in next slide. And IAP also sees the same as source MAC for the wireless traffic, hence there was a table created for the same BSSID as well. 14

15 Rogue Detection Type While IAP is detecting an AP as rogue, the Cisco BSSID can be see on the wired side of IAP, Also, to check if the Client data traffic is hitting the IAP, so as to get the MAC information, then we need to see if the Data pkt/bytes are incrementing or not. 15

16 Rogue Detection Type Here is another example, explaining Match-Type - Eth-GW-Wired-Mac: The way how IAP detects rogue in this case is by capturing the Gateway MAC (of the Rogue Client) on both wired and wireless side. To check the wireless end information, I did a Over The Air packet capture using a MacBook. On the wired end we can either check the ARP cache or the Ethernet wired MAC table to see the gateway MAC entry. 16

17 Rogue Detection Type 17

18 ROGUE CONTAINMENT

19 Types of Rogue Containment There are 2 ways of Rogue Containment: Wired containment: When enabled, IAPs will generate ARP packets on the wired network to contain wireless attacks using ARP poisoning of rogues. Wireless Containment: When enabled, the system will attempt to disconnect all clients that are connected or attempting to connect to the identified Access Point. Two containment mechanisms. A) Deauthentication containment: The Access Point or client is contained by disrupting the client association on the wireless interface. B) Tarpit containment: The Access Point is contained by luring clients that are attempting to associate with it to a tarpit. The tarpit can be on the same channel or a different channel as the Access Point being contained. Note: For containment it is not necessary to have a dedicated AM and even an IAP in Access mode can contain rogues (results can be delayed, so AM is recommended for containment). For Wireless Containment using an Access Mode IAP, the preferred method is using tarpitting. De-auth works more effectively for AMs. Wired containment is also effective for wireless clients using ARP poisoning and works for both AMs and Access Mode IAPs. 19

20 Wired Containment Wired Containment When enabled, IAPs will generate ARP packets on the wired network to contain wireless attacks using ARP poisoning of rogues. Here we can see that, since wired containment is enabled, IAP keeps sending fake ARP requests and response, to not let the device (mobile in this case), connect to the Rogue AP. IAP generates fake BSSID (mostly starting with 02:xx), and sends ARP request/response on behalf of the device ( ). We can see lots of duplicate ARP packets in the captures shown in next slide. ARP-A in the Windows test client will show incorrect MAC for the default gateway. 20

21 Wired Containment pcap 21

22 Wired Containment Types CLI knobs: (Aruba)# ids (Aruba)# wired-containment There are 2 additional knobs present only under CLI Wired-containment-ap-adj-mac: IAP can detect SOHO rogues, but it can not start containing them using the knob, wired-containment. For containing them it needs, CLI knob, wired-containment-ap-adj-mac. Wired-containment-susp-l3-rogue: Wired containment works fine for a bridge mode rogue AP. But for NAT router AP, IAP cannot judge the relation between Eth MAC and wireless BSSID. However if the gateway mac, of a wireless client, is offset by one character from a rogue APs wired mac address, using the knob, wired-containment-susp-l3-rogue they can be contained. 22

23 Wireless Containment Wireless Containment: When enabled, the system will attempt to disconnect all clients that are connected or attempting to connect to the identified Access Point. There are two containment mechanisms a) Deauthentication: With deauthentication containment, the Access Point or client is contained by disrupting the client association on the wireless interface. The Aruba AP will send de-authentication packets to the AP and the client device. If the client tried to reconnect, the Deauth is sent again, and it keeps doing that. b) Tarpitting: With tarpit containment, the Access Point is contained by luring clients that are attempting to associate with it to a tarpit. The tarpit can be on the same channel or a different channel as the Access Point being contained. When the client device attempts to reconnect to the network, the Aruba AP will respond with a probe response that has some fake data in it to induce the client device to connect to the Aruba AP rather than the rogue device. 23

24 Wireless Containment Types When Deauthentication-only knob is enabled, We will see that Spoofed deauth frames were sent by the AP/AM to client with source as the rogue AP. Similarly, Spoofed deauth frames were sent by the AP/AM to the rogue AP with the source as the client CLI Commands: 24

25 Wireless Containment Types Deauthentication-Only GUI: 25

26 Wireless Containment Types TARPITTING: Detect the rogue and contain using the tarpit. The client should be first deauthenticated and the AP/AM should impersonate the rogue in a fake channel so that the client tries to connect back to the AP/AM. There are basically 2 options available under it: a) tarpit-non-valid-sta: In this method, only non-authorized clients that attempt to associate with an AP is sent to the tarpit. b) tarpit-all-sta: In this method, only non-authorized clients that attempt to associate with an AP is sent to the tarpit. 26

27 Wireless Containment Types 27

28 Manually Override IDS Classification Manual IDS Classification There maybe instances where we would need to manually override IDS classification done by Aruba Instant. IDS reclassification is done using ids-reclassify command. To use the command, we would need to input value of phy-type and classification-type. 18:64:72:cd:76:96# ids-reclassify ap 84:b8:02:c9:56: >>>>>>>> 0 Valid, 2 g 28

29 Other CLI outputs To check the client status connecting to the interfering/rogue Aps To check the signal of a particular client: 29

30 Other CLI outputs Show ap monitor scan-info >>>>>>>> to check the scanning status of AP 30

31 DETECTION AND PROTECTION

32 Detection and protection option Infrastructure Intrusion Detection Description Detect n 40MHz Intolerance Setting Detect Active n Greenfield Mode Detect AdHoc Networks When a client sets the HT capability intolerant bit to indicate that it is unable to participate in a 40MHz BSS, the AP must use lower data rates with all of its clients. Network administrators often want to know if there are devices that are advertising 40MHz intolerance, as this can impact the performance of the network. When devices use the HT operating mode, they cannot share the same channel as a/b/g stations. Not only can they not communicate with legacy devices, the way they use the transmission medium is different, which would cause collisions, errors, and retransmissions. An ad-hoc network is a collection of wireless clients that form a network amongst themselves without the use of an AP. As far as network administrators are concerned, ad-hoc wireless networks are uncontrolled. If they do not use encryption, they may expose sensitive data to outside eavesdroppers. If a device is connected to a wired network and has bridging enabled, an ad-hoc network may also function like a rogue AP. Additionally, adhoc networks can expose client devices to viruses and other security vulnerabilities. For these reasons, many administrators choose to prohibit ad-hoc networks. Detect AdHoc Network Using Valid SSID If an unauthorized ad-hoc network is using the same SSID as an authorized network, a valid client may be tricked into connecting to the wrong network. If a client connects to a malicious ad-hoc network, security breaches or attacks can occur. Detect AP Flood Attack Fake AP is a tool that was originally created to thwart wardrivers by flooding beacon frames containing hundreds of different addresses. This would appear to a wardriver as though there were hundreds of APs in the area, thus concealing the real AP. An attacker can use this tool to flood an enterprise or public hotspots with fake AP beacons to confuse legitimate users and to increase the amount of processing need on client operating systems. 32

33 Detection and protection option Infrastructure Intrusion Detection Description Detect AP Impersonation In AP impersonation attacks, the attacker sets up an AP that assumes the BSSID and ESSID of a valid AP. AP impersonation attacks can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a honeypot attack. Detect AP Spoofing An AP Spoofing attack involves an intruder sending forged frames that are made to look like they are from a legitimate AP. It is trivial for an attacker to do this, since tools are readily available to inject wireless frames with any MAC address that the user desires. Spoofing frames from a legitimate AP is the foundation of many wireless attacks. Detect Bad WEP This is the detection of WEP initialization vectors that are known to be weak. A primary means of cracking WEP keys is to capture frames over an extended period of time and searching for such weak implementations that are still used by many legacy devices. Detect Beacon Wrong Channel In this type of attack, an intruder spoofs a beacon packet on a channel that is different from that advertised in the beacon frame of the AP. Detect Client Flood There are fake AP tools that can be used to attack wireless intrusion detection itself by generating a large number of fake clients that fill internal tables with fake information. If successful, it overwhelms the wireless intrusion system, resulting in a DoS. 33

34 Detection and protection option Infrastructure Intrusion Detection Detect RTS Rate Anamoly Detect CTS Rate Anamoly Detect Device with a Bad MAC OUI Description The RF medium can be reserved via Virtual Carrier Sensing using a Clear To Send (CTS) transaction. The transmitter station sends a Ready To Send (RTS) frame to the receiver station. The receiver station responds with a CTS frame. All other stations that receive these CTS frames will refrain from transmitting over the wireless medium for an amount of time specified in the duration fields of these frames. Attackers can exploit the Virtual Carrier Sensing mechanism to launch a DoS attack on the WLAN by transmitting numerous RTS and/or CTS frames. This causes other stations in the WLAN to defer transmission to the wireless medium. The attacker can essentially block the authorized stations in the WLAN with this attack. The RF medium can be reserved via Virtual Carrier Sensing using an RTS transaction. The transmitter station sends a RTS frame to the receiver station. The receiver station responds with a CTS frame. All other stations that receive these RTS frames will refrain from transmitting over the wireless medium for an amount of time specified in the duration fields of these frames. Attackers can exploit the Virtual Carrier Sensing mechanism to launch a DoS attack on the WLAN by transmitting numerous RTS and/or CTS frames. This causes other stations in the WLAN to defer transmission to the wireless medium. The attacker can essentially block the authorized stations in the WLAN with this attack. The first three bytes of a MAC address, known as the MAC organizationally unique identifier (OUI), is assigned by the IEEE to known manufacturers. Often, clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Detect Invalid Address Combination In this attack, an intruder can cause an AP to transmit deauthentication and disassociation frames to all of its clients. Triggers that can cause this condition include the use of broadcast or multicast MAC address in the source address field. 34

35 Detection and protection option Infrastructure Intrusion Detection Detect Overflow EAPOL Key Description Some wireless drivers used in access points do not correctly validate the EAPOL key fields. A malicious EAPOL Key packet with an invalid advertised length can trigger a DoS or possible code execution. This can only be achieved after a successful association exchange. Detect Overflow IE Some wireless drivers used in access points do not correctly parse the vendor-specific IE tags. A malicious association request sent to the AP containing an IE with an inappropriate length (too long) can cause a DoS and potentially lead to code execution. The association request must be sent after a successful authentication exchange. Detect Malformed Frame Association Request Some wireless drivers used in access points do not correctly parse the SSID information element tag contained in association request frames. A malicious association request with a null SSID (that is, zero length SSID) can trigger a DoS or potential code execution condition on the targeted device. Detect Malformed Frame Auth Malformed authentication frames that do not conform to the specification can expose vulnerabilities in some drivers that have not implemented proper error checking. This feature checks for unexpected values in an Authentication frame. Detect Malformed Frame-HT IE The IEEE n HT (High Throughput) IE is used to convey information about the n network. An management frame containing a malformed HT IE can crash some client implementations, potentially representing an exploitable condition when transmitted by a malicious attacker. 35

36 Detection and protection option Infrastructure Intrusion Detection Detect Malformed Frame Large Duration Description The virtual carrier-sense attack is implemented by modifying the MAC layer implementation to allow random duration values to be sent periodically. This attack can be carried out on the ACK, data, RTS, and CTS frame types by using large duration values. This attack can prevent channel access to legitimate users. Detect Misconfigured AP A list of parameters can be configured to define the characteristics of a valid AP. This feature is primarily used when non-aruba APs are used in the network, since the Aruba controller cannot configure the third-party APs. These parameters include WEP, WPA, OUI of valid MAC addresses, valid channels, and valid SSIDs. Detect Windows Bridge A Windows Bridge occurs when a client that is associated to an AP is also connected to the wired network, and has enabled bridging between these two interfaces. Detect Wireless Bridge Wireless bridges are normally used to connect multiple buildings together. However, an attacker could place (or have an authorized person place) a wireless bridge inside the network that would extend the corporate network somewhere outside the building. Wireless bridges are somewhat different from rogue APs, in that they do not use beacons and have no concept of association. Most networks do not use bridges in these networks, the presence of a bridge is a signal that a security problem exists. Detect Broadcast Deauthentication A deauthentication broadcast attempts to disconnect all stations in range. Rather than sending a spoofed deauth to a specific MAC address, this attack sends the frame to a broadcast address. 36

37 Detection and protection option Infrastructure Intrusion Detection Description Detect Broadcast Dissociation By sending disassociation frames to the broadcast address (FF:FF:FF:FF:FF:FF), an attacker can disconnect all stations on a network for a widespread DoS. Detect NetStumbler NetStumbler is a popular wardriving application used to locate networks. When used with certain NICs, NetStumbler generates a characteristic frame that can be detected. Version of NetStumbler changed the characteristic frame slightly. Detect Valid SSID Misuse If an unauthorized AP (neighbor or interfering) is using the same SSID as an authorized network, a valid client may be tricked into connecting to the wrong network. If a client connects to a malicious network, security breaches or attacks can occur. Detect Wellenreiter Wellenreiter is a passive wireless network discovery tool used to compile a list of APs along with their MAC address, SSID, channel, and security setting in the vicinity. It passively sniffs wireless traffic, and with certain version (versions 1.4, 1.5, and 1.6), sends active probes that target known default SSIDs. 37

38 Detection and protection option Client Intrusion Detection Detect Block ACK DoS Detect ChopChop Attack Description The Block ACK mechanism that was introduced in e, and enhanced in nD3.0, has a built-in DoS vulnerability. The Block ACK mechanism allows for a sender to use the ADDBA request frame to specify the sequence number window that the receiver should expect. The receiver will only accept frames in this window. An attacker can spoof the ADDBA request frame causing the receiver to reset its sequence number window and thereby drop frames that do not fall in that range. ChopChop is a plaintext recovery attack against WEP encrypted networks. It works by forcing the plaintext, one byte at a time, by truncating a captured frame and then trying all 256 possible values for the last byte with a corrected CRC. The correct guess causes the AP to retransmit the frame. When that happens, the frame is truncated again. Detect Disconnect Station Attack A disconnect attack can be launched in many ways; the end result is that the client is effectively and repeatedly disconnected from the AP. Detect EAP Rate Anomaly To authenticate wireless clients, WLANs may use 802.1X, which is based on a framework called Extensible Authentication Protocol (EAP). After an EAP packet exchange, and the user is successfully authenticated, the EAP-Success is sent from the AP to the client. If the user fails to authenticate, an EAP-Failure is sent. In this attack, EAP-Failure or EAP-Success frames are spoofed from the access point to the client to disrupting the authentication state on the client. This confuses the clients' state, causing it to drop the AP connection. By continuously sending EAP Success or Failure messages, an attacker can effectively prevent the client from authenticating with the APs in the WLAN. 38

39 Detection and protection option Client Intrusion Detection Detect FATA-Jack Attack structure Detect Hotspotter Attack Detect a Meiners Power Save DoS Attack Detect Omerta Attack Detect Rate Anamolies Description FATA-Jack is an client DoS tool that tries to disconnect targeted stations using spoofed authentication frames that contain an invalid authentication algorithm number. The Hotspotter attack is an evil-twin attack which attempts to lure a client to a malicious AP. Many enterprise employees use their laptop in Wi-Fi area hotspots at airports, cafes, malls etc. They have SSIDs of their hotspot service providers configured on their laptops. The SSIDs used by different hotspot service providers are well known. This enables the attackers to set up APs with hotspot SSIDs in close proximity of the enterprise premises. When the enterprise laptop Client probes for hotspot SSIDs, these malicious APs respond and invite the client to connect to them. When the client connects to a malicious AP, a number of security attacks can be launched on the client. Airsnarf is a popular hacking tool used to launch these attacks. To save on power, wireless clients will "sleep" periodically, during which they cannot transmit or receive. A client indicates its intention to sleep by sending frames to the AP with the Power Management bit ON. The AP then begins buffering traffic bound for that client until it indicates that it is awake. An intruder could exploit this mechanism by sending (spoofed) frames to the AP on behalf of the client to trick the AP into believing the client is asleep. This will cause the AP to buffer most, if not all, frames destined for the client. Omerta is an DoS tool that sends disassociation frames to all stations on a channel in response to data frames. The Omerta attack is characterized by disassociation frames with a reason code of 0x01. This reason code is unspecified and is not used under normal circumstances. Many DoS attacks flood an AP or multiple APs with management frames. These can include authenticate/associate frames, which are designed to fill up the association table of an AP. Other management frame floods, such as probe request floods, can consume excess processing power on the AP. 39

40 Detection and protection option Infrastructure Intrusion Detection Detect TKIP Replay Attack Detect Unencrypted Valid Clients Detect Valid Client Misassociation Detect AirJack Detect ASLEAP Detect Null Probe Response Description TKIP is vulnerable to replay (via WMM/QoS) and plaintext discovery (via ChopChop). This affects all WPA-TKIP usage. By replaying a captured TKIP data frame on other QoS queues, an attacker can manipulate the RC4 data and checksum to derive the plaintext at a rate of one byte per minute. By targeting an ARP frame and guessing the known payload, an attacker can extract the complete plaintext and MIC checksum. With the extracted MIC checksum, an attacker can reverse the MIC AP to Station key and sign future messages as MIC compliant, opening the door for more advanced attacks. An authorized (valid) client that is passing traffic in unencrypted mode is a security risk. An intruder can sniff unencrypted traffic (also known as packet capture) with software tools known as sniffers. These packets are then reassembled to produce the original message. This feature does not detect attacks, but rather it monitors authorized (valid) wireless clients and their association within the network. Valid client misassociation is potentially dangerous to network security. The four types of misassociation that we monitor are: 1) Authorized Client associated to Rogue: A valid client that is associated to a rogue AP. 2) Authorized Client associated to External AP: An external AP, in this context, is any AP that is not valid and not a rogue. 3) Authorized Client associated to Honeypot AP: A honeypot is an AP that is not valid but is using an SSID that has been designated as valid/protected. 4) Authorized Client in ad hoc connection mode: A valid client that has joined an ad hoc network. AirJack is a suite of device drivers for (a/b/g) raw frame injection and reception. It was intended to be used as a development tool for all applications that need to access the raw protocol. However, one of the tools included allowing users to force all users off an AP. ASLEAP is a tool created for Linux systems used to attack Cisco LEAP authentication protocol. A null probe response attack has the potential to crash or lock up the firmware of many NICs. In this attack, a client probe-request frame will be answered by a probe response containing a null SSID. A number of popular NIC cards will lock up upon receiving such a probe response. 40

41 Infrastructure Protection Infrastructure Protection Description Protecting 40MHz High Throughput Devices Protection from AP(s) that support 40MHz HT involves containing the AP such that clients can not connect. Protecting n High Throughput Devices Protection from AP(s) that support HT involves containing the AP such that clients can not connect. Protecting Against AdHoc Networks Protection from an ad-hoc Network involves containing the ad-hoc network so that clients can not connect to it. The basic ad-hoc protection feature protects against ad-hoc networks using WPA/WPA2 security. The enhanced ad-hoc network protection feature protects against open/wep ad-hoc networks. Both features can be used together for maximum protection, or enabled or disabled separately Protection Against AP Impersonation Protection from AP impersonation involves containing both the legitimate and impersonating AP so that clients can not connect to either AP. Protection Against Misconfigured APs Protect Misconfigured AP enforces that valid APs are configured properly. An offending AP is contained by preventing clients from associating to it. 41

42 Infrastructure Protection Infrastructure Protection Protection Against Wireless Hosted Networks Protecting SSIDs Protection Against Rogue Containment Protecting Against Suspected Rogue Containment Protection Against Wired Rogue APs Description Clients using the Windows wireless hosted network feature can act as an access point to which other wireless clients can connect, effectively becoming a Wi-Fi HotSpot. This creates a security issue for enterprises, because unauthorized users can use a hosted network to gain access to the corporate network, and valid users that connect to a hosted network are vulnerable to attacks or security breaches. This feature detects a wireless hosted network, and contains the client hosting this network. Protect SSID enforces that valid/protected SSIDs are used only by valid APs. An offending AP is contained by preventing clients from associating to it. By default, rogue APs are not automatically disabled. Rogue containment automatically disables a rogue AP by preventing clients from associating to it. By default, suspected rogue APs are not automatically contained. In combination with the suspected rogue containment confidence level, suspected rogue containment automatically disables a suspect rogue by preventing clients from associating to it. This feature enables containment from the wired side of the network. The basic wired containment feature in the IDS general profile isolates layer-3 APs whose wired interface MAC addresses are the same as (or one character off from) their BSSIDs. The enhanced wired containment feature can also identify and contain an AP with a preset wired MAC address that is completely different from the AP s BSSID. In many non-aruba APs, the MAC address the AP provides to wireless clients as a gateway MAC is offset by one character from its wired MAC address. This enhanced feature allows to check to see if a suspected Layer-3 rogue AP s MAC address follows this common pattern. 42

43 Client Intrusion Protection Client Intrusion Protection Description Protecting Valid Stations Protecting a valid client involves disconnecting that client if it is associated to a non-valid AP. Protecting Windows Bridge Protecting from a Windows Bridge involves containing the client that is forming the bridge so that it can not connect to the AP. 43

44 THANK YOU!

45 EMEA Atmosphere 2017 Date: May 8-11, 2017 Location: Disneyland, Paris, France WHAT S NEW IN 2017 Vertical Demos: Retail, Healthcare, Hospitality, Education, Large Public Venue Hands on Labs: Airheads will get the chance to work on live lab use cases with our technical teams. Intelligent Spaces Room: The latest in connected digital workplace solutions. Appreciation Party: Its a secret!! Technical Training: Mobility Fundamentals 8.0, Instant AP + Central, ClearPass Level 1, Meridian Fundamentals, AirWave Fundamentals, Aruba Switching Fundamentals for Mobility Atmosphere: ACDX /MX/CX Exam 45

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Overview. Information About wips CHAPTER

Overview. Information About wips CHAPTER 1 CHAPTER This chapter describes the role of the Cisco 3300 mobility services engine (MSE) and the Cisco Adaptive Wireless Intrusion Prevention System (wips) within the overall Cisco Unified Wireless Network

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Managing Rogue Devices

Managing Rogue Devices Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

WIDS Technology White Paper

WIDS Technology White Paper Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Hooray, w Is Ratified... So, What Does it Mean for Your WLAN?

Hooray, w Is Ratified... So, What Does it Mean for Your WLAN? Global Leader in Wireless Security Hooray, 802.11w Is Ratified... So, What Does it Mean for Your WLAN? A Brief Tutorial on IEEE 802.11w Gopinath K N and Hemant Chaskar AirTight Networks www.airtightnetworks.com

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

WIRELESS EVIL TWIN ATTACK

WIRELESS EVIL TWIN ATTACK WIRELESS EVIL TWIN ATTACK Prof. Pragati Goel Associate Professor, NCRD s Sterling Institute of Management Studies, Navi Mumbai Mr. Chetan Singh NCRD s Sterling Institute Of Management Studie, Navi Mumbai

More information

Multipot: A More Potent Variant of Evil Twin

Multipot: A More Potent Variant of Evil Twin Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks http://www.airtightnetworks.net Email: gopinath.kn@airtightnetworks.net

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Requirements from the

Requirements from the Requirements from the collaborative Protection Profile for Network Devices Extended Package (EP) for Wireless Intrusion Detection/Prevention Systems (WIDS/WIPS) Version: 1.0 2016-10-06 National Assurance

More information

CWAP-402.exam. Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: CWAP-402

CWAP-402.exam. Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: CWAP-402 CWAP-402.exam Number: CWAP-402 Passing Score: 800 Time Limit: 120 min File Version: 1.0 CWAP-402 Certified Wireless Analysis Professional Version 1.0 Exam A QUESTION 1 The To DS bit is set to 0 and the

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

Section 4 Cracking Encryption and Authentication

Section 4 Cracking Encryption and Authentication Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to

More information

Wireless KRACK attack client side workaround and detection

Wireless KRACK attack client side workaround and detection Wireless KRACK attack client side workaround and detection Contents Introduction Components used Requirements EAPoL Attack protections Why this works Possible impact How to identify if a client is deleted

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

TECHNOLOGY GUIDE WIRELESS INTRUSION PREVENTION (WIP)

TECHNOLOGY GUIDE WIRELESS INTRUSION PREVENTION (WIP) TECHNOLOGY GUIDE WIRELESS INTRUSION PREVENTION (WIP) CONTENTS WIRELESS INTRUSION PREVENTION (WIP)... Reference Material... Wireless scanning... Wired Rogue AP Detection... 1 802.11ac Rogue Detection...

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Lure10: Exploiting Windows Automatic Wireless Association Algorithm

Lure10: Exploiting Windows Automatic Wireless Association Algorithm Lure10: Exploiting Windows Automatic Wireless Association Algorithm HITBSecConf2017, Amsterdam GEORGE CHATZISOFRONIOU (@_sophron) sophron@census-labs.com www.census-labs.com > Wi-Fi Automatic Association

More information

ECE 435 Network Engineering Lecture 8

ECE 435 Network Engineering Lecture 8 ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016 HW#3 was posted Announcements note the warnings you were getting on toupper()

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Chapter 1 Describing Regulatory Compliance

Chapter 1 Describing Regulatory Compliance [ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know

More information

ARUBA INSTANT DOT1X TROUBLESHOOTING

ARUBA INSTANT DOT1X TROUBLESHOOTING ARUBA INSTANT DOT1X TROUBLESHOOTING Technical Climb Webinar 12:00 GMT 13:00 CET 15:00 GST June 21st, 2016 Presenter: Barath Srinivasan barath.srinivasan@hpe.com Welcome to the Technical Climb Webinar Listen

More information

Configuring the EAPs Globally via Omada Controller

Configuring the EAPs Globally via Omada Controller Configuring the EAPs Globally via Omada Controller CHAPTERS 1. Wireless Network 2. Access Control 3. 4. Free Authentication Policy 5. MAC Filter 6. Scheduler 7. QoS 8. System This guide applies to: Omada

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

WPA Migration Mode: WEP is back to haunt you

WPA Migration Mode: WEP is back to haunt you Black Hat USA 2010 WPA Migration Mode: WEP is back to haunt you Leandro Meiners (lmeiners@coresecurity.com / @gmail.com) Diego Sor (dsor@coresecurity.com / diegos@gmail.com) Page 1 WPA Migration Mode:

More information

3.3.2 Example to Add Profile in Profile Step 1: Click Add in Profile function

3.3.2 Example to Add Profile in Profile Step 1: Click Add in Profile function Network Type: There are two types, infrastructure and 802.11 Ad-Hoc mode. Under Ad-Hoc mode, user can also choose the preamble type, the available preamble type includes auto and long. In addition to that

More information

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] s@lm@n CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ] Topic 1, A A Question No : 1 - (Topic 1) What criteria can an 802.11 wireless client use to

More information

Wireless IDS Challenges and Vulnerabilities. Joshua Wright Senior Security Researcher Aruba Networks

Wireless IDS Challenges and Vulnerabilities. Joshua Wright Senior Security Researcher Aruba Networks Wireless IDS Challenges and Vulnerabilities Joshua Wright Senior Security Researcher Aruba Networks Introduction Challenges and vulnerabilities in WIDS WIDS evasion techniques WIPS techniques, vulnerabilities

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Enterprise Data Communication Products. Feature Description - WLAN. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

Enterprise Data Communication Products. Feature Description - WLAN. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 02 Date 2013-05-15 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9 OSBRiDGE 24XL(i) Configuration Manual Firmware 2.05b9 1. Initial setup and configuration. OSBRiDGE 24XL devices are configurable via WWW interface. Each device uses following default settings: IP: 192.168.1.250

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

CCNA 3 (v v6.0) Chapter 4 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 4 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 4 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-4-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 4 Exam Answers

More information

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards HW Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.11 standards WLAN Standard (IEEE 802.11) The IEEE 802.11 is a family of standards that governs the operations and functions of WLANs.

More information

transmitting on the same channel or adjacent channels

transmitting on the same channel or adjacent channels Teltonika RUT1XX SNMP MIB description MIB (Management Information Base) is a database of objects that is used by SNMP protocol and can be monitored by a network management system. The Teltonika RUT1XX

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

WL-5420AP. User s Guide

WL-5420AP. User s Guide WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Physical and Link Layer Attacks

Physical and Link Layer Attacks Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber

More information

High Speed Risks in n Networks. Joshua Wright Aruba Networks 4/17/08 WIR-301

High Speed Risks in n Networks. Joshua Wright Aruba Networks 4/17/08 WIR-301 High Speed Risks in 802.11n Networks Joshua Wright Aruba Networks 4/17/08 WIR-301 Introduction IEEE 802.11n technology introduction Availability risks for legacy networks Extended range in 802.11n 40 MHz

More information

Security of WiFi networks MARCIN TUNIA

Security of WiFi networks MARCIN TUNIA Security of WiFi networks MARCIN TUNIA Agenda 1. Wireless standards 2. Hidden network and MAC filtering protection bypassing 3. Encryption independent attacks 4. Attacks on WEP 5. Attacks on WPA/WPA2 6.

More information

GETTING THE MOST OUT OF EVIL TWIN

GETTING THE MOST OUT OF EVIL TWIN GETTING THE MOST OUT OF EVIL TWIN B-SIDES ATHENS 2016 GEORGE CHATZISOFRONIOU (@_sophron) sophron@census-labs.com www.census-labs.com > WHOAMI Security Engineer at CENSUS S.A. Cryptography, Wi-Fi hacking,

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

Monitoring Wireless Devices

Monitoring Wireless Devices CHAPTER 6 This chapter describes how to use WCS to monitor your wireless LANs. It contains these sections: Monitoring Rogue Access Points, Adhocs, and Clients, page 6-1 Rogue Access Point Location, Tagging,

More information

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through encryption mode wep 1 accounting (SSID configuration) accounting (SSID configuration mode)

More information

Troubleshooting WLANs (Part 2)

Troubleshooting WLANs (Part 2) SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0 WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release 8.1.0 WAP9114 Release 8.1.0 Avaya Inc - External Distribution 1. Introduction This document provides

More information

Configuring Cipher Suites and WEP

Configuring Cipher Suites and WEP 10 CHAPTER This chapter describes how to configure the cipher suites required to use WPA authenticated key management, Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and broadcast

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

WLAN The Wireless Local Area Network Consortium

WLAN The Wireless Local Area Network Consortium WLAN The Wireless Local Area Network Consortium 802.11 Base AP MAC Layer Test Suite Version 3.5 Technical Document Last Updated: February 18, 2012 Wireless LAN Consortium 121 Technology Drive, Suite 2

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

Configuring VLANs CHAPTER

Configuring VLANs CHAPTER CHAPTER 13 This chapter describes how to configure your access point/bridge to operate with the VLANs set up on your wired LAN. These sections describe how to configure your access point/bridge to support

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-2 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-3 EAP over LAN 1-4 EAP over RADIUS 1-5 802.1X Authentication

More information

Configuring Management Frame Protection

Configuring Management Frame Protection Information About Management Frame Protection, page 1 Restrictions for Management Frame Protection, page 3 (GUI), page 3 Viewing the Management Frame Protection Settings (GUI), page 3 (CLI), page 4 Viewing

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

accounting (SSID configuration mode) through encryption mode wep

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration), page 3 antenna, page 4 authentication key-management, page 6 authentication network-eap, page 8 authentication

More information

An Integrated Scheme for Intrusion Detection in WLAN +

An Integrated Scheme for Intrusion Detection in WLAN + An Integrated Scheme for Intrusion Detection in WLAN + Dong hil Kim, Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Korea {dpkim, sjkoh, swkim}@cs.knu.ac.kr

More information

Chapter 1 Introduction

Chapter 1 Introduction Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Wireless Bridge User Manual. Version 1.0

Wireless Bridge User Manual. Version 1.0 Wireless Bridge 520645 User Manual Version 1.0 FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should

More information

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information