GregSowell.com MikrotikUniversity.com. Rogue Access Point Detectoin and Mitigation MUM 2011

Similar documents
NETWORK SECURITY. Ch. 3: Network Attacks

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Advanced Network Troubleshooting Using Wireshark (Hands-on)

Wireless Network Security

The Applications and Gaming Tab - Port Range Forward

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

Wireless LAN Security (RM12/2002)

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi

Chapter 2. Switch Concepts and Configuration. Part II

ch02 True/False Indicate whether the statement is true or false.

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

VerifiedDumps. Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass

IX Series Protocol APPLICATION NOTE. Wiring

Detecting Protected Layer-3 Rogue APs

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

ARP Inspection and the MAC Address Table

Chapter 11: It s a Network. Introduction to Networking

Features and usage examples of wap device

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

15-441: Computer Networks Spring 2017 Homework 3

DWS-4000 Series DWL-3600AP DWL-6600AP

Mobile Security Fall 2013

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

Computer Networks Security: intro. CS Computer Systems Security

CIT 380: Securing Computer Systems. Network Security Concepts

Adopting Innovative Detection Technique To Detect ICMPv6 Based Vulnerability Attacks

Using Access Point Communication Protocols

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Computer Security II Lab Network Security

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Fundamentals of Computer Networking AE6382

The following virtual machines are required for completion of this lab: Exercise I: Mapping a Network Topology Using

Chapter 11: Networks

Curso: Ethical Hacking and Countermeasures

CHCSS. Certified Hands-on Cyber Security Specialist (510)

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Post Connection Attacks

Managing Rogue Devices

Application Notes for Mirage Networks CounterPoint in an Avaya IP Telephony Infrastructure Issue 1.0

ARP SPOOFING Attack in Real Time Environment

Release Notes for Avaya WLAN 9100 Access Point Operating System (AOS) Release

Software Engineering 4C03 Answer Key

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Industrial WLAN access point bintec WI1003n

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Managing Rogue Devices

Barracuda Firewall Release Notes 6.6.X

CompTIA Network+ Study Guide Table of Contents

What action do you want to perform by issuing the above command?

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Endpoint Security - what-if analysis 1

ECCouncil Certified Ethical Hacker. Download Full Version :

Our greatest weakness lies in giving up. The most certain way to succeed is always to try just one more time. ~Thomas A. Edison

Wireshark: Are You Under Attack? Kyle Feuz School of Computing

IPv6 Security: Oxymoron or Oxycodone? NANOG 60 Atlanta Paul Ebersman IPv6

Configuring the EAPs Separately via Omada Controller

1. Which OSI layers offers reliable, connection-oriented data communication services?

Gigabit SSL VPN Security Router

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Update your network settings

Real4Test. Real IT Certification Exam Study materials/braindumps

Configuring Parameters

Corso di Network Security a.a. 2012/2013. Solutions of exercises on the second part of the course

CSCD 433/533 Advanced Networking

A Framework for Optimizing IP over Ethernet Naming System

RG-WLAN Series Access Point. Web-Based Configuration Guide, Release 11.1(5)B8

ZAC Product Specification

WhatsConnected v3.5 User Guide

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities

CCNA 1 v5.0 R&S ITN Final Exam 2014

300M Wireless-N Broadband Router User Manual

1. Which network design consideration would be more important to a large corporation than to a small business?

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Per-WLAN Wireless Settings

Man in the middle. Bởi: Hung Tran

Configuring OfficeExtend Access Points

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

Assignment 2 TCP/IP Vulnerabilities

5GHz. Overview. Spotlight. Hardened IP65 Outdoor Wireless Bridge Subscriber Unit. PtP ITS

Family Structural Overview

CEH Tools. Sniffers. - Wireshark: The most popular packet sniffer with cross platform support.

Aruba Instant in AirWave 7.7

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Troubleshooting Common Wi-Fi Problems

SWITCH Implementing Cisco IP Switched Networks

ICS 451: Today's plan

network security s642 computer security adam everspaugh

Responder for Purple Teams

RG-WLAN Series Access Point. Web-Based Configuration Guide, Release 11.1(5)B3

Review: Networking Fall Final

Transcription:

Rogue Access Point Detectoin and Mitigation MUM 2011

Define Rogue Access Point A rogue in this instance is any access point connected to your network without permission.

Why Should I Care? Limited 802.11spectrum. Man in the middle attacks/information theft. Because they didn t say please.

Limited Spectrum 802.11b has only 3 nonoverlapping channels. 2400Mhz 2483Mhz 22Mhz channels 22 * 3 = 66Mhz for transmissions 4Mhz separation * 2 = 8Mhz 66 + 8 = 74Mhz of the available 83Mhz

Man In The Middle Attack MITM happens when an attacker convinces you to proxy your traffic through him. He then steals information or directs you to false resources.

Man In The Middle Attack A MITM attack usually happens when an attacker uses ARP poisoning on a network.

Man In The Middle Attack If you are performing MITM via an attackers access point, no poisoning is necessary you are willingly sending all of your traffic. How nice of you

Commercial Methods Keep a list of MAC addresses and alert when a new address appears. Monitor MAC addresses looking for those that are of a wireless manufacturer.

Detect Rogues Basic Flow Connect to probe and run wireless scan.

Detect Rogues Basic Flow Parse scan for open AP s not in ignore list.

Detect Rogues Basic Flow Connect to open AP s.

Detect Rogues Basic Flow Attempt to pull a resource that only exists internally to my network. If it fails to, move to the next AP.

Detect Rogues Basic Flow Attempt to pull a resource that only exists internally to my network. If it successfully pulls internal resource, we have a rogue. Send email alert listing what probe it came from and rogue info. Start a continuous ping from probe to internal resource.

Detect Rogues - Supplies Mikrotik Access Point. Preferably with a centrally located omni antenna. Windows machine. (Try to keep your booing to a minimum.) Putty. Windows SSH client. SMTP relay. Allows us to send alert emails. HTTP server. Hosts a basic html page. Rogue Detect program. Newest version will be on my blog along with source code. Written in AutoIT.

Rogue Detect Configuration Edit config files: Ignore-list.txt Any open AP s to ignore should be in this file. Format of MAC address~ssid Probes.txt This is the list of MTK probes to connect to. Format of IPaddress~username~password. Settings.txt This has all of the program settings. Format of: scan interval, internal server addressing and email settings.

Diagram

Step 1 Program starts. Connects to first probe. Scans for available APs.

Step 1 AP list pulled:

Step 2 Grab list of APs. Scan through for open APs. Ensure the open APs aren t on ignore list. Connect to AP. Release/renew DHCP address. Try and fetch rogue html page from server.

Rogue Diagram: Step 3

Step 3 Rogue Diagram Traffic Flow:

Step 3 Open packet sniffer. Determine IP address of sending ICMP. If on same subnet, find MAC address.

Step 3 IP in same subnet. Make note of MAC address.

Step 4 Track down MAC address. show mac-address-table. Shut down port with offending device. Pay visit to owner of AP.

Possible Extensions Track all APs, open and encrypted. Try company encryption on protected APs. Rewrite in portable format. Rewrite completely CLI version.

Completely Theoretical Extensions Get pan/tilt mount

Completely Theoretical Extensions Mount outdoor AP to PT.

Completely Theoretical Extensions Mount outdoors.

Completely Theoretical Extensions Connect serially controlled relays from PC to PT.

Completely Theoretical Extensions Create algorithm that scans for open APs and connects to each for connectivity test. Keep track of signal strength/speed test of all and connect to best. If connectivity is lost or signal degrades, automatically switch to backup APs.

Thanks and happy routing!

Resources Link To Article (Contains files) http://gregsowell.com/?p=3228 Greg s Blog http://gregsowell.com Training http:// Wikipedia http://en.wikipedia.org/wiki/rogue_access_point http://en.wikipedia.org/wiki/ieee_802.11 Wireshark http://www.wireshark.org/ Putty http://www.chiark.greenend.org.uk/~sgtatham/putty/