What is Eavedropping?

Similar documents
D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Wireless LAN Security. Gabriel Clothier

Wireless Network Security

Wireless Attacks and Countermeasures

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

Wireless technology Principles of Security

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Chapter 24 Wireless Network Security

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

FAQ on Cisco Aironet Wireless Security

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Appendix E Wireless Networking Basics

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Securing a Wireless LAN

Configuring WEP and WEP Features

Lab Configure Enterprise Security on AP

Securing Wireless LANs with Certificate Services

LESSON 12: WI FI NETWORKS SECURITY

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Physical and Link Layer Attacks

Frequently Asked Questions WPA2 Vulnerability (KRACK)

BackTrack 5 Wireless Penetration Testing

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless LAN Security (RM12/2002)

Configuring Wireless Security Settings on the RV130W

Chapter 1 Describing Regulatory Compliance

Wireless Network Security Spring 2015

Configuring Cipher Suites and WEP

How Insecure is Wireless LAN?

TopGlobal MB8000 Hotspots Solution

Exam Questions CWSP-205

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Mobile Security Fall 2013

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

Wireless Network Security Spring 2016

Wireless Security and Monitoring. Training materials for wireless trainers

Configuring the Client Adapter through Windows CE.NET

Configuring a VAP on the WAP351, WAP131, and WAP371

Network aspects of School infrastructure

Configuring Layer2 Security

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Wireless# Guide to Wireless Communications. Objectives

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

Basic Wireless Settings on the CVR100W VPN Router

Open System - No/Null authentication, anyone is able to join. Performed as a two way handshake.

WPA Passive Dictionary Attack Overview

Cisco Exam Securing Wireless Enterprise Networks Version: 7.0 [ Total Questions: 53 ]

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

WIRELESS EVIL TWIN ATTACK

PRODUCT GUIDE Wireless Intrusion Prevention Systems

Standard For IIUM Wireless Networking

Wednesday, May 16, 2018

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

WarDriving. related fixed line attacks war dialing port scanning

Configuring a WLAN for Static WEP

COPYRIGHTED MATERIAL. Contents

Configuring Security Solutions

Wireless Security. Training materials for wireless trainers

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Network Encryption 3 4/20/17

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

Chapter 11: Networks

Chapter 11: It s a Network. Introduction to Networking

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Configuring WLAN Security

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK

Wireless Networking Basics. Ed Crowley

Authentication and Security: IEEE 802.1x and protocols EAP based

Using Mobile Computers Lesson 12

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

5 Steps Wifi Hacking Cracking WPA2 Password

EnGenius Quick Start Guide

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

Ethical Hacking and Prevention

DCWS-6028 Enterprise-Class Smart Wireless Access Controller. The Simple and Powerful Enterprise Smart Wireless LAN Controller

1.0 Basic RF Characteristics (15%) 1.1 Describe RF signal characteristics Frequency Amplitude Phase 1.1.

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points)

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

HACKING & INFORMATION SECURITY Presents: - With TechNext

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Configuring the Client Adapter through the Windows XP Operating System

Transcription:

WLAN Security

What is Eavedropping?

War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit.

War Walking Someone walks around with a device and an 802.11 client card scanning for an 802.11 system access point to exploit.

War Chalking War Chalking is marking available access points on the sidewalk or another place in chalk so that other individuals can receive free access to networks.

What is Jamming? Jamming is the accidental or intentional use of RF energy to disrupt or overpower a specific channel or frequency.

What is Denial of Attack (DoS) A denial of service (DoS) attack is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services.

DoS attacks

Preventing DoS Attacks The AP would need to move to another, nondisrupted, channel

What is a Man in the Middle Attack? A man in the middle (MITM) attack is an attack in which an attacker is able to read, and modify at will, messages between two parties without either party knowing that the link between them has been compromised.

Hijacking In Hijacking, one of the tactics is that the hacker gains the victim's credentials (whatever they may be) and simply sends a terminate session packet to the victim and joins the network assuming the identity of the victim.

Bit Flip and Replay In a Bit Flip and Replay attack, the goal is to obtain the cipher stream so as to be able to decrypt additional traffic.

What are password Attacks?

Protecting Management Interfaces from Exploits

What is SSID? The SSID is a configurable parameter that must match on both the wireless client and the access point. In the Past, the most common methods of securing the WLAN were the service set identifier and the authentication process.

What is WEP? Basic 802.11 WEP, Wired Equivalent Privacy, security is designed to guard against the threat to network security from unauthorized 802.11 devices outside the LAN.

40 bit Key vs. 128 bit Key

AirCrack AirCrack is software used to crack WEP keys.

Using WEP with OPEN Authentication The open authentication method allows authorization and associations with or without a WEP key. If the client does not use a WEP key, the client undergoes the normal association process with the access point. The user is then granted access to the network.

Using Shared Key Authentication The client sends an authentication request to the selected access point. The access point sends an authentication response to the client containing unencrypted challenge text. The client then encrypts the challenge text using one of its WEP keys and sends it to the access point. The access point compares this encrypted challenge text against its copy of the encrypted challenge text. If the encrypted text is the same, then the access point allows the client on the WLAN.

What is MAC Authentication?

What is MAC Spoofing? Programs like SMAC allow hackers to "spoof" any MAC address.

802.11 Weaknesses

Q/A

What is Centralized Security Policy? To deploy large scale enterprise WLANs, network administrators need scalable, problemfree security administration that does not increase the burden on the IT staff

What are WPA and the 802.11i STD? WPA, Wi Fi Protected Access, provides a mechanism to authenticate keys for use in 802.11 environments as well as providing enhancements to WEP encryption to increase the robustness of the security protocol.

What is 802.1X Authentication? Remote Authentication Dial In User Service (RADIUS) is an authentication, authorization, and accounting (AAA) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.

What is a WPA Preshared Key? The preshared key (PSK) of WPA and WPA2 was created for home users and small office/home office (SOHO) users who do not have the budget to maintain RADIUS authentication servers.

What is Temporal key Integrity Protocol? The key used for encryption in TKIP is 128 bits long. This solves the first problem of WEP, which is a key length that is too short.

Securing the Corporate Information Networks

Friend or Foe?

Measuring the Value of a Strategic Asset

IPSec Triple DES (3DES), encrypts the data three times with up to three different keys

Deploying IPSec

Hot Spot IPSec Security Example

The Security Wheel

Creating A Security Policy