WLAN Security
What is Eavedropping?
War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit.
War Walking Someone walks around with a device and an 802.11 client card scanning for an 802.11 system access point to exploit.
War Chalking War Chalking is marking available access points on the sidewalk or another place in chalk so that other individuals can receive free access to networks.
What is Jamming? Jamming is the accidental or intentional use of RF energy to disrupt or overpower a specific channel or frequency.
What is Denial of Attack (DoS) A denial of service (DoS) attack is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services.
DoS attacks
Preventing DoS Attacks The AP would need to move to another, nondisrupted, channel
What is a Man in the Middle Attack? A man in the middle (MITM) attack is an attack in which an attacker is able to read, and modify at will, messages between two parties without either party knowing that the link between them has been compromised.
Hijacking In Hijacking, one of the tactics is that the hacker gains the victim's credentials (whatever they may be) and simply sends a terminate session packet to the victim and joins the network assuming the identity of the victim.
Bit Flip and Replay In a Bit Flip and Replay attack, the goal is to obtain the cipher stream so as to be able to decrypt additional traffic.
What are password Attacks?
Protecting Management Interfaces from Exploits
What is SSID? The SSID is a configurable parameter that must match on both the wireless client and the access point. In the Past, the most common methods of securing the WLAN were the service set identifier and the authentication process.
What is WEP? Basic 802.11 WEP, Wired Equivalent Privacy, security is designed to guard against the threat to network security from unauthorized 802.11 devices outside the LAN.
40 bit Key vs. 128 bit Key
AirCrack AirCrack is software used to crack WEP keys.
Using WEP with OPEN Authentication The open authentication method allows authorization and associations with or without a WEP key. If the client does not use a WEP key, the client undergoes the normal association process with the access point. The user is then granted access to the network.
Using Shared Key Authentication The client sends an authentication request to the selected access point. The access point sends an authentication response to the client containing unencrypted challenge text. The client then encrypts the challenge text using one of its WEP keys and sends it to the access point. The access point compares this encrypted challenge text against its copy of the encrypted challenge text. If the encrypted text is the same, then the access point allows the client on the WLAN.
What is MAC Authentication?
What is MAC Spoofing? Programs like SMAC allow hackers to "spoof" any MAC address.
802.11 Weaknesses
Q/A
What is Centralized Security Policy? To deploy large scale enterprise WLANs, network administrators need scalable, problemfree security administration that does not increase the burden on the IT staff
What are WPA and the 802.11i STD? WPA, Wi Fi Protected Access, provides a mechanism to authenticate keys for use in 802.11 environments as well as providing enhancements to WEP encryption to increase the robustness of the security protocol.
What is 802.1X Authentication? Remote Authentication Dial In User Service (RADIUS) is an authentication, authorization, and accounting (AAA) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
What is a WPA Preshared Key? The preshared key (PSK) of WPA and WPA2 was created for home users and small office/home office (SOHO) users who do not have the budget to maintain RADIUS authentication servers.
What is Temporal key Integrity Protocol? The key used for encryption in TKIP is 128 bits long. This solves the first problem of WEP, which is a key length that is too short.
Securing the Corporate Information Networks
Friend or Foe?
Measuring the Value of a Strategic Asset
IPSec Triple DES (3DES), encrypts the data three times with up to three different keys
Deploying IPSec
Hot Spot IPSec Security Example
The Security Wheel
Creating A Security Policy