LESSON 12: WI FI NETWORKS SECURITY

Similar documents
Wireless Attacks and Countermeasures

Basic Wireless Settings on the CVR100W VPN Router

Using Mobile Computers Lesson 12

What is Eavedropping?

Configuring Wireless Security Settings on the RV130W

Chapter 1 Describing Regulatory Compliance

Wireless technology Principles of Security

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

5 Tips to Fortify your Wireless Network

Wireless LAN Security. Gabriel Clothier

Chapter 24 Wireless Network Security

FAQ on Cisco Aironet Wireless Security

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Securing Wireless LANs with Certificate Services

How Insecure is Wireless LAN?

Configuring a VAP on the WAP351, WAP131, and WAP371

The following chart provides the breakdown of exam as to the weight of each section of the exam.

GETTING THE MOST OUT OF EVIL TWIN

Wireless LAN Connection Guide

Configuring WEP and WEP Features

Configuring the Client Adapter through Windows CE.NET

MANUAL FOR CONNECTING TO VIVACOM NET WI-FI NETWORK OPEN WI-FI NETWORK

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

COPYRIGHTED MATERIAL. Contents

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

Configuring Cipher Suites and WEP

Securing a Wireless LAN

Wireless Security Security problems in Wireless Networks

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

1.0 Basic RF Characteristics (15%) 1.1 Describe RF signal characteristics Frequency Amplitude Phase 1.1.

WL 5011s g Wireless Network Adapter Client Utility User Guide

Troubleshooting End User Wireless Networks

Wireless Security and Monitoring. Training materials for wireless trainers

Exam Questions CWSP-205

Standard For IIUM Wireless Networking

The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable.

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

Physical and Link Layer Attacks

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Wireless MAXg Technology

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Wireless Security. Training materials for wireless trainers

300Mbps Wi-Fi Router. Expand Wi-Fi Coverage. TL-WR820N 300Mbps Easy Setup IPTV IPv6

Chapter 5 Local Area Networks. Computer Concepts 2013

Figure 5-25: Setup Wizard s Safe Surfing Screen

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Lab Configure Enterprise Security on AP

Configuring the Wireless Parameters (CPE and WBS)

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

NDSU Wireless. Bruce Curtis David Dahl Valerie Nordsletten

Security Setup CHAPTER

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Eduroam wireless network - Mac OSX 10.5 Leopard

L Operating instructions Wireless LAN PCI-Card MiMo 300 Express

IEEE i and wireless security

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Connecting Devices to the PSD-BYOD Network

WI-FI HUB+ TROUBLESHOOTING GUIDE

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Wireless Network Security


Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Wireless Network Security Spring 2015

How to connect to Wi-Fi

TestsDumps. Latest Test Dumps for IT Exam Certification

simplifying... Wireless Access

How Secure is Wireless?

TopGlobal MB8000 Hotspots Solution

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Networking. Prof. Abdul Hameed

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

User Guide AE6000. Wireless Mini USB Adapter AC580 Dual Band

Wireless Network Security

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV

WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK

Wireless-G Access Point with Power over Ethernet BUSINESS SERIES QUICK INSTALLATION. Package Contents

Authentication and Security: IEEE 802.1x and protocols EAP based

Installing Your Printer to Your Network for the First Time

Security of WiFi networks MARCIN TUNIA

Wireless Network Security Spring 2016

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

Getting Your Printer Back On Your Network After A Router Or Network Change

Chapter 17. Wireless Network Security

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge

Effective Strategies for Managing Cybersecurity Risks

Overview. Back view. Package contents. Linksys WAP300N. Overview

WLAN Connection Manual SPP-R410. Mobile Printer Rev

Configuring the Client Adapter through the Windows XP Operating System

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

Transcription:

LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong

Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information transmission through radio frequency signals through the air Theoretical range: 100 m Real range: several km Depending on obstacles and their density, transmission power, receiver sensitivity and the use of high gain antennas 2

Classification of Wi Fi Network Attacks (I) Denial of Service attacks (DoS) Difficult to avoid because they affect the technology functionality High impact on critical environments Affect on availability Communication interception Access to unencrypted data Undetectable Affects confidentiality 3

Classification of Wi Fi Network Attacks (II) Traffic injection to the wireless network Modifying the network's behaviour without having actual access to it Affects integrity Access to the wireless network Unauthorized connection to the wireless network Complete access Affects integrity 4

Wi Fi Network Security Wi Fi access points and controllers Goals Communication encryption Protecting data confidentiality Authentication and access control Identifying who can connect to the network Default settings Open or without security mechanisms Weak security mechanisms (WEP) 5

Wi Fi Network Security Mechanisms (I) WEP (Wired Equivalent Privacy) Old and insecure authentication and encryption mechanism Incorrect use of RC4 in its design Password required False security An attacker can obtain the password in less than a minute Use not recommended 6

Wi Fi Network Security Mechanisms (II) WPA (Wireless Protected Access) Temporary authentication and encryption mechanism used during the migration from WEP to WPA2 in wireless networks Based initially on TKIP (Temporal Key Integrity Protocol) Evolution of WEP (RC4) with upgrades It can be used with AES Use not recommended 7

Wi Fi Network Security Mechanisms (III) WPA2 (Wireless Protected Access 2) Personal or PSK Authentication and encryption mechanism Encryption: AES (Advanced Encryption Standard) Authentication: PSK (Pre Shared Key) Password shared by the access point and the Wi Fi clients The password should be long enough (over 20 characters) and hard to guess Recommended for personal and small businesses' wireless networks 8

Wi Fi Network Security Mechanisms (IV) WPA2 (Wireless Protected Access 2) Enterprise Authentication and encryption mechanism Encryption: AES (Advanced Encryption Standard) Authentication: 802.1X/EAP Random passwords (RADIUS server) Many types of EAP protocols: user name and password, digital certificates, smart cards... Recommended for businesses or corporate wireless networks 9

Wi Fi Network Security Mechanisms (V) Wireless Intrusion Detection System (WIDS) Detection and reaction to attacks on the wireless network Additional mechanisms: Reducing the intensity and range of the signal MAC address filtering Hiding the name of the Wi Fi network Not recommended: causes client vulnerability 10

Wi Fi Client Security (I) Desktop computers, laptops, mobile phones, smartphones, tablets and any other portable device Attacks to the Operating System and the Wi Fi card drivers Happen by having the Wi Fi switched on Even when not connected to a wireless network Avoid by keeping both updated 11

Wi Fi Client Security (II) Preferred Network List (PNL) Wi Fi clients try to connect to these networks when they are available Evil twin attack The victim displays its preferred networks The attacker creates a bogus network with the name of one in the PNL The victim connects to the attacker's network 12

Wi Fi Client Security (III) When do Wi Fi clients display their PNL? They shouldn't display it when updated Some are vulnerable and display them If the Wi Fi network is hidden A hidden network will not show itself when the device checks for available networks in the current location The client has to ask specifically for the hidden network in order to connect to it In this process, its presence in the PNL is revealed 13

Wi Fi Client Security (IV) Public wireless networks or hotspots Open networks or with weak security mechanisms (WEP) Café, library, hotel, airport, etc. Wireless network shared with all the users Including a possible attacker, allowing attacks among users Traffic can be intercepted by anyone Even if encryption based on WPA2 AES is used, because the password is the same for all users 14

Security Tips for Wi Fi Networks and Wi Fi Networks Clients Shorten the range of the signal Don't set the Wi Fi network as hidden Use WPA2 AES Personal (PSK) or Enterprise (802.1x EAP) Wi Fi Clients Update the OS and the Wi Fi driver Switch off the Wi Fi when not in use Avoid connection to insecure wireless networks, like hotspots or those based on WEP Keep the Preferred Network List (PNL) updated 15

Contact: info@intypedia.com