Top Banner
Wireless Network Security Pat Wilbur Wireless Networks March 30, 2007
24

Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Sep 29, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Wireless Network Security

Pat WilburWireless Networks

March 30, 2007

Page 2: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Types of Attacks

● Intrusion – gain unauthorized access to a network in order to use the network or Internet connection

Page 3: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Types of Attacks

● Intrusion – gain unauthorized access to a network in order to use the network or Internet connection

● Capturing – spy on packets being sent over wireless network in order to obtain sensitive information about a system, network, or user

Page 4: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Common Types of Attacks

● Intrusion – gain unauthorized access to a network in order to use the network or Internet connection

● Capturing – spy on packets being sent over wireless network in order to obtain sensitive information about a system, network, or user

● Denial of Service – debilitate the wireless network to disrupt user activity

Page 5: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Why Secure A Wireless Network?

● Protect sensitive data

Page 6: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Why Secure A Wireless Network?

● Protect sensitive data● Reduce unnecessary bandwidth consumption

Page 7: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Why Secure A Wireless Network?

● Protect sensitive data● Reduce unnecessary bandwidth consumption● Liability (and accountability)

Page 8: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Open Access Points

●   The only way to keep communication truly   secure is to use end­to­end encryption.

Page 9: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Open Access Points

●   The only way to keep communication truly   secure is to use end­to­end encryption.

●   If having services like file shares and printers, it   is advisable to have other security in place.  

Page 10: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Open Access Points

●   The only way to keep communication truly   secure is to use end­to­end encryption.

●   If having services like file shares and printers, it   is advisable to have other security in place. 

●   One should never assume that the private   network is inaccessible from the outside.  

Page 11: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Open Access Points

●   The only way to keep communication truly   secure is to use end­to­end encryption.

●   If having services like file shares and printers, it   is advisable to have other security in place. 

●   One should never assume that the private   network is inaccessible from the outside. 

●   It is common to pay a fixed rate for the Internet   connection, and the extra traffic will not hurt. 

Page 12: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering

Page 13: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering● Encryption

Page 14: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering● Encryption

– Access Point Encryption

Page 15: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering● Encryption

– Access Point Encryption– End­to­end Encryption

Page 16: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering● Encryption

– Access Point Encryption– End­to­end Encryption– VPN Tunneling

Page 17: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Securing Wireless Networks

● MAC Address Filtering● Encryption

– Access Point Encryption– End­to­end Encryption– VPN Tunneling

● Handshake Authentication

Page 18: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Access Point Encryption

● WEP – Wired Equivalence Privacy– 64­bit (40­bit key) or 128­bit (104­bit key)– Uses a key concatenated with an Initialization Vector– Due to limit in IV length, not long before IVs are 

repeated, thus relatively easy to crack– Shared key system: no protection from legitimate clients– Readily available toolkits for cracking (aircrack­ng)– WEP2 boasted larger IVs and enforced 128­bit 

encryption, but same vulnerabilities existed—only slowed attackers

Page 19: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Access Point Encryption

● WPA – Wi­Fi Protected Access– WPA was rushed to replace WEP– Based on passphrase used to generate a key– WPA2 implements the full 802.11i standard– Dynamically changed keys instead of static like WEP– Much more robust error checking which is less likely to 

be faked, so harder to inject packets like in WEP– PSK­mode is vulnerable to passphrase cracking when 

weak passphrases are used

Page 20: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Access Point Encryption

● WPA­Enterprise– An authentication server is required– RADIUS server often used– Each new session gets its own unique key for 

increased security

Page 21: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Weaknesses in AP Encryption

● WEP– 64­bit keys may be cracked in a matter of minutes 

through sniffing and injection (aircrack and aireplay)– For more information on how frames are injected:

http://www.aircrack­ng.org/doku.php?id=aireplay­ng&DokuWiki=e08569e892dc2c22c68f28e0e17b90ab

Page 22: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Weaknesses in AP Encryption

● WEP– 64­bit keys may be cracked in a matter of minutes 

through sniffing and injection (aircrack and aireplay)– For more information on how frames are injected:

http://www.aircrack­ng.org/doku.php?id=aireplay­ng&DokuWiki=e08569e892dc2c22c68f28e0e17b90ab● WPA­PSK

– Vulnerable to dictionary attacks

Page 23: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

Weaknesses in AP Encryption

● WEP– 64­bit keys may be cracked in a matter of minutes 

through sniffing and injection (aircrack and aireplay)– For more information on how frames are injected:

http://www.aircrack­ng.org/doku.php?id=aireplay­ng&DokuWiki=e08569e892dc2c22c68f28e0e17b90ab● WPA­PSK

– Vulnerable to dictionary attacks● WPA­Enterprise

– Less vulnerable due to unique keys per session

Page 24: Wireless Network Security - Clarkson University · Types of Attacks Intrusion – gain unauthorized access to a network in order to use the network or Internet connection Capturing

References

● http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy● http://en.wikipedia.org/wiki/Wi­Fi_Protected_Access● http://en.wikipedia.org/wiki/Wireless_security● http://en.wikipedia.org/wiki/Wireless_LAN_Security