Chapter 7 - Wirless Security
Chapter 7 - Wirless Security
Security
Chapter 7
Wireless Security
Why do we need?
Facilitates mobility – You can use lengthy wires instead, but someone might
trip over them.
Why security?
Attacker may hack a victim’s personal computer and steal private data or may
perform some illegal activities or crimes using the victim’s machine and ID.
Also there's a possibility to read wirelessly transferred data (by using
sniffers)
wireless hosts
laptop, smartphone
run applications
network may be stationary (non-mobile) or
infrastructure mobile
wireless does not always mean
mobility
wireless link
typically used to connect mobile(s) to
base station
also used as backbone link
multiple access control (MAC)
protocol coordinates link access
various data rates, transmission
distance
infrastructure mode
base station connects mobiles into
wired network
handoff: mobile changes base
station providing connection into
wired network
network
infrastructure
Uses
Key drivers are mobility and accessibility
Easily change work locations in the office
Increased productivity
Improved collaboration
No need to reconnect to the network Reduced costs
Ability to work in more areas No need to wire hard-to-reach areas
Network management and security Chapter 7 8
Basic concept of wireless security
The WLAN security wheel
An effective wireless security policy works to ensure that the network assets of the
organization are protected from sabotage and from inappropriate access, which
includes both intentional and accidental access.
All wireless security features should be configured in compliance with the security
policy of the organization.
If a security policy is not present, or if the policy is out of date, the policy should
be created or updated before deciding how to configure or deploy wireless
devices.
Chapter 7 9
WLAN Definition, Configurations and Architecture
(How Wireless Works)
Basic configuration
Most wireless access points are easily
accessible.
They are usually located near users and
outside of locked rooms.
This puts wireless access points at special
risk for theft and for compromise by
malicious users.
Network monitoring can be used to
determine when an access point goes off.
Proper procedures will need to be followed
to determine what happened to the
equipment.
Almost all wireless vendors publish the
methods of resetting an access point using
reset buttons or the console port.
Network management and security Chapter 7 11
WLAN Definition, Configurations and Architecture
(How Wireless Works)
WLAN Communication
Four-Way Handshake
Security Issues and Solutions
Sniffing and War Driving
Rogue Networks
Policy Management SSID
MAC Address WEP
Vulnerable to attack
Passive attacks to decrypt traffic based on statistical analysis
Active attacks to inject new traffic from unauthorized mobile stations,
based on known plaintext
Dictionary-building attack that, after analysis of a day’s worth of traffic,
allows real-time automated decryption of all traffic
All users of a given access point share the same encryption key
WLAN Implementaion
Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems,
services, or vulnerabilities.
Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems,
services, or vulnerabilities.
Authorization
Open Authentication and Shared Key Authentication are the two methods that the
802.11 standard defines for clients to connect to an access point.
The association process can be broken down into three elements known as probe,
authentication, and association.
This section will explain both authentication methods.
User authentication
check for unknown MAC (Media Access Control) addresses and alert the
network manager
Don't use your data for personal gain: Share the data with like-minded
people, show it to people who can change things for the better, use it for
education but don't try and make any money or status off your data.
Be like the hiker motto of 'take only pictures, leave only footprints':
Detecting SSID's and moving on is legal, anything else is irresponsible to
yourself and your community.
Use Encryption
Access Control
Ensure that your wireless infrastructure is not used.
Data Integrity
Ensure that your data packets are not modified in transit.
Confidentiality
Ensure that contents of your wireless traffic is not leaked.
change the
turn off identifier identifier on your
broadcasting router from the
default