1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Wireless Security ppt

41 433 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Wireless Security
Tác giả Mark Nakrop
Chuyên ngành Wireless Security
Thể loại presentations
Định dạng
Số trang 41
Dung lượng 1,17 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Wireless Security, Advanced Wireless LAN HackingAdvanced 802.11 Attack Wireless Best Practices Wireless Hacking Tools wlan-jack, essid-jack, monkey-jack, kracker-jack Network Stumbler M

Trang 1

Wireless Security

Mark NakropManaging DirectornForce Security Systems

Trang 2

Wireless Security, Advanced Wireless LAN Hacking

Advanced 802.11 Attack Wireless Best Practices Wireless Hacking Tools wlan-jack, essid-jack, monkey-jack, kracker-jack Network Stumbler

Mitigation Strategies

Agenda

Trang 3

Conventional LAN Security Model

C o r p o r a t e F i r e w a l l

I n t e r n e t

Firewall shields inside from outside.

Trang 4

Attacks can happen over air Attacks bypass the firewall.

Internet

Corporate Firewall

Network not confined to wires/premises anymore.

Trang 5

Threats from Unmanaged Devices

Common

Rogue Access Points

Ent erp

rise Ne two rk

Nei ghb orin g N

AP MAC Spoofing Rogue AP

Mis-configured

AP

Unauthorized Association Mis-association

Honeypot

Mis-configured Access Points

Denial of Service

De-authentication flood Packet storm

MAC Spoofing APs

Malicious

Honeypot APs

Unauthorized associations Client mis-associations

Ad hoc connections

Trang 6

Goals of WLAN Security

Fortify authorized communication

Access control and encryption over wireless link

WEP  WPA  802.11i adequately address this problem

Protect the network from unmanaged devices

Rogue APs, DoS attacks, client misassociations, Honeypots, ad hoc networks, MAC spoofing etc.

Current pain point in enterprise network

Wireless Intrusion Detection and Prevention Systems

Trang 7

802.11, 802.11b, etc.

IEEE standard – based on well known Ethernet standards

802.11 – FHSS or DSSS, WEP, 2.4 GHz, Infrastructure (BSS) or Ad-Hoc (iBSS)

Limited to 2Mb/s due to FCC limits on dwell times per frequency hop

802.11b – DSSS only, WEP, 2.4 GHz, Infrastructure or Ad-Hoc

Up to 11Mb/s

Also known as Wi-Fi

802.11a and 802.11g

Trang 8

Low level DoS is hard to prevent

Like any other environment, there are no silver bullets

Trang 9

Current Security Practices

WEP –Wired Equivalent Privacy

Link Level

Very Broken

Firewalls/MAC Filtering

Reactionary – IDS/Active Portal

Higher level protocols

Trang 10

Thoughts on WEP

Key management beyond a handful of people is impossible

Too much trust

Difficult administration

Key lifetime can get very short in an enterprise

No authentication for management frames

No per packet auth

False Advertising!!!

Trang 11

What is Lacking?

Scalability

Many clients

Large networks

Protection for all parties

Eliminate invalid trust assumptions

Trang 12

What is War Driving.?

Equipped with wireless devices and related tools, and driving around in a

vehicle or parking at interesting places with a goal of discovering into wireless networks is known as war driving War-drivers define war driving

easy-to-get-as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers

Trang 13

What is War Chalking.?

War chalking is the practice of marking sidewalks and walls with special symbols to indicate that wireless access is nearby so that others do not need to go through the trouble of the same

discovery

Trang 14

What Will Be Covered

Wireless network best practices

Practical attacks

The focus of the attack(s)

The network layers

The bottom 2 layers

Custom (forged) 802.11b management frames

The Tool Box

Drivers

Utilities

Proof of concept code

Trang 15

What Will Be Covered

Attack Scenarios

Denial of service

Masked ESSID detection

802.11b layer MITM attack

Inadequate VPN implementations

Mitigation Strategies

Trang 16

Wireless Best Practices

Enable WEP - Wired equivalent privacy

Key rotation when equipment supports it

Disable broadcast of ESSID

Block null ESSID connection

Restrict access by MAC address

Use VPN technology

Use strong mutual authentication

Trang 17

Practical Attacks

WEP – Can be cracked passively

Masked ESSID – Can be passively observed in management frames during association

Block null ESSID connects – Same problem

Install VPN – Weakly authenticated VPN is susceptible to active attack (MITM)

Strong mutual authentication - ?

Trang 18

The Tool Box

Custom Drivers

Air-Jack

Custom driver for PrismII (HFA384x) cards

MAC address setting/spoofing

Send custom (forged) management frames

Trang 19

Attack Scenarios – WLAN-Jack

Trang 20

Attack Scenarios – WLAN-Jack

Airopeek Trace

Trang 21

Attack Scenarios – WLAN-Jack

Airopeek Trace

Trang 22

Attack Scenarios – WLAN-Jack

Decode of Deauthentication Frame

Trang 23

Attack Scenarios – WLAN-Jack

This is your connection

Trang 24

Attack Scenarios – WLAN-Jack

This is your connection on Jack

Trang 25

WLAN-Attack Scenarios – ESSID-Jack

Is the ESSID a shared secret?

If I mask the ESSID from the AP beacons then unauthorized

users will not be able to associate with my AP?

Discover Masked ESSID

Send a deauthenticate frame to the broadcast address

Obtain ESSID contained in client probe request or AP probe response.

Trang 26

Attack Scenarios – ESSID-Jack

Trang 27

Attack Scenarios - ESSID-Jack

Airopeek Trace

Trang 28

Attack Scenarios – ESSID-Jack

Airopeek Trace

Trang 29

Attack Scenarios – Monkey-Jack

MITM Attack

Taking over connections at layer 1 and 2

Insert attack machine between victim and access point

Management frames

Deauthenticate victim from real AP

Send deauthenticate frames to the victim using the access point’s MAC address as the source

Trang 30

Attack Scenarios – Monkey-Jack

Victim’s 802.11 card scans channels to search for new AP

Victim’s 802.11 card associates with fake AP on the attack machine

Fake AP is on a different channel than the real one

Attack machine’s fake AP is duplicating MAC address and ESSID

of real AP

Attack machine associates with real AP

Attack machine duplicates MAC address of the victim’s machine

.

Attack machine is now inserted and can pass frames through in a manner that

is transparent to the upper level protocols

Trang 31

Attack Scenarios – Monkey-Jack

Before Monkey-Jack

Trang 32

Attack Scenarios Monkey-Jack

After Monkey-Jack

Trang 33

Attack Scenarios - Monkey-Jack

Trang 35

NetStumbler

Trang 36

Airopeek

Trang 37

Mitigation Strategies

Wireless IDS and Monitoring

VPN + Strong mutual authentication

RF Signal shaping – Avoiding signal leaks

Antennas with directional radiation pattern

Trang 38

Wi-Fi Intrusion Detection and Prevention

Ent erp rise Ne two rk

AP MAC Spoofing Rogue AP

Mis-configured AP

Unauthorized Association Mis-association

Honeypot Mis-association

Trang 39

Wireless networks are more susceptible to active attacks than wired networksEnable all built-in security capabilities

Use VPN with strong mutual authentication

Monitor wireless network medium (air space) for suspicious activity

Trang 40

DON’T GET DISCOURAGED!

Attackers are constantly improving their skills

The security community must strive to improve as well

Keeping up is a lot of work

But it can be fun, and does help ensure job security

Experiment in your Hacker Analysis Laboratory

By remaining diligent,

you can defend

your computer systems! 

Trang 41

THANK YOU

Ngày đăng: 22/01/2014, 15:20

TỪ KHÓA LIÊN QUAN

w