Abusing the Windows WiFi native API to create a Covert Channel
|
|
|
- Lambert Carpenter
- 10 years ago
- Views:
Transcription
1 Abusing the Windows WiFi native API to create a Covert Channel Andrés Blanco, Ezequiel Gutesman Core Security Technologies April 13, 2011 Abstract Communications over wireless channels have been perfectioned in the last years mainly improving performance and speed features. Security in this field has been a concern since the first draft, having evolved by adding security features based on different crypto systems. In this paper we focus on the construction of a covert channel, exploitable in any system, between any endpoint and a specially crafted endpoint. The channel built can be started even while an active connection is established between a computer and a wireless Access Point, with one unique network device. This functionality allows an attacker that compromised a wireless enabled endpoint to extract available information and avoid detection. We will describe the design behind the channel structure and a fully functional implementation. 1 Introduction Several factors must be considered in order to develop a functional guest covert channel hosted in any medium or protocol. First, one must decide which legitimate information units from the host protocol will be used to carry the covert channel messages. Second, the limitations of the covert channel such as speed or bandwidth are directly established by the first choice. This work has as its main purpose to design a covert channel over , giving connectivity to the attacker s machine from a low-privilege application running on the victim s machine. Our purpose was to establish a communication between two peers, A and B. Assuming: Peer A represents the victim and could be connected to a legitimate wireless network. We have a userland process runnning on peer A, no privilege escalation seems to be possible. We want to establish a connection through wireless medium with this process. Peer B is the attacker s machine, fully controlled. The only requirements for this peer is that it must have injection capabilities, being able to inject for example, management frames (i.e., raw injection). 1
2 There could be other peers, say A that could also be connected through the covert channel. The next sections describe the decisions taken in the design, a description of the abused features inside the Windows WiFi native API and how the channel could be used in a real scenario Management Frames Overview A radical difference exists between wired and wireless networks. While trying to identify a network station or when an identified network station wants to connect with a network several steps must be followed management frames are used to perfom tasks that may be trivial in wired networks but that in a wireless medium require some special attention. For example, mobile stations searching for connectivity must locate compatible Access Points (AP). After identifying the network, the mobile station must be authenticated by the AP and once authenticated it must associate with it in order to get access to the network. In a wired environment some of these tasks are performed by simply throwing a cable between the station and a central node (e.g., a network switch). 2.1 Structure of Management Frames All types of management frames (see [80205]) share the same header information in the Medium Access Control (MAC) layer but differ in their body. This structure is illustrated in figure 1. Source address (SA) and destination address (DA) are used to define the frame s direction. Some management frames are used to maintain properties inside a Basic Service Set (BSS 1 ). The BSSID field is used in order to limit the effect of broadcast and multicast. Theoretically, only broadcast and multicast frames from the BSSID that the mobile station is currently associated with should be passed to MAC management layer, the only exception for this rule are the beacon frames. We will focus on the process of AP announcing & discovery. This process involves both the mobile station and the AP and use special types of managenemt frames: the Beacon, Probe Request and Probe Response frames. 1 The building block of networks. A BSS is a set of stations that are logically associated with each other [80205] Frame ctl + Duration DA SA BSSID Seq ctl Frame Body FCS Figure 1: MAC management frame header. 2
3 2.2 Interesting Management Frame Sub-Types Beacon Frames This management frames announce the presence of a network. They are transmitted in regular intervals and carry information about the network (such as the security algorithm used, transmission properties, etcetera). The BSS is defined through the beacon range. As shown in figure 2 Beacons add 3 mandatory fields to the common MAC header shared by all Management frames: Timestamp, Beacon Interval, Capability bitmap and SSID Variable Timestamp BeaconCap. Interval Info SSID Figure 2: Beacon frame body mandatory fields. Beacons are received from any client inside the beacon range. In MS Windows systems, some fields can be read by userland processes, giving different Network monitors access to the information present in the beacons, this is a crucial property that will be very useful for our purposes. Probe Request Frames Mobile stations scanning for available (and ussually known) networks send probes. In a Probe Request frame the stations could specify the requested SSID and the rates supported by the station. In order for a station to be able to join a BSS, it has to support all the rates supported by the BSS and announced in the Beacon frames. Figure 3 shows the fields in a Probe Request frame. Variable Variable Variable SSID Supported Extended Rates Supported Rates Figure 3: Probe Request frame body fields. Probe Response Frames Once a Probe Request is received by a network with compatible parameters it sends a Probe Response frame. The responsiblity of answering a Probe Request lies on the station that sent the last Beacon frame. While in infrastructure networks this responsibility goes to the AP. The structure of a Probe Response carries the same information found in a Beacon frame adding some specific fields which give details about the channel, such as frequency hopping properties. 3
4 3 Previous Work The idea of a covert channel over has been mentioned in previous works [Oud] and some of them [LB] have made different implementations (e.g. Raw covert) that needed special driver patches or worked for some OSs or drivers. Raw Covert [LB] used control ACK frames to encapsulate a proprietary protocol, it had some limitations on the drivers used and was designed to communicate two hidden peers. The present covert channel implementation uses some ideas presented by previous work but never seen implemented. It works on any Windows operating system (starting from Windows XP TM service pack 2 through Windows 7 TM ) without any specific driver. The main difference between the present work and previous prototypes is that the covert channel implemented can be established even from a compromised host that has an active conection. It is intended, for example, to be reliable in a post-exploitation phase 2, easy to use as an alternative communication channel with a compromised host. According to Lampson [Lam73] a communication channel is covert if it was neither designed nor intended to transfer information at all; it uses entities not normally viewed as data objects to transfer information from one subject to another [Kem83]. Hiding information inside network protocols [HS96] has been broadly studied and resulted in a more specific definition for covert channels including properties such as indistinguishability and detectability. This means a covert channel cannot be distinguished among normal traffic, no matter whether it s encrypted or not. In the context of the implementation of this covert channel we should say that if we encrypt the information contained inside the frames, we could pass as undetectable, this has a relation with the work presented in [DZM05] that explains that Windows XP injects Probe Requests with random data inside the SSID IE. So it would be difficult to distinguish between real probes or the covert channel implementation. For the purpose of the PoC encryption features were not included. 4 Covert Channel Design The main purpose in the construction of a wireless channel is to take advantage of some particular OS-level functionalities related to wireless connectivity by using them for a covert communication channel. The particularity of these functionalities is that they can be used without having special privileges or enabling special driver modes on the wireless cards such as the monitor mode. 2 The tasks performed after taking control over a system, with either high or low privileges. 4
5 Figure 4: Channel messages between peer A (victim), peer B (attacker) and a potential victim. Figure 4 shows one possible scenario where this channel could be used to connect two peers, A and B, where peer A has an active connection with an AP. There is a tiny protocol which controls the channel. In order to exchange information we will use the types of management frames described in section 2.2 as our channel packages. For this purpose, the channel must be encapsulated into valid management frames. Management frames share the same MAC layer header and depending on the frame subtype, they specify different information elements which carry specific information for each subtype. Probe Request frames are the management frame subtypes used to communicate from the victim to the attacker s machine. According to the specification [80205], a client sends Probe Requests when it tries to find available (previously known) networks. Since Probe Request are part of the management frame type they have a BSSID field which is a 6-octet MAC address that identifies the AP that the client is trying to connect to. The information element carried inside Probe Requests is the SSID element, a 32-byte element used to carry the friendly name of the 5
6 network (e.g. the one seen while browsing networks from a connection manager while reading Beacon frames from the AP). With these two fields we have a total of 38 bytes for each packet in our channel. Table 4 specifies how these bytes are used. Mgmt. Field Byte Value BSSID 0 2 Signature 3 Flags 4 5 Seq. No. SSID 0 32 Packet Data Table 1: Packet fields mapping. Section 5 further describes implementation details on the Windows WiFi native API [Win]. 5 Implementation Details As described in section 4, we need to be able to process information from Beacon and Probe Response frames and send information through Probe Request frames. In Microsoft Windows systems the Native Wifi API provides all the functionality needed. The key functions to create the covert channel are the following: WlanScan WlanGetNetworkBssList The WlanScan function is used to inject data through Probe Request frames and WlanGetNetworkBssList to read data from Beacon and Probe Response frames. With this two functions we have a channel. The signature of WlanScan follows: DWORD WINAPI WlanScan( in HANDLE hclienthandle, in const GUID *pinterfaceguid, in_opt const PDOT11_SSID pdot11ssid, in_opt const PWLAN_RAW_DATA piedata, reserved PVOID preserved ); As we can see above, there are two parameters that can set data inside the Probe Request frame. The pdot11ssid parameter that sets the SSID Information Element and the piedata that sets a custom Information Element. In the case of pdot11ssid parameter we have a pointer to a DOT11 SSID structure: typedef struct _DOT11_SSID { ULONG ussidlength; UCHAR ucssid[dot11_ssid_max_length]; } DOT11_SSID, *PDOT11_SSID; 6
7 This structure has two members: ussidlength: The length, in bytes, of the ucssid array. ucssid: The SSID. DOT11 SSID MAX LENGTH is set to 32. This imposes the 32 bytes data limit. In the case of piedata parameter we have a pointer to a WLAN RAW DATA structure: typedef struct _WLAN_RAW_DATA { DWORD dwdatasize; BYTE DataBlob[1]; } WLAN_RAW_DATA, *PWLAN_RAW_DATA; This structure has two members: dwdatasize: The size, in bytes, of the DataBlob member. The maximum value of the dwdatasize may be restricted by the type of data stored in the WLAN RAW DATA structure. DataBlob: The data blob. In this case we have a limitation of 240 bytes that is defined by the DOT11 PSD IE MAX DATA SIZE constant. As a side note we should notice that injecting data on an Information Element works only in drivers that support it. The WlanGetNetworkBssList function is going to return the data acquired through Beacon and Probe Response frames. This can be seen as the INPUT side of the channel. It has the following parameters: DWORD WINAPI WlanGetNetworkBssList( in HANDLE hclienthandle, in const GUID *pinterfaceguid, opt const PDOT11_SSID pdot11ssid, in DOT11_BSS_TYPE dot11bsstype, in BOOL bsecurityenabled, reserved PVOID preserved, out PWLAN_BSS_LIST *ppwlanbsslist ); For our purposes, the most important parameter of this function is the last one, the pointer to a WLAN BSS LIST structure: typedef struct _WLAN_BSS_LIST { DWORD dwtotalsize; DWORD dwnumberofitems; WLAN_BSS_ENTRY wlanbssentries[1]; } WLAN_BSS_LIST, *PWLAN_BSS_LIST; 2 The piedata only works with some drivers. A workaround could be that the protocol could test if the driver supports the injection of the piedata and in the case it works set the application to use this extra data setting a bigger MTU. 7
8 This structure is a list of WLAN BSS ENTRY structures each one containing the information of the BSS 3 : typedef struct _WLAN_BSS_ENTRY { DOT11_SSID dot11ssid; ULONG uphyid; DOT11_MAC_ADDRESS dot11bssid; DOT11_BSS_TYPE dot11bsstype; DOT11_PHY_TYPE dot11bssphytype; LONG lrssi; ULONG ulinkquality; BOOLEAN binregdomain; USHORT usbeaconperiod; ULONGLONG ulltimestamp; ULONGLONG ullhosttimestamp; USHORT uscapabilityinformation; ULONG ulchcenterfrequency; WLAN_RATE_SET wlanrateset; ULONG ulieoffset; ULONG uliesize; } WLAN_BSS_ENTRY, *PWLAN_BSS_ENTRY; Since this structure provides a lot of information about the BSS it could be used as input data for the channel. 6 Attack Vectors Technological complexity in daily-used devices turned the traditional perspective of the network boundaries obsolete [Ric08]. The scenario where an attacker penetrates an infrastructure from the only connection that joins the outer world with, for example, an enterprise network cannot be taken seriously. Client side attacks, web application attack vectors and connectivity provided by mobile devices and portable computers, among others, opened new ways of compromising the networks, presenting new challenges to the ones in charge of protecting them. The presented work can be used as a way out (or way in, depending on which side you are standing) from the classical perimeter notion. An already compromised computer, which could have been an employee s notebook attacked while surfing the web in a coffee shop can be used as a gate to a given private network. It could be running a channel deamon listening for available wireless networks that when receiving a special crafted packet opens the connection through the covert channel without the users notice. In penetration testing terms, compromised machines (e.g., running network agents or advanced payloads [Cac02, Met]) could loose connectivity and might use wireless covert channels to try to establish a connection back to the penetration tester console, bypassing all the security infrastructure the network could have (e.g., firewalls and traffic rules). Figure 5 shows a possible scenario where a wireless covert channel could be useful. 3 basic service set. 8
9 Figure 5: Sample network boundaries scenario for covert channel attacks. Another example could be compromising a machine with a client-side exploit using a pen drive as the attack vector and connecting back from the compromised target. In this scenario, if the machine lacks a network connection, the attack will fail. Using the covert channel could allow communication with the target without any connection besides the wireless covert channel. Figure 6: Sample of an offline attack using the covert channel. 9
10 7 Conclusions Limitations exist both on the INPUT and OUTPUT data we can use for the channel which have a direct impact on its bandwidth. The most significative advantage of using the WiFi Native API is that no special privileges are required and the state of the Wireless Network Interface is not a limitation, since it can be joined to a wireless network or not. Morover, it works with any Wireless Network Interface that works in MS Windows with no special drivers. Another important advantage for using this API is that the end user never notices that someone is using the Wireless Network Interface, and the only sign of the channel existance are the network names injected in the beacons that announce the existence of the channel, which have an empty value. Once the channel is open, directed probe responses and probe requests are used to communicate, so a normal user (i.e., anyone not looking for a covert channel) would not detect it. With this advantages we could say that implementations of this covert channel are a good options besides similar attacks usign SoftAP and that are a real threat for network security. 8 Future Work There are various features to be implemented in the prototype code. First, multi client support has to be added in order to be able to communicate different clients with one server (attacker). Cryptographic armoring can be also implemented although the small bandwith of the channel should be analyzed in order to decide which cryptographic scheme to adopt. Another operating system clients (the piece of code running on the attacked system) can also be implemented but still need deeper research. We currently focused in MS Windows systems in order to take advantage of the Native WiFi API provided in such systems. References [80205] Wireless Networks, The Definitive Guide. O Reilly, [Cac02] Maximiliano Caceres. Syscall proxying - simulating remote execution. Corelabs Technical Report, [DZM05] D.A. Dai Zovi and S.A. Macaulay. Information assurance workshop. proceedings from the sixth annual ieee smc, [HS96] T. G. Handel and M. T. Sandford. Lecture Notes in Computer Science, chapter Hiding dat. Springer Berlin / Heidelberg, [Kem83] Richard A. Kemmerer. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Comput. Syst., 1(3): ,
11 [Lam73] [LB] [Met] Butler W. Lampson. A note on the confinement problem. Commun. ACM, 16(10): , Franck Veysset Laurent Butti. Wi-fi advanced stealth. In Black Hat Briefings USA Meterpreter payload. URL: [Oud] Laurent Oudot. Wlan and stealth issues. In Black Hat Briefings Europe [Ric08] Gerardo Richarte. Evolution of penetration testing, 2005 to SANS What Works in Penetration Testing & Ethical Hacking Summit. Las Vegas, NV, May 31 - June 9, 2008., [Win] Windows wifi native api reference. URL: 11
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Hole196 Vulnerability in WPA2
Hole196 Vulnerability in WPA2 1 Hole196 Vulnerability in WPA2 Presenters: Anthony Paladino, Managing Director, Systems Engineering Dr. Kaustubh Phanse, Principal Wireless Architect Md. Sohail Ahmad, Senior
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Do You See What I See (DYSWIS)
Do You See What I See (DYSWIS) Introduction: DYSWIS is a system that leverages distributed network nodes to gather network management information for fault isolation and diagnosis. This project extends
Virtual Access Points
Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
visual packet analysis
visual packet analysis Eye P.A. by MetaGeek USER GUIDE page 1 Eye P.A. visual packet analysis SYSTEM REQUIREMENTS INSTALLATION DIRECT CAPTURE COMPATIBLE FILE FORMATS MAIN VIEWS Work Flow Filter Bar Multi-Layered
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Oudot Laurent [email protected] http://rstack.org/oudot/
WLAN and Stealth Issues Oudot Laurent [email protected] http://rstack.org/oudot/ Agenda WLAN security & some related physical issues Problems with open services Classical solutions for TCP/IP open services
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks
Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
Create Virtual AP for Network Campus with Mikrotik
Create Virtual AP for Network Campus with Mikrotik Mikrotik User Meeting Bali,June 14 2008 1 Introduction Name : Nicholaus Ola Malun,S.Si Nick Name : Nico Country : Jakarta, Indonesia Bachelor degree on
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
