Oudot Laurent
|
|
|
- Julianna Hampton
- 9 years ago
- Views:
Transcription
1 WLAN and Stealth Issues Oudot Laurent
2 Agenda WLAN security & some related physical issues Problems with open services Classical solutions for TCP/IP open services Another solution for TCP/IP : Port Knocking Port knocking in real life? Thoughts about WLAN About WLAN closed mode New concept : WLAN Knocking? The WKnock project White Hat point of view / Black Hat point of view
3 WLAN security and physical issues Power : adjust AP coverage in order to radiate out toward windows but not beyond Directional antenna to control & contain the radio frequency array (prevent unauthorized access) It won t protect against internal illicit end users or temporary visitors The Wlan weapons get smaller and smaller e.g : SL-C Prism2 + Internal HDD of 4Go (!) Classical advice : track down unknown internal AP (and clients), they could have been connected to internal networks Red Teams with Wardriving stuff (not too expensive)
4 Problems with open services Let s forget WLAN and focus on open services issues Some TCP/UDP services have to be open all the time e.g: External daemon (sshd server), etc. IP addresses of remote users may change No filtering based on IP source (FW,TCP wrapper,etc) If a service is open, blackhat may : know it exists and it s open (trivial) use it for fingerprinting (OS, application) try to attack the service Patches must be applied on (+hardened) 0day may imply intrusion (containment?)
5 Solutions for TCP/IP open services In order to o limit and to control the access to open services : Authentication through VPN solutions, etc But then, VPN services remain open and blackhat may still try to : Scan (database for future attack when an exploit is released) Fingerprint (OS, Application) Example for IPSEC : IKE-SCAN Use 0day (if any...) WLAN networks thus use cryptographic solutions such as WEP, WPA, etc Some security risks remains (WEP is broken, etc)
6 Another solution : Port Knocking Port knocking solutions open services only when they have to be open (hidden services) Principle of the least priviledge The concept is quite simple : 1) Listening for secret sequence Kind of cover channel e.g : Catch a SYN to port 79, then a FIN ACK to port 81, then... 2) Secret sequence caught => open the service 3) End of session => goto 1) Is it security through obscurity? Such techniques might be used by BH to hide trojans
7 Port knocking in real life? Old school example : cd00r, FX COK, Cryptographic Port-Knocking, David Worth, Black Hat Las Vegas 2004, speakers.html#worth More implementations?
8 Thoughts about WLAN What about threats over WLAN services? Opportunistic attackers, etc Blackhats first need to discover WLAN services Wardriving, etc Identify Wlan networks by listening for Beacon, etc AP infrastructure and Ad-hoc modes send Beacon frames (default average 1/100ms) Even non used WLAN networks might be seen Okay for public hot-spots, but what about private AP? Where is the respect of the least priviledge?
9 About WLAN closed mode Some AP support a feature called closed mode, etc Beacon are still broadcasted but the SSID is hidden The AP won t send probe responses to probe requests without a correct SSID It helps at avoiding illegal clients (AP browsing, etc) Breaking the closed mode (even with WEP) Broadcast deauthentication frame with and clients will send the SSID in probe/association requests Would it be possible to avoid sending beacons? No : beacons are needed (power saving mode, etc) It would stop most clients (test with XP SP2 : blocked)
10 Closed mode example Example on a Linksys WRT54GS GPL firmware used OpenWRT [ Use eth1 for WRT54G v2, eth2 for WRT54G v1&v1.1 Default : beacon sent every 100ms root@openwrt:~# nvram get wl0_closed 0 root@openwrt:~# nvram get wl0_bcn 100 Changes : 1 beacon per minute (problems with XP, etc) root@openwrt:~# nvram set wl0_closed=1 root@openwrt:~# nvram set wl0_bcn=60000 root@openwrt:~# wlconf eth1 down root@openwrt:~# wlconf eth1 up root@openwrt:~# nvram commit closed mode off Delay between Beacons
11 Demo
12 New concept : WLAN Knocking? Knocking exists for TCP/IP services to avoid opportunistic attackers, etc Could it be possible to open a WLAN service only if it is needed? Call it WLAN Knocking, Hidden Mode, Stealth Mode...
13 Here is the concept : WLAN Knocking 1) AP listens to the traffic (Mode monitor (or auto)) 2) AP recognizes specific frames Option : AP may send specific frames too in order to exchange a WEP key, a password, etc (Diffie Hellman) 3) AP switches to open and accept sessions (master ad-hoc) Option : MAC address filtering for trusted only clients... 4) End of session => AP returns to the 1) Phase 2 bonus : this technique would allow to dynamically change some parameters for each session : WEP, ESSID...
14 Simple state machine Mode Monitor (invisible) Legal Probe Request caught No more legal client (timeout, desassociation) Mode Master (visible) Wardrivers won t see the AP This will avoid opportunistic attackers (e.g. when you re not at home) Wardrivers will see the AP Classical threats
15 Potential issues The biggest problem is to handle multiple clients At first, this solution aims at protecting one single client trying to get a hardened session with its AP It could be extended to multiple clients : Would need 2 wireless cards on the AP 1st card used for the cover channel with the clients trying to reach the service (WEP key exchange, ESSID, channel, etc) 2nd card is down (no client) by default, and comes up (monitor mode) when clients have negociated an access No more clients => ifdown [wl assoclist] Global timeout (if nobody is connected => stealth)
16 The WKnock project WKnock is a GPL based tool ([email protected]) This is a proof concept to show how Port Knocking might be used over WLAN networks Version for Linux prism54 and wireless-tools Version for Cisco Linksys WRT54GS (openwrt) Compiled for MIPS architecture Configure your network with WEP and just launch wknock : The wireless card will wait for a probe request with the real essid before accepting any session The AP will remain in stealth mode while there is no legal client
17 Inside WKnock AP goes to stealth mode (monitor) waiting for someone who would know the SSID The field used could be something else than the SSID... An official client (C) tries to reach the AP Found new probed network "Wanadoo_1337 AP goes through mode master and accept client C Every 60 seconds, AP goes through mode monitor If the client is still there : associated probe network, so that the AP come back to mode master. If there is no more client, AP jumps to mode monitor
18 WKnock : Probe Request analysis IEEE Type/Subtype: Probe Request (4) Frame Control: 0x0040 (Normal) Duration: 0 Destination address: ff:ff:ff:ff:ff:ff (Broadcast) Source address: 11:22:33:44:55:66 (11:22:33:44:55:66) BSS Id: ff:ff:ff:ff:ff:ff (Broadcast) Fragment number: 0 Sequence number: 68 IEEE wireless LAN management frame Tagged parameters (29 bytes) Tag Number: 0 (SSID parameter set) Tag length: 7 Tag interpretation: BlackHatAP... Easy to control this parameter (ESSID) Compliant with Windows XP clients
19 Demo
20 Extended ideas By using Wknock, you can ask an AP to get-up once it caught a valid Probe-Request But what if we play with special frames We can exchange private data through this kind of covert channel (WEP Key, etc) Those data may be hidden in forged WLAN packets Unused fields in valide packets, Unusable packets Proof of concept : Wknock-ng Wait for a valid ProbeRequest, use as part of the WEP key (could be cyphered, etc) Remember that this is just a proof of concept
21 Advanced state machine #1 Special request caught #2 Negociation phase ended #3 Mode Monitor (invisible) Mode Auto (weird) Mode Master (visible) No more legal client (timeout, desassociation) Wardrivers won t see the AP This will avoid opportunistic attackers Wardrivers might see weird traffic (bugs?) Negociation of keys, parameters, etc. Covert channel. Wardrivers will see the AP Classical threats are mitigated with dynamic parameters (keys for cyphering...)
22 WKnock-ng : Probe Request analysis IEEE Type/Subtype: Probe Request (4) Frame Control: 0x0040 (Normal) Duration: 0 Destination address: ff:ff:ff:ff:ff:ff (Broadcast) Source address: 11:22:33:44:55:66 (11:22:33:44:55:66) BSS Id: ff:ff:ff:ff:ff:ff (Broadcast) Fragment number: 0 Sequence number: 68 IEEE wireless LAN management frame Tagged parameters (29 bytes) Tag Number: 0 (SSID parameter set) Tag length: 7 Tag interpretation: BlackHatAP... Easy to control those parameters thanks to wireless-tools, etc (@MAC, ESSID)
23 On a client Classical WLAN tools may be used On a client Plug your PCMCIA card in (eth1) ifconfig eth1 hw ether 11:22:33:44:55:66 iwconfig eth1 essid BlackHatAP Then now, the previous probe request has been sent iwconfig eth1 enc ping On the Cisco Linksys router (Openwrt)
24 On a WKnock-ng server Here, we use a Cisco Linksys router (Openwrt) : root@openwrt:~#./wknock-ng Seeking for [mylinksys] Mode MONITOR (wl monitor 1 && iwconfig eth2 mode managed)...probe Request (mylinksys) nvram set wl0_key1= Mode MASTER (wl monitor 0 && iwconfig eth2 mode master) Session open & cyphered with the WEP key hidden in the initial Request Mode MONITOR (wl monitor 1 && iwconfig eth2 mode managed)... Session closed, no beacon sent, Wknock-ng is waiting for a new Probe Request and a new key
25 Demo
26 White Hat point of view Wardriving and opportunistic attackers limited No AP when the WLAN service is not used Time period of risks is then less than 100% of the time This respects the principle of the least priviledge AP is visible only if it s used (aireplay family attacks slowed) Very usefull for private WLAN networks Option : create a fake WLAN network for the time your real network is not up (Wireless Honeypot) "Wireless Honeypot Trickery", Oudot, SecurityFocus Feb 2004,
27 Black Hat point of view This solution might help at hiding an AP Very useful?! It could be possible to hide a rogue AP in a company somewhere on the network Corporate spy : device modified (+wlan) and installed, etc A rogue AP would only reply if a legal (?!) BH come WH would have problems to catch such a rogue AP WH (Tiger team...) might look at WLAN traffic : 100% of the time but in some limited places Network of kismet drones in fixed area, Wlan IDS, etc Sometimes (tracking rogue AP) but everywhere (audit) Indepth security and containment is needed
28 Going further Stealthiness, covert channels, WLAN, Knocking... Could we see such implementation on real business firmware in the future? This is Call For Action! Ask your support... Stealth AP mode (really better than closed network ) WLAN knocking modules with key exchange, etc Could it become a new threat in the future? Stealth Rogue AP, Opportunistic Evil Rogue AP Get-up only if needed Client trojaned by using WLAN network interface (?) : Most laptops have builtin Wlan support even if unused What about a stealth KeyLogger over WLAN?
29 Thanks for your attention, Any question? Greetz: Black Hat organizers and Rstack Team
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Wireless Honeypot Trickery by Laurent Oudot last updated February 13, 2004
Wireless Honeypot Trickery by Laurent Oudot last updated February 13, 2004 Wireless technologies have spread quickly in recent years and are now widely deployed in corporate environments as well as at
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
MITM Man in the Middle
MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Securing your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
ITRAINONLINE MMTK WIRELESS CLIENT INSTALLATION HANDOUT
ITRAINONLINE MMTK WIRELESS CLIENT INSTALLATION HANDOUT Developed by: Tomas B. Krag (Linux) Bruno Roger, ESMT (Windows) Edited by: Alberto Escudero Pascual, IT +46 Table of Contents 1.
Wireless Intrusion Detection Systems (WIDS)
Systems (WIDS) Dragan Pleskonjic CONWEX [email protected] [email protected] Motivation & idea Wireless networks are forecasted to expand rapidly (Wi-Fi IEEE 802.11a/b/g ) WLANs offer
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security
Group Number: Member Names: Date Assigned: March 23, 2004 Date Due: March 30, 2004 Last Revised: March 22, 2004 ECE 4893: Internetwork Security Lab 10: Wireless 802.11 Security Goal: The goal of this lab
Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System
Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions
Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers
WIRELESS SECURITY TOOLS
WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University [email protected], [email protected] (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University
University of Hawaii at Manoa Professor: Kazuo Sugihara
University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji ([email protected]) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Using Wireless Technology Securely
Using Wireless Technology Securely US-CERT In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Virtual Private Networks
Virtual Private Networks Jonathan Reed [email protected] MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL 660HW-D1 CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL 660HW-D1 CPE USING THE WEB INTERFACE 12/11/2008 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
WLAN Outdoor CPE For 2.4G. Quick Installation Guide
WLAN Outdoor CPE For 2.4G Quick Installation Guide Part I: External Installation Direction A. Check the parts in your box CPE SET 1 DC 12V/1.5A Power Adapter 1 PoE DC Injector 1 Hose Clamps 2 Manual &
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
NetStumbler v0.4.0 Release Notes
NetStumbler v0.4.0 Release Notes Marius Milner Thank you for your interest in NetStumbler. It is provided to you as a convenience, at no cost and without warranty. If you don't like
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. [email protected] Intranet Security Components Network Admission Control (NAC)
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Network Attacks and Defenses
Network Attacks and Defenses Tuesday, November 25, 2008 Sources: Skoudis, CounterHack; S&M Chapter 5 (including many images) CS342 Computer Security Department of Computer Science Wellesley College Networks
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
ALEXANDRE BORGES BLOG
Cracking WEP Networks Author: Alexandre Borges Date: FEB/20/2014 Revision: 1.0 ALEXANDRE BORGES BLOG When I ve published the first document about Cracking Wireless Networks (http://alexandreborgesbrazil.files.wordpress.com/2014/02/cracking_wireless.pdf)
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
RAP Installation - Updated
RAP Installation - Updated August 01, 2012 Aruba Controller Release 6.1.3.2 The Controller has several wizards that can guide you through a variety of configuration processes. On the Configuration tab
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012
WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven
Configuring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
Verizon FiOS Router MI424WR. User Manual
Verizon FiOS Router MI424WR User Manual Contents FiOS Router User Manual 1 Introduction 1.0 Introduction 1.1 Package Contents 1.2 System Requirements 1.3 Features 1.4 Getting to Know the FiOS Router 2
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection
Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection Joshua Wright, GCIH, CCNA [email protected] http://home.jwu.edu/jwright/ 11/8/2002 Abstract Wireless LAN discovery through the
INFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems IAG U/OO/814639-15 13 October
