Secure Open Wireless Networking. Backup Talk for Blackhat USA 2011 Christopher Byrd, Tom Cross, & Takehiro Takahashi
|
|
|
- Gordon Blair
- 10 years ago
- Views:
Transcription
1 Secure Open Wireless Networking Backup Talk for Blackhat USA 2011 Christopher Byrd, Tom Cross, & Takehiro Takahashi
2 Elevator Pitch Free Internet is good! We love open wireless Unencrypted Internet is bad. We don t want to be spied on while we surf the web networks are either access controlled, or unencrypted. :-/ We can solve this problem by encrypting our wireless access using a digital certificate that is uniquely tied to the SSID of the access point. This is similar to the way that HTTPS works, but uses SSIDs instead of Domain names to identify the network provider. This talk will explain how this works and what the advantages of this approach are. We re releasing code for this under the GPL. Please play with it.
3 Two Paths, One Solution Christopher released paper on Open Secure Wireless Tom and Takehiroreleased paper on Secure Open Wireless Networking Both were developed in parallel independently Both have same fundamental approach, differ in some details We are working together to make this a reality
4 Wireless Networking today is a Hobson s choice require auth or don t encrypt. 4
5 5 But, we can establish encrypted connections to websites without a password
6 Why not do the same thing with wireless networks? 6
7 Advantages Your traffic is encrypted from your laptop to the access point. You don t have to have a login, password, or other previously established access credential. You know what organization is running the network you ve connected to. Only IBM could obtain a digital certificate for wireless.ibm.com.
8 The three main objections we ve heard: 1. We don t need this HTTPS solves all of the problems with insecure wireless networking. 2. HTTPS doesn t work, so why would this work? People are too stupid to tell the difference between secure and insecure networks. They ll click on anything! 3. You haven t done enough science.
9 Addressing the Objections: 1.We don t need this HTTPS solves all of the problems with insecure wireless networking.
10 Over the years there have been many demonstrations of the security risks associated with unencryptedwireless.
11 The Wall of Sheep (Since 2001)
12 SideJacking(2007)
13 FireSheep(2010)
14 SSL Adoption Demonstrations have prompted major websites to adopt HTTPS to a certain extent. Some have only adopted SSL for logins rather than allowing full SSL sessions. If site doesn t go all in with HTTPS only and HSTS, then MitM is always an option Adoption of HTTPS is helpful, but It will never be adopted by every site. Gaps in some HTTPS implementations have exposed cookies. (i.e. XMLHttpRequest) Side-channel leaks such as AJAX SSL packet size information disclosure Its not sufficient to solve all of the problems associated with insecure wireless. Encryption of various IP protocols presents a variety of different ease of use and architectural challenges.
15 The AOL Search Data In August, 2006 AOL released 3 months of search keywords for over 650,000 users. Some real people were identified based entirely upon their search histories within this dataset. Several search histories included personal information such as social security numbers, credit card numbers, full names, addresses, and dates of birth.
16 Privacy Concerns Have you ever performed a web search of a personal nature? At a hotel? Do we expect every site to adopt HTTPS? The fact is that this is not happening. Even if every site adopts HTTPS, you re still broadcasting a list of every site you are visiting to everyone within range of your transmitter. Wired networks may be going away. The latest Apple MacBookAir does not have a built in Ethernet port. These privacy concerns alone ought to be enough to prompt the adoption of a more secure solution.
17 Rogue Access Points The WiFi Pineapple Responds positively to Probe Request frames and provides an attacker controlled connection to the victim. Of course all of the Internet traffic flowing through the pineapple such as , instant messages, and browser sessions are easily viewed or even modified by the pineapple holder. Available for $99 at HakShop.com
18 Airjack Monkey-Jack Advanced Attack Techniques Blackhat2002 -Mike Lynn & Robert Baird Attacker spoofs Deauthenticateframe to disassociate victim from legitimate AP Attacker assumes legitimate AP s MAC and SSID on a different wireless channel Victim finds attacker s AP while scanning channels for the legitimate AP and connects to the attacker instead Attacker connects to the legitimate AP and bridges the two connections
19 Upside-down-ternet
20 SSL Strip New Tricks for defeating SSL in Practice -Moxie Marlinspike BlackhatFederal 2009 Proxy that changes HTTPS links into HTTP links on the fly in network traffic (and does some other stuff you d want to have along with that). Users often don t notice that encryption should be in use.
21 Active Man-in-the-Middle Attacks Presented at OWASP AU by IBM Rational Researchers Roi Saltzman and Adi Sharabani Presents a set of HTTP layer attacks that can be performed by a rogue access point that can force a victim to fetch files through injected iframes. One interesting suggestion is poisoning the HTTP cache with Javascriptthat will later be loaded in a secure context, such as an Intranet website.
22 Attacking the Client Host An active man-in-the-middle attack can inject malformed content that exploits remote code execution vulnerabilities in the victim s client software. This allows targeted client exploitation at the bar or coffee shop across the street from a business. at the airport where people who work for many companies travel. Victims could be identified based on their homepage choices or the destinations of their VPN connections. Business travel locations are crawling with high value targets.
23 Malicious Captive Gateways Open Wireless networks often charge their users for access by collecting credit card numbers. Fortunately, these captive gateways often use SSL. Unfortunately, when you connect to a network you have no idea what gateway address you are going to be sent to.
24 Malicious Captive Gateways In practice, we ve found that the URLs used by captive portals are often unrelated to the SSIDs of the network or the name of the network provider. This can make it hard for users to know what to trust. The opportunity for attackers to set up their own SSL encrypted credit card collection site is certainly there.
25 Theft of Service Its trivial for an attacker to spoof the MAC address of an authorized user of an unencrypted wireless network after the user has authenticated to a captive gateway. Encryption is required to address this problem.
26 Addressing the Objections: 2. HTTPS doesn t work, so why would this work? People are too stupid to tell the difference between secure and insecure networks. They ll click on anything!
27 The problem with HTTPS Most web surfing involves insecure websites unencrypted connections are the normal situation as you surf the web. If a warning message popped up every time you accessed a normal website, the web would be very annoying. Indicators that encryption is in use can be subtle.
28 HTTPS demands a lot from users. As they surf the web, users should: KNOW the difference between HTTP and HTTPS. Constantly BE AWARE, while they surf, of when HTTPS is needed. LOOK for the subtle signs that HTTPS is enabled. INTERPRET those signs correctly.
29 Secure Open Wireless is different. Users are only required to make a security choice once, while initially connecting to the network, and not constantly while they surf the web. Unencrypted connections can always result in a clear warning message without breaking up the user s workflow. Encrypted connections can become the normal case. The SSID of the network that users are connecting to is protected and clear to the user. This is different from HTTPS, where misleading hyperlinks and graphics can distract the user from the actual URL of the host they are communicating with.
30 Its worth asking advocates of this point of view why people continue to adopt HTTPS and why they continue to spend money on SSL certificates.
31 Branding will be important. Today, anyone can run an access point with any SSID. Anyone can run a network called IBM Wireless or AT&T Wireless and there is no way that even a sophisticated user can tell if that network is really run by IBM or AT&T. Secure Open Wireless creates a mechanism whereby a particular SSID can be owned by a particular network provider and no one else can use it. This allows users to know who they are communicating with. Only IBM will able to run a network called IBM Wireless. Only AT&T will able to run a network called AT&T Wireless. Network Operators want an SSID that people will trust. Generic sounding names don t convey the unique identity of the network operator. We ll have to teach users to avoid using networks with names that they don t know or trust.
32 Branding will be important. Network Operators will need to monitor to detect the registration of potentially misleading SSIDs. IBM Wire less A central database of names used for secure wireless will be needed to prevent duplicates and monitor for attacks. Trademark claims could be a useful tool here as this is all about preventing user confusion.
33 Addressing the Objections: 3. You haven t done enough science.
34 Will users make the right choices? Will most users avoid networks with generic sounding names and disconnect when they see unexpected warning messages? There might be an academic paper in security usability for someone who had the time to perform a controlled study on people s reactions in different contexts to the user interface ideas presented here.
35 Is that really the right question?
36 Random, Feckless Users Lets assume that all users are completely unable to choose between a secure and insecure network, regardless of the interface queues and warning messages placed in front of them. When presented with a choice between a secure network and an insecure network, the totally random user will choose the secure network half the time and the insecure network half the time.
37 The situation today is that all open wireless networks are unencrypted, and that all traffic on these networks is subject to attack by passive sniffers. Connections that employ HTTPS are (usually) immune but as previously established in this presentation, a lot of important traffic is still in the clear and still susceptible to attack.
38 Adoption of Secure Open Wireless Access would eliminate the threat of passive sniffers almost completely, without requiring every website on the Internet to adopt HTTPS. This raises the bar for attackers they must setup a rogue access point and cannot merely download a sniffer.
39 When attackers do set up rogue access points, they are going to be operating them in competition with secure access points. When faced with two choices, our random feckless users will pick the secure access points half the time.
40 We have, therefore, significantly reduced the attack surface area. The threat of passive sniffers is eliminated and rogue access points are less effective than they would otherwise be.
41 This progress is valuable Secure Open Wireless Access moves the problem of wireless security from being a technical problem to being a social problem. As Secure Open Wireless gains popularity, user familiarity will increase naturally. User actions can be improved through: Training and awareness Context If I m at a Hilton hotel should I pick the Hilton wireless access point or the CoolFreeWireless access point? We could choose to limit the availability of certificates to highly vetted network operators rather than allowing anyone to purchase them. The effect of this would be to make the interface differences between secure and rogue networks even more stark.
42 Alternative Approaches?
43 What about VPNs? Some services allow users of suspect access points to encrypt their traffic to a trusted destination on the Internet. This is inefficient and therefore expensive. It has to be set up beforehand. Not for occasional travelers Besides, what happens if the attacker just DoSes the VPN connection?
44 Guest accounts? George Ou PEAP with guest account Chester Wisniewski WPA/WPA2-PSK with the password Free Wifi Wisniewski s approach can be decrypted because everyone knows the key and the session key derivation is in the clear. In PEAP the session key derivation occurs within a TLS tunnel. Neither solution protects against rogue access points.
45 How does SOWN work? WPA/WPA2 AES/TKIP encryption EAP-TLS anonymous authentication A flavor of Extensible Authentication Protocol (EAP) One-way TLS negotiation only requires server certificate to complete 802.1x authentication 45
46 RFC5216 The certificate_request message is included when the server desires the peer to authenticate itselfviapublickey.whiletheeap server SHOULD require peer authentication, this is not mandatory, since there are circumstances in which peer authentication will not be needed (e.g., emergency services, as described in[unauth]), or where the peer will authenticate via some other means. If the server omits the certificate_request, the client can omit the certificate and certificate_verify in the EAP- Response.
47 47 How does SOWN work?
48 Certificate Authorities Exclusive SSID 48 CAs register SSIDs using a global database Different CAs need to avoid issuing the same cert Everyone needs to monitor for misleading names DNS? We already have the certificate infrastructure It may be desirable to differentiate these from SSL Certs» AFAWK, X.509 doesn t currently offer a suitable field Although supports dots in SSIDs, many APs do not If you want nicer SSIDs you ll need a new DB Whois? More complicated verification process
49 Certificate Revocation Online Certificate Status Protocol Allows a client to query a CA about the status of a certificate But we re not online OSCP Stapling Allows a server to cache the CA s timestamped OCSP response and send it to the client Could be transmitted during EAP-TLS conversation
50 SSH style solution for uncertified APs
51 Changes to Users need to be able to differentiate networks that support SOWN from other kinds of secure WiFi networks We suggest using the RSN Capabilities Field Current SSIDs are not long enough to accommodate domain names We propose a new field called extendedssid u may provide some of these capabilities in a different way
52 Frames Frame Header Frame Control Field in Frame Header Information Element
53 The RSN Capabilities Field RSN Information Element RSN Capabilities Field Format New RSN capability bit fields to indicate support for 1. Anonymous 802.1X Authentication (EAP-TLS) 2. Certificate validation against network s SSID
54 The XSSID Elem. ID Length XSSID The XSSID Information element allows SSIDs to be as long as a domain name.
55 Implementation Takbuilt a prototype by extending the following modules on Ubuntu Linux FreeRADIUS(RADIUS server supporting 802.1x) wpa-supplicant (WPA supplicant) wicd(gui + Policy management tool) 55
56 FreeRADIUS A very small change made to FreeRADIUSto support anonymous EAP-TLS Modified rlm_eap_tls.cto use the SSL_VERIFY_NONE flag for the OpenSSL function "SSL_CTX_set_verify". This flag prevents the server from sending a certificate_request message to the client. 56
57 Hostapd Christopher s implementation used Hostapd instead of FreeRadiusD Simple onebitchange to hostapd int eap_server_tls_ssl_init(struct eap_sm*sm, struct eap_ssl_data*data, int verify_peer) src/eap_server/eap_tls.c 68c68 < if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) { --- > if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) {
58 Supplicant Support Windows, Linux supplicants think they need a client certificate Just a basic IF statement before connection starts... wpa_supplicant-0.6.9/src/eap_peer/eap_tls.c if (config== NULL ((sm->init_phase2? config->private_key2 : config->private_key) == NULL && (sm->init_phase2? config->engine2 : config->engine) == 0)) { wpa_printf(msg_info, "EAP-TLS: Private key not configured"); return NULL; }
59 Supplicant Support Configuring supplicants with ANY certificate satisfies this requirement It doesn't have to be a valid cert They'll never be asked for it anyway Changing wpa_supplicantto remove the if statement removes the cert requirement
60 wpa-supplicant We registered a callback function for certificate verification in wpa-supplicant s EAP-TLS component. Verifies that the SSID of the access point matches the Common Name in the digital certificate. 60
61 Implementation -future work extension (Extendid SSID (XSSID) and RSN) FreeRADIUS policy management for Secure Open Wireless Access Better GUI A lock icon next to ISS-Wireless represents Secure Open Wireless Access 61
62 Code Release FreeRADIUS, wpa-supplicant, and wcidare all released under the GPLv2. We will release the changes we made to this code under the GPLv2. Should be available soon at Please download and experiment with it.
63 The result: A smarter wireless Internet 63
64 Contact us Christopher Byrd: Tom Cross: Takehiro Takahashi: 64
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
The Evil Twin problem with WPA2-Enterprise. Ludwig Nussel <[email protected]> SUSE Linux Products GmbH
The Evil Twin problem with WPA2-Enterprise Ludwig Nussel SUSE Linux Products GmbH Version 1.1 April 19, 2010 Contents 1 Introduction 1 2 WPA2 Enterprise 2 2.1 Overview..............................
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Securing your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
Certified Wireless Security Professional (CWSP) Course Overview
Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.
Airnet-Student Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student has two key advantages over the current Airnet
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
Belnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Remote ESL Email On A Mac With OS-X Using SSH Tunneling & Port Forwarding
Remote ESL Email On A Mac With OS-X Using SSH Tunneling & Port Forwarding Excerpted from: http://adrianhoe.com/2006/10/22/secure-wireless-email-on-mac-os-x Wireless hotspots have blossomed in recent years
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
by Daan Stakenburg and Jason Crampton ISTOCKPHOTO/THINKSTOCK
Underexposed risks of public Wi-Fi hotspots This thesis outlines the consideration that should be given by Wi-Fi hotspot users to the significant and as yet unresolved security risk such use presents.
IT user guide. Campus WiFi eduroam. September 2015. www.kent.ac.uk/itservices Information Services
IT user guide Campus WiFi eduroam September 2015 www.kent.ac.uk/itservices Information Services Before you get online Hello eduroam! You can pick up the University WiFi service eduroam in all indoor spaces
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Michael Coates [email protected] michael-coates.blogspot.com
Michael Coates [email protected] michael-coates.blogspot.com Who am I? Web Security Engineer @ Mozilla Contributor OWASP 2010 Top 10 Author OWASP TLS Cheat Sheet Creator & Leader OWASP AppSensor Security
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
MSC-131. Design and Deploy AirDefense Solutions Exam. http://www.examskey.com/msc-131.html
Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO http://www.examskey.com/msc-131.html Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product.
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Hole196 Vulnerability in WPA2
Hole196 Vulnerability in WPA2 1 Hole196 Vulnerability in WPA2 Presenters: Anthony Paladino, Managing Director, Systems Engineering Dr. Kaustubh Phanse, Principal Wireless Architect Md. Sohail Ahmad, Senior
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
How to Connect to UAB s Wireless Networks
How to Connect to UAB s Wireless Networks Sections: Page: Checking Windows XP for Service Pack 3 3 Configuring Windows XP SP3 to Connect to uabwifi-nac: Part I 5 Configuring Windows Vista to Connect to
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
Setting up a WiFi Network (WLAN)
Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
Securing your Linksys Wireless Router BEFW11S4 Abstract
Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
1 Introduction. 2 Cafe Crack. 1.1 Rogue AP Attack. 1.2 Airsnarf. 1.3 Detecting Rogue APs. References Acronyms
1 of 13 12/19/2007 5:10 PM Cafe Cracks: Attacks on Unsecured Wireless Networks Paul Moceri ([email protected]) and Troy Ruths ([email protected]) Abstract Mobile users demand high connectivity in
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Implementing Security for Wireless Networks
Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:
Viking VPN Guide Linux/UNIX
Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information
