Wireless Security, Authentication and Attacks

Size: px
Start display at page:

Download "Wireless Security, Authentication and Attacks"

Transcription

1 Wireless Security, Authentication and Attacks Sebastian Büttrich, NSRC edit: June 2013, AfNOG

2 Aspects of IT Security Confidentiality Integrity Availability Authenticity Non-repudiation

3 This talk: 3 parts 1. Security aspects & tools 2. Authentication 3. Man-in-the-Middle attacks on authentication

4 Aspects of IT Security Security is always a management process in which you evaluate risks, consequences and priorities Security management is about people, policies and communications e.g. define a Fair Use Policy and make people sign it Security is not identical to Authentication or Access control

5 Aspects of IT Security Some of the aspects of security are in conflict with one another you can not have everything! e.g. encryption of all my personal traffic might be in my personal security interest, but the security manager of the network might disagree. Or, I can make it very difficult to get access to my network, but then users will just leave and build their own (rogue) networks.

6 Wireless Security The term wireless security is most often used as synonym for keeping unwanted users out of your network & encrypting traffic This addresses to some extent (!) Confidentiality Integrity Availability However, none of these are fully secured by wireless security!

7 Wireless Security The idea of wireless security seems to be changing: In the old days, it meant: How do I keep the outsider out? Maybe, today it means: How do I keep the insider from abusing my network?

8 Wireless Security When discussing wireless security, do not assume that the wired side is so much more secure! Most threats are NOT specifically wireless! Biggest threats today probably: Phishing and account theft Windows computers, Virus/bots/trojans Uncontrolled file sharing and media usage (?) Systems not prepared for high bandwidth connectivity and many dynamic users Introduction of IPv6 (discuss!)

9 Wireless Security My personal view: A healthy way of looking at network security: The network is the streets and roads Many people and vehicles travel on these roads Streets and roads are open, or mostly open we do not lock people into their houses If we need to transport money from A to B we use a protected vehicle (= end-to-end security )

10 Methods for Wireless Hiding Hidden / Closed networks May be found by passive sniffers anyway Misleading Security by Obscurity No real security

11 Methods for Wireless key based encryption Key based encryption of wireless network (WEP/WPA) WEP is easily crackable merely symbolic safety WPA takes longer, but is crackable If anything, use WPA2 but even that is vulnerable WPA, especially WPA Enterprise/802.1x, might force you to offer a lot of user support

12 Methods for Wireless WPA WPA IEEE i draft 128 bit TKIP encryption WPA2 IEEE i-2004 AES based encryption WPA2 certification is mandatory for all devices to bear the Wi-Fi trademark (since 2006)

13 Methods for Wireless WPA modes Both WPA1 and WPA2 have 2 modes: WPA-Personal = WPA-PSK (Pre-shared key) mode No authentication server. same 256-bit key for all users. WPA-Enterprise = WPA-802.1X mode Requires RADIUS authentication server. Extensible Authentication Protocol (EAP) for authentication.

14 Methods for Wireless MAC address ACL MAC (hardware address) based ACL MAC black/whitelisting on AP or gateways Might be useful for stable user groups, registered equipment Difficult to maintain, easy to spoof and compromise (Sniff network, find an allowed MAC and spoof it) No real security

15 Methods for Wireless summary Summary of key based and ACL methods While none of those offers 100% security, appropriate combinations may give reasonable protection All of these are hard to maintain with fast changing, large usergroups All of these pose communication challenges how to hand out keys? How to keep MAC lists up-to-date?

16 Essential tools Reminder: think in layers! Working with wireless security to some extent means working with compromising tools a good protector knows how to attack Some GNU/Linux here

17 Essential tools Physical layer: Spectrum analyzers: airview, wispy Packet sniffers: kismet Netstumbler (windows) Network layer: etherape (no admin tool just quick visual overview) General networking and management tools: wireshark, ntop, mrtg, rrdtool, nmap, mtr WEP/WPA/WPA2 cracking: aircrack etc Tool collections: backtrack

18 Spectrum Analyzers Real spectrum analyzers very expensive, but USB analyzers or RF Explorer are a reasonable compromise e.g. AirView (2.4 GHz), WiSpy ( GHz) Pure physical layer! They will show you non-wifi stuff, like microwave ovens, jamming attempts, bluetooth phones, etc

19 Spectrum Analyzers: Airview

20 Spectrum Analyzers: WiSpy

21 What is kismet? Kismet is an layer2 wireless network detector, sniffer, and intrusion detection system. Works in raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff b, a, g, and n traffic. It is passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and presence of nonbeaconing networks via data traffic. Kismet is powerful - especially when combined with other tools like tcpdump/wireshark, nmap, etc

22 Start screen

23 What does kismet show? List of SSIDs Note: it also shows networks with hidden SSIDs / no beacons - just blank! If a client associates to those, you will also see the SSID.

24 What does kismet show? T = Type P Probe request - no associated connection yet A Access point - standard wireless network H Ad-hoc - point to point wireless network T Turbocell - Turbocell aka Karlnet or Lucent Router G Group - Group of wireless networks D Data - Data only network with no control packets

25 What does kismet show? W = Encryption Colour = Network/Client Type: Yellow Unencrypted Network Red Factory default settings in use! Green Secure Networks (WEP, WPA etc..) Blue SSID cloaking on / Broadcast SSID disabled

26 kismet - options (Some of the) Options: c Show clients in current network h Help i Detailed info about current network s Sort network list r Packet rate graph a Statistics p Dump packet type Q Quit

27 kismet - Network info

28 Client info

29 Kismet scan USIU

30 Kismet scan USIU

31 Kismet scan USIU

32 Kismet scan USIU

33 What is etherape? Etherape is not really a security tool, but it gives a very useful quick first view of traffic in your network. For example, in case you have a spam virus in your network, you will see this immediately. It also gives you a good feel for what various applications, such as skype or torrent clients, are doing to your network.

34 etherape screenshot

35 Case: UEW Garnet, port :)

36 What is wireshark? Wireshark, formerly known as ethereal, is a powerful packet dumping and analyzing program Extermely nice filtering for fast identification of problems, e.g. specific protocols (e.g. ARP), IP numbers, or keywords

37 wireshark screenshot

38 wireshark screenshot

39 wireshark for ARP trouble

40 Wireless Network Authentication Phil Regnauld / Sebastian Büttrich Edit: June 2013

41 Wireless Network Authentication - Various models of network authentication on wireless networks - We will cover the protocols and mechanisms, as well as the architectures and components to implement it

42 Overview What are we trying to solve Protocols & Implementation (mechs) & Layers Ways to regulate access to the network (mech) - out of scope: MAC filtering, WEP/WPA - Captive portal X (EAPoL and EAP-TLS) Architectural components - authentication server (Radius) - Access Point - Supplicant (module to authenticate) Non-tech aspects - Captive Portal vs 802.1x, Helpdesk, support issues

43 Basic Terminology - Some basic terms - EAP Extensible Authentication Protocol - PNAC Port-based Network Access Control - Supplicant a software application, installed on a user's computer, which submits credentials provided by the user, to an authenticator - Authenticator challenges, receives, processes, and replies to authentication requests from a supplicant

44 What is authentication? Definition: Authentication is the process of verifying the claim that an entity is allowed to act on behalf of a given known identity In plain speak: Is this person says who they say they claim to be? Can they prove it (password, signature)? In ours case, the entity is the software, acting on behalf of the user controlling the computer

45 Some core concepts - Important to distinguish between the following concepts: confidentiality access control authentication authorization

46 Some core concepts (2) Confidentiality - Ensure that only those who should have access to information can indeed do so (usually encryption) Authorization & access control - Authorization defines what an entity (here, a user, a device) is authorized (allowed), to access or do - Which networks (ACLs/filters) - Which systems, which files? (FS ACLs, permissions) - When can they do that (time policies)? - Can they run an application or access a service? Access control are the mechanisms by which these rights and restrictions are controlled and enforced

47 What are we trying to solve Require authentication so that We know WHO, WHERE(*), and WHEN This is NOT the same as using password-based WEP/WPA encryption - WEP/WPA keys can be shared between users - No way to identify who has connected, where, and when We want to know: - Which user? - What area of the wireless network (AP) did they associate with? - When did they log on?

48 What solutions do we have? WEP/WPA - As explained, they only provide confidentiality at the network level, they do not tell us who is connected MAC filtering - Problem: doesn't identify a person - Easily spoofed, and not a secret information IP address - Doesn't restrict physical access to the medium - Easily spoofed

49 Captive portals Captive portals - Very popular (public areas, airports, hotels, ) - Very flexible - Self-explanatory (web page), can enforce AUP (Acceptable Use Policy) validation - Easy to implement Downsides: - Not transparent - Not standardized (different looks, different credentials, ) - Requires regular re-authentication (disruptive) - Often unreliable and easy to break

50 Captive portals (2) To redirect you to a welcome page, any one of the following methods may be used: - HTTP silent redirection - HTTP 30x redirect - IP hijacking - DNS hijacking Certain URLs may be allowed - e.g Information page (think: Airport Flight info)

51 Captive portals (3) Many vendors and open source projects - CoovaChilli, CoovaAP - WiFidog - M0n0wall, pfsense - zeroshell Many general networking vendors offer some form of integrated captive portals, e.g. - Microtik - HP - Cisco - Aruba - Aptilo - Ubiquiti

52 802.1x & EAP Port-based Network Access Control (PNAC) Originally designed for wired networks (EAPoL), but design accomodated for wireless networks RFC5216 Layer 2 protocol 4 states: 1. initialization (all traffic blocked no DHCP or anything) 2. initiation (authenticator sends EAP-Requests, and client responds with EAP-Response-Identity) 3. negotiation of a method of authentication 4. authentication if negotiation succeeds Traffic is allowed through

53 802.1x & EAP (2) Advantages - transparent for Applications - inline - doesn't require interaction with upper layers like DHCP, IP, HTTP to function - standardized for both wired and wireless LANs - authentication mechanism is well known (MS-CHAP or PAP, from PPP/PPPoE) Downsides - may require new network equipment and/or firmware upgrade - may require an external authentication server

54 How does it work source: wikipedia

55 802.1x & EAP vs captive portals They are complementary: Captive portals may be preferable for networks, or parts of the network, where there are many non-regular, guest users Captive portals can guide users, provide helpdesk contact information 802.1x is more streamlined and standardized making it preferable for known, pre-configured users A combination of both may be useful x everywhere is possible, on LAN/WLAN (dedicated SSID) - Guest -style captive portal for the rest (different SSID) - Captive portal remains more intuitive for first time users if it is your policy to have guests! (may not be the case)

56 802.1x & EAP vs captive portals - 2 Function at different levels x is layer 2 - Captive Portals use layers 3 7

57 Authentication backends & components Already discussed, but as a reminder: - SQL or LDAP/Active Directory - Can be local flat text file - Radius (which can use any of the above solutions) - Backends can be shared between technologies (captive portal x)

58 NSRC recommended solution User store in LDAP/AD, often OpenLDAP RADIUS, often freeradius 802.1x and/or Captive Portal A guide (the NSRC AuthKit) is available at

59 Part 3: Remarks on Man-in-the-Middle attacks Sebastian Büttrich, IT University Copenhagen / NSRC edit: March 2013, ICTP Trieste

60 Security measures that work (to some extent) WPA2 shared or personal 802.1x = EAP over wireless EAP = Extensible Authentication Protocol RADIUS (Remote Authentication Dial In User Service) often as manager for centralized Authentication, Authorization, and Accounting (AAA) management it acts inbetween the user database and wireless Aps RADIUS protocol can talk to files, SQL, LDAP etc

61 How does RADIUS work source: wikipedia

62 The reality of 802.1x Used in many universities and institutions. e.g. ICTP User credentials typically from a user database, e.g. LDAP, Active Directory (AD) RADIUS often used for Authentication, Authorization, and Accounting (AAA) management it acts between the user database and the wireless APs

63 The reality of 802.1x Widely used e.g. in eduroam Typically used with protocols like TTLS or PEAP for the outer tunnel, MSCHAP, PAP, CHAP for inner authentication Problem: all inner authentication methods are broken and crackable see:

64 The reality of 802.1x Because the inner methods are broken, all security depends on the outer tunnel this means, for TTLS a certificate based approach What is the reality of SSL certificates? Do clients validate them? Typically no! This user/client behaviour creates a vulnerability: Man-in-the-Middle attacks

65 Man-in-the-middle attacks Advanced attack and analysis tools, e.g. Pineapple Pineapple (with Jasager software) listens to all probe requests, mimicks the SSID and associates users From there on, all your traffic is belong to me :)

66 Demonstration Wireless Access Points (* = current AP) ictp-open: Infra, 00:11:21:ED:B6:C1, Freq 2412 MHz, Rate 54 Mb/s, Strength 35 ictp-secure: Infra, 00:11:21:ED:B6:C0, Freq 2412 MHz, Rate 54 Mb/s, Strength 34 WPA WPA2 Enterprise ICTP-SDU: Infra, 00:15:6D:72:48:54, Freq 2437 MHz, Rate 54 Mb/s, Strength 37 WPA2 *MarconiLab: Infra, 00:15:6D:18:8F:F8, Freq 2452 MHz, Rate 54 Mb/s, Strength 100 WPA2 alao: Infra, 00:27:22:E6:53:2D, Freq 2412 MHz, Rate 54 Mb/s, Strength 98 Lab_Test_01: Infra, 00:27:22:E6:54:E6, Freq 2432 MHz, Rate 54 Mb/s, Strength 97 WPA2 whyme: Infra, 00:11:24:09:65:F9, Freq 2412 MHz, Rate 54 Mb/s, Strength 97 WPA2 ictp-secure: Infra, 00:15:6D:F6:14:0E, Freq 2412 MHz, Rate 54 Mb/s, Strength 100 WPA2 Enterprise Note that we have two different kinds of hardware serving the SSID ictp-secure - one of them is in fact an attacker, in this case a harmless one (Sebastian). It will offer 802.1x authentication, with its own RADIUS server (on Sebastians laptop), and if the client does not validate the certificate, it will willingly send its login to this server, where we can collect the packets, find the handshake dialogue, and crack it. (rest of this session as live demo)

67 Attack Get user to associate to rogue AP and start handshake, authentication process Packet dump everything Analyze the traffic, isolate the handshake The outer tunnel is easy as it the attacker owns certificate and keys The inner tunnel (typically MSCHAP) needs to be cracked (offline or online services)

68 Solution to the problem Unfortunately, we do not have one as long as users and software behave the way they do.

69 Questions? Comments? Sebastian Büttrich, NSRC

Implementing Security for Wireless Networks

Implementing Security for Wireless Networks Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security fs@wpi.edu Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization: Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

Wireless Tools. Training materials for wireless trainers

Wireless Tools. Training materials for wireless trainers Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights

More information

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

Wi-Fi in Healthcare:

Wi-Fi in Healthcare: Wi-Fi in Healthcare: Security Solutions for Hospital Wi-Fi Networks Wi-Fi Alliance February 2012 The following document and the information contained herein regarding Wi-Fi Alliance programs and expected

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

vwlan External RADIUS 802.1x Authentication

vwlan External RADIUS 802.1x Authentication 6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)

More information

Belnet Networking Conference 2013

Belnet Networking Conference 2013 Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda

More information

Securing Wireless LANs with LDAP

Securing Wireless LANs with LDAP A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security

More information

Wireless Security for Mobile Computers

Wireless Security for Mobile Computers A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker

More information

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]

More information

WiFi Security Assessments

WiFi Security Assessments WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Building secure wireless access point based on certificate authentication and firewall captive portal

Building secure wireless access point based on certificate authentication and firewall captive portal EPJ Web of Conferences 68, 00029 (2014) DOI: 10.1051/ epjconf/ 20146800029 C Owned by the authors, published by EDP Sciences, 2014 Building secure wireless access point based on certificate authentication

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

WIRELESS NETWORKING SECURITY

WIRELESS NETWORKING SECURITY WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

ClickShare Network Integration

ClickShare Network Integration ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

Network Monitoring. Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste

Network Monitoring. Sebastian Büttrich, sebastian@less.dk NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste Network Monitoring Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda What is network

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

Wireless LAN Security: Securing Your Access Point

Wireless LAN Security: Securing Your Access Point IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

Access Point Configuration

Access Point Configuration Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

WIRELESS NETWORK SECURITY

WIRELESS NETWORK SECURITY WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2 Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit

More information

Free Network Monitoring Software for Small Networks

Free Network Monitoring Software for Small Networks Free Network Monitoring Software for Small Networks > WHITEPAPER Introduction Networks are becoming critical components of business success - irrespective of whether you are small or BIG. When network

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

WLAN Information Security Best Practice Document

WLAN Information Security Best Practice Document WLAN Information Security Best Practice Document Produced by FUNET led working group on wireless systems and mobility (MobileFunet) (WLAN security) Author: Wenche Backman Contributors: Ville Mattila/CSC

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net 802.1x Networking tommee pickles Moloch Industries Moloch.org tommee.net Who am I Fun: Defcon Cannonball Run Work: 15 Years in the grind (MTV, Google, Nature Magazine) Whore: TV and Speaking Engagements

More information

A practical guide to Eduroam

A practical guide to Eduroam 1 A practical guide to Eduroam Rok Papež ARNES - Academic and research network of Slovenia [email protected] Akyaka,Gökova, April 2007 2 Eduroam AAI 3 Eduroam wireless network components Access Points

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum. For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Introduction. Course Description

Introduction. Course Description Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 Introduction Insecure wireless networks at

More information

The Importance of Wireless Security

The Importance of Wireless Security The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Mobility, Network Access Control and Convergence for Voice, Video and Data Applications on Corporate Wireless & Wired Networks. UCOPIA White Paper

Mobility, Network Access Control and Convergence for Voice, Video and Data Applications on Corporate Wireless & Wired Networks. UCOPIA White Paper Mobility, Network Access Control and Convergence for Voice, Video and Data Applications on Corporate Wireless & Wired Networks UCOPIA White Paper October 2008 TABLE OF CONTENT 1 Introduction... 4 2 UCOPIA

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland kamcderm@cisco.com DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Chapter 1 Network Security

Chapter 1 Network Security Chapter 1 Network Security 1.1 Network Security Router Functions Routers connect networks generally based on network addresses, usually IP network addresses. They create subnets (sub-networks) which isolate

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles WLAN Security.. from this... Security Architectures and Protocols in Wireless LANs (Section 3) 1 2 WLAN Security.. to this... How Security Breaches Occur 3 War (wide area roaming) Driving/War Chalking

More information

WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD.

WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. WLAN Access Security Technical White Paper Issue 02 Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

How To Secure A Wireless Network With A Wireless Device (Mb8000)

How To Secure A Wireless Network With A Wireless Device (Mb8000) MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com

More information

Aerohive Private PSK. solution brief

Aerohive Private PSK. solution brief Aerohive Private PSK solution brief Table of Contents Introduction... 3 Overview of Common Methods for Wi-Fi Access... 4 Wi-Fi Access using Aerohive Private PSK... 6 Private PSK Deployments Using HiveManager...

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Remote Access Security

Remote Access Security Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

WIRELESS SECURITY TOOLS

WIRELESS SECURITY TOOLS WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University [email protected], [email protected] (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

Lecture 3. WPA and 802.11i

Lecture 3. WPA and 802.11i Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server

Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced

More information

802.1X Authentication

802.1X Authentication OS X 10.7.3 and ios 5.1 May 25, 2012 Contents About 802.1X... 3 Apple Product Compatibility with 802.1X... 7 Configuring 802.1X Settings... 10 Resources... 17 Appendix A: Payload Settings for 802.1X...

More information