Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter



Similar documents
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wireless LANs vs. Wireless WANs

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

802.11b and associated network security risks for the home user

Go Wireless. Open up new possibilities for work and play

Wireless (Select Models Only) User Guide

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless Network Standard and Guidelines

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Running Head: WIRELESS NETWORKING FOR SMALL BUSINESSES. Wireless Networking for Small Businesses. Russell Morgan. East Carolina University

How To Protect A Wireless Lan From A Rogue Access Point

Security Awareness. Wireless Network Security

The next generation of knowledge and expertise Wireless Security Basics

Designing, Securing and Monitoring a/b/g/n Wireless Networks

WLAN and IEEE Security

Security in Wireless Local Area Network

Technical Brief. Wireless Intrusion Protection

Best Practices for Outdoor Wireless Security

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Wireless Networks. Welcome to Wireless

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Wireless (Select Models Only) User Guide

Link Layer and Network Layer Security for Wireless Networks

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Introduction. Course Description

Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Industrial Communication. Securing Industrial Wireless

Network Security Best Practices

Best Practices for Deploying Wireless LANs

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Wireless (In)Security Trends in the Enterprise

Using Wireless Technology Securely

Topics in Network Security

Wireless LAN Security

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

How To Manage An Wireless Network At A University

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

Wireless Network Policy

The Top Seven Security Problems of Wireless

CISCO WIRELESS CONTROL SYSTEM (WCS)

Catapult PCI Compliance

Introduction Chapter 1. Uses of Computer Networks

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Wireless Auditing on a Budget

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Security and Privacy Issues of Wireless Technologies

Cisco Wireless Control System (WCS)

Chapter 2 Configuring Your Wireless Network and Security Settings

Virtual Access Points

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Best Practices for Securing Your Enterprise Wireless Network

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Network Access Security. Lesson 10

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Security Requirements for Wireless Local Area Networks

WIRELESS NETWORKING SECURITY

Ensuring HIPAA Compliance in Healthcare

LTE, WLAN, BLUETOOTHB

Wireless g CF Card User Manual

Wireless Network Security

Mobile Office Security Requirements for the Mobile Office

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Closing Wireless Loopholes for PCI Compliance and Security

HANDBOOK 8 NETWORK SECURITY Version 1.0

Security in IEEE WLANs

Testing a Wireless LAN

Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses

How To Secure Wireless Networks

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Particularities of security design for wireless networks in small and medium business (SMB)

Transcription:

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What do we do? Security Consultants specialising in vulnerability assessment and Penetration Testing. Active Security Researchers. Contributors to various open source security projects.

Outline Overview of Wireless Technologies. Risks inherent to Wireless connectivity. Demonstration of wireless security flaws using freely available tools. Implementing Wireless Security. Summary. Questions.

What do you mean Wireless? Wireless devices use Radio Frequency (RF) technology to facilitate communication. Various types of wireless communication solutions use different frequencies, most regulated by governments. 802.11 and Bluetooth operate in the 2.4Ghz unregulated band.

Common wireless usage scenarios. Wide Area Networks (WANs) using GPRS, GSM etc. Local Area Networking (LANs) using 802.11b (aka Wi-Fi). Personal Area Networking (PANs) using Bluetooth.

802.11 (aka Wi-Fi) Wireless LAN What is it? Medium range. Around 150-200ft, in most cases. Can be extended using directional antenna, repeaters etc. 802.11b is most widely used standard today. Benefits Removes need for cabling infrastructure. Rapid deployment. How does it work? Clients associate to Access Points (AP s) Infrastructure Mode. Clients form peer-to-peer network - Ad-Hoc Mode.

802.11 Wireless Local Area Network (LAN) 802.11 Access Point Ethernet Hub 802.11 Access Point Desktop PC Laptop PDA IP Telephone

Bluetooth Personal Area Network (PAN) Short range (around 10m or 30 feet). Short range cable replacement technology, used to transmit both voice and data: Syncing PDA s. Wireless Mobile Phone Headsets. Audi Car Phone. Phillips Fridge(!) Gadget-oriented.

Bluetooth Personal Area Network (PAN) Desktop PC Laptop Mobile PDA Printer

Where is wireless used today? Retail - Handheld stocktaking devices in supermarkets and warehouses. Medical Doctors use PDA s to access patient records whilst on ward. Hospitality Hotels / Coffee Shops / Airports increasingly providing 802.11b broadband internet access. Corporate IT Infrastructure. Allows employees to access network resources from anywhere in the building (e.g. meeting rooms). Allows employees to synchronise PDA s.

Wireless usage is increasing Cost of hardware dropping quickly. Connectivity available in airports, coffee shops etc. Frequency of wireless security assessments for clients has increased. Bluetooth / 802.11b networking included as standard with many new products Phones Laptops

Generic Wireless Security Problems Over-the-air communications inherently insecure. Physical access to networks / devices not required. Facilitates anonymous attacks. Devices authenticated rather than users. Risk of stolen devices. All of the usual threats / risks apply: Confidentiality. Integrity. Availability.

802.11b Security Problems WarDriving. Extensively reported in media. Easy to discover 802.11 access points. Default configuration of AP s. Rogue Access Points. New technology. Common misconceptions about security. Cheap hardware, free software. Anonymous.

802.11b Security Problems Warchalking (www.warchalking.org)

802.11b Security Problems Leeds, UK. Managed to find several open nodes in Leeds, and I've only really driven within 2 miles of my house...the Innovation Centre has a nice phat pipe, open to the world, and a lovely garden in which to sit whilst using it :) There are 2 networks near "Joseph's Well" but the signal is very weak from the road (I suspect at least one of these is an NHS node)... I'll be chalking them all tonight!"

Does 802.11b have no security? WEP ( Wired Equivalent Privacy ) Allows encryption of data portion of packets. Vulnerable to attack Passive attacks, based on statistical analysis. Depending on size of network, can break rather quickly. Tools exist to perform the attack. (airsnort, wepcrack) No key management / distribution facilities. Authentication via shared key. Shared keys quickly compromised.

Does 802.11b have no security? Other security solutions are often proprietary and specific to particular vendors. (e.g. Cisco LEAP) Not compliant with Wi-Fi standard. Other solutions: Use VPN / SLAN technology as well. IPSec 802.1x / RADIUS Supported in WinXP / Internet Authentication Server (IAS)

Demonstration Netstumbler Netstumbler Supports most Wi-Fi cards. Identifies presence of Wi-Fi networks and can identify client probes. GPS enabled. Shows signal strength.

Sniffing Wireless Networks Snooping on network traffic Topology. Technologies in use. Confidential information. Various Commercial and free tools. AiroPeek Kismet

Kismet Demonstration Kismet Free tool, available for Linux. Allows sniffing of 802.11 network traffic.

More 802.11 weaknesses MITM attacks possible (airjack) IPSec SSH Base Station Cloning Default WEP Keys Jamming (Denial of Service) Unregulated band, interference can be unintentional (Microwaves, Bluetooth, Baby minders etc) Ad-Hoc Mode 802.11b Networking Exposes client devices. Another potential route into the network.

Wireless Enabled PDA s and Security Insecure configuration of wireless-enabled PDA s. Another potential risk to corporate security. May contain sensitive business information HP / Compaq IPAQ Bluetooth / Wi-Fi enabled PocketPC. Possible threat from malicious code in future. Post-XMAS increase in system support calls.

Implementing Wireless Security Well designed architecture Physical placement of AP s. Outside firewall. Use additional layers of security (e.g. VPN). Define clear PSPG for wireless use within org. Educate staff. Regular security assessments. Consider wireless IDS systems (AirDefence). Upcoming improvements to wireless security.

Where to next? Future wireless standards are looking to address the security problems. WiFi Protected Access (WPA) interim solution. Subset of upcoming 802.11i standard. Improves authentication and integrity mechanisms. A replacement for WEP. Backward and forward compatible. Two modes of operation (Enterprise or Home). Another botched bolt-on fix? 802.11i provides key management, stronger authentication and a variety of other improvements.

Summary Immature technologies. Incredibly useful, with many obvious benefits. Will become ubiquitous within a few years despite security concerns. Should not be considered suitable for carrying security sensitive information at the moment. Future standards attempt to address security how well they do this remains to be seen.