Chellam a Wi-Fi IDS/Firewall for Windows. SecurityTube.net



Similar documents
Please Complete Speaker Feedback Surveys. SecurityTube.net

Wireless LAN Pen-Testing. Part I

The following chart provides the breakdown of exam as to the weight of each section of the exam.

CEH Version8 Course Outline

Wireless LAN Security. Lisa Phifer Vice President Core Competence Inc.

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Wi-Fish Finder: Who will bite the bait?

Penn State Wireless 2.0 and Related Services for Network Administrators

Certified Wireless Security Professional (CWSP) Course Overview

Technical Brief. Wireless Intrusion Protection

Certified Ethical Hacker Exam Version Comparison. Version Comparison

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless Security: Secure and Public Networks Kory Kirk

MSC-131. Design and Deploy AirDefense Solutions Exam.

[CEH]: Ethical Hacking and Countermeasures

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Network Attacks and Defenses

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

New Avatars of Honeypot Attacks on WiFi Networks

CYBERTRON NETWORK SOLUTIONS

ipad in Business Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

iphone in Business Security Overview

EC Council Certified Ethical Hacker V8

Basic processes in IEEE networks

WiFi Security Assessments

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Penetration Testing for iphone Applications Part 1

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless Network Risks and Controls

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Who s Endian?

Security in IEEE WLANs

Deploying iphone and ipad Security Overview

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Hole196 Vulnerability in WPA2

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

BlackBerry Business Cloud Services. Policy Reference Guide

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

CABLING REQUIREMENTS:

MITM Man in the Middle

Security Awareness. Wireless Network Security

Virtual Private Networks

Wireless Technology Seminar

Wifi Web Server Module w TF Socket User s Guide

End User Devices Security Guidance: Apple OS X 10.10

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

Chapter 11 Cloud Application Development

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

BYOD: BRING YOUR OWN DEVICE.

802.11b and associated network security risks for the home user

Zscaler Internet Security Frequently Asked Questions

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Distributed Network Monitoring. netbeez.net Booth #2344

Enterprise A Closer Look at Wireless Intrusion Detection:

Network Attacks. Common Network Attacks and Exploits

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

FSP-201: Ethical Hacking & IT Security

Wireless Tools. Training materials for wireless trainers

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Vocera WLAN Requirements and Best Practices. B3000n Compatible

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Networking for Caribbean Development

Architecting User Identification (User-ID) Deployments

Policy and Profile Reference Guide

Network Interface Table of Contents

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

Vocera Infrastructure Planning Summary. B3000n Compatible

Securing Cisco Network Devices (SND)

QuickSpecs. Models. Features and Benefits Mobility. ProCurve Wireless Edge Services zl Module. ProCurve Wireless Edge Services zl Module Overview

Application Note Secure Enterprise Guest Access August 2004

Ralink Utility User Guide/PC/MAC

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

The State of Application Delivery in 2015

Deploy Remote Desktop Gateway on the AWS Cloud

Introduction. Course Description

Wireless Router Quick Start Guide Rev. 1.0a Model: WR300NQ

Detecting rogue systems

Access Point Configuration

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

White Paper Tropos Mesh OS: Foundation of the Tropos mesh network architecture

Link Layer and Network Layer Security for Wireless Networks

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Jort Kollerie SonicWALL

Simple security is better security Or: How complexity became the biggest security threat

Network Administrator s Guide

A Guide to New Features in Propalms OneGate 4.0

Transcription:

Chellam a Wi-Fi IDS/Firewall for Windows

Vivek Ramachandran B.Tech, ECE IIT Guwahati 802.1x, Cat65k Cisco Systems WEP Cloaking Defcon 19 Caffe Latte Attack Toorcon 9 Media Coverage CBS5, BBC Microsoft Security Shootout Trainer, 2011 Wi-Fi Malware, 2011

SecurityTube and Pentester Academy

Motivation Attack! Attack! Attack! Defense? Important problem? Solution viable?

Enterprise Premise Focused Enterprise

Roaming Clients? State of current solutions Lockdown Wi-Fi, Bluetooth etc. Policy based on SSID Not BYOD ready No Attack detection Heterogeneous Devices Varied Operating Systems Non standard Wi-Fi API No low level support e.g. ios

What about the rest of us? World beyond Enterprise Millions of Personal Devices Every Internet capable device Internet Of Things (IoT)

Wi-Fi Client Attack Surface Honeypots AP-less WEP/WPA/WPA2 Cracking Evil Twins Mis-Associations Hosted Network Backdoors

Typical Attack SSID1 SSID1 SSID2 SSID3 SSID2 SSID3

AP-less Cracking No Encryption WEP Caffe Latte Hirte WPA/WPA2 PSK WPA/WPA2 PEAP, EAP-TTLS AP-less Cracking Cloud Cracking Handshake, MS-CHAPv2 CR

Where are you SAFE? Nowhere!!!

Hijack Wi-Fi == Hijack Layer 2 Traffic Monitoring DNS Hijacking SSL MITM Application Attacks

Defining the Scope Windows Endpoints No custom hardware or drivers Detect Honeypot creation Tools Firewall like Rule Creation Allow, Deny Monitoring Wi-Fi state machine Detect Wi-Fi backdoors

Architecture Block Diagram Application GUI Presentation Layer Interface Analysis Engine Rule Matching Engine Data Storage Event Data BSS Information Data Collection Engine Profile XML Data Hardware State Data State Machine Scan Data Wi-Fi Native API Network Profiles Card Control

Wi-Fi Native API State Machine Scan Data Wi-Fi Native API Network Profiles Card Control State Machine 802.11 state machine per Wi-Fi card Scan Data Periodic Scan Results with BSS data Network Profiles XML network profile data Card Control Scan, Connect, Disconnect, Lock etc.

Technicalities https://msdn.microsoft.com/en-us/library/windows/desktop/ms706839(v=vs.85).aspx

Demo Data Sources

Data Collection and Storage Data Storage Event Data BSS Information Data Collection Engine Profile XML Data Hardware State Data Stored in SQLITE databases Makes it easy to write plugins 3 rd party tools can use the database

Demo SQLITE DB Data

Rule Matching and Analysis Analysis Engine Rule Matching Engine Data Storage Rules can be written to include: BSSID Neighboring Networks Channel use patterns and frequencies Information Elements in the Beacon / Probe Response Access pattern based on time of day

Demo Monitoring and Event Detection

Understanding Attack Detection N1 N2 Internet SSID N3 N4

Fingerprinting the Network SSID BSSID(s) BSS type PHY type Beacon Interval Channel(s) & Hopping Rates basic and extended Capability Information Information Element(s) Neighboring Access Points AP details as above 802.11 (pre connect) IP, Gateway DNS, ARP cache Subnet scan OS and service scan IP & Above (post connect)

Typical Attack Mitigation SSID1 SSID1 SSID3 SSID2 BSSID(s) Channel(s) & Hopping Rates basic and extended Capability Information Information Element(s) Neighboring Access Points AP details as above SSID2 SSID3

Demo Attack Tool Detection (Airbase)

Why is this important? Attack tools will have to significantly improve Make it difficult to fingerprint No hardcoded values, random BSSID etc. More features to mimic authorized networks Ability to clone network beacons / probe responses Ability to closely follow Clocks (timestamp) Have to be on the right channel and band Very difficult to beat Whitelist approach

Roadmap - Enhancements Whitelist vs Blacklist Plugin Architecture SQL with Python Intrusion Prevention / Firewall with custom Driver Assisted and automatic learning of whitelists Downloadable blacklists for attack tools

Questions?