All You Wanted to Know About WiFi Rogue Access Points



Similar documents
Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

PCI Wireless Compliance with AirTight WIPS

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Ensuring HIPAA Compliance in Healthcare

Security Awareness. Wireless Network Security

Closing Wireless Loopholes for PCI Compliance and Security

Air Marshal. White Paper

Wireless (In)Security Trends in the Enterprise

Hole196 Vulnerability in WPA2

Ensuring HIPAA Compliance in Healthcare

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Secure Wireless Networks

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Design and Implementation Guide. Apple iphone Compatibility

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

9 Simple steps to secure your Wi-Fi Network.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Securing Cisco Network Devices (SND)

Enterprise A Closer Look at Wireless Intrusion Detection:

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Technical Brief. Wireless Intrusion Protection

8 Steps for Network Security Protection

8 Steps For Network Security Protection

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless Encryption Protection

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Best Practices for Securing Your Enterprise Wireless Network

Network Access Control (NAC)

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Recommended IP Telephony Architecture

Figure 1. The Motorola SB4200 cable modem

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Link Layer and Network Layer Security for Wireless Networks

Recommended Wireless Local Area Network Architecture

CISCO WIRELESS CONTROL SYSTEM (WCS)

Wireless Security Strategies for ac and the Internet of Things

How To Protect A Wireless Lan From A Rogue Access Point

Cisco Wireless Control System (WCS)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

VLANs. Application Note

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

APPENDIX 3 LOT 3: WIRELESS NETWORK

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

Observer Analyzer Provides In-Depth Management

Perspective on secure network for control systems in SPring-8

Securing end devices

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The Trivial Cisco IP Phones Compromise

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Wireless Intrusion Detection Systems (WIDS)

Link Layer and Network Layer Security for Wireless Networks

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Lab Organizing CCENT Objectives by OSI Layer

Secure Networks for Process Control

Bypassing Network Access Control Systems

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

CTS2134 Introduction to Networking. Module Network Security

Objectives. Security+ Guide to Network Security Fundamentals, Third Edition. Network Vulnerabilities. Media-Based Vulnerabilities

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Don t Let Wireless Detour Your PCI Compliance

MITM Man in the Middle

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Cisco Unified Wireless Network Solution Positioning for the New PCI DSS Wireless Guideline

How To Secure Your Store Data With Fortinet

Gigabit Multi-Homing VPN Security Router

Wireless Controller DWC-1000

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Wireless Security for Mobile Computers

Developing Network Security Strategies

CONNECTING THE RASPBERRY PI TO A NETWORK

Microsoft Windows Server System White Paper

WIRELESS SECURITY TOOLS

DSL-2600U. User Manual V 1.0

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Transcription:

All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com

What is Rogue AP Unmanaged (unauthorized) AP attached to enterprise wired network

How does Rogue AP pop up on enterprise network Malicious intent or simply unwitting, impatient employee Commoditization of WiFi APs raises the risk of someone putting up personal AP on the enterprise network Wall Jack AP Pocket AP Wireless Router PCMCIA and USB APs It has been estimated that almost 20% of corporations have Rogue APs in their networks at some time

Why is Rogue AP such a bad thing Rogue AP on network = (logically) LAN jack of your network hanging out of the premises RF signal spillage of Rogue AP provides access to wired enterprise network from outside of the premises

What are some specific attacks which can be launched through Rogue AP Attacks on wired network infrastructure ARP poisoning, DHCP attacks, STP attacks, DoS attacks etc. Mapping the network for targeted attacks Scanning hosts on network for targeted attacks MIM (Man-In-Middle) and data sniffing on wired network See this blog article for details on attacks through Rogue AP http://blog.airtightnetworks.com/wifi-rogue-ap-5-waysto-%e2%80%9cuse%e2%80%9d-it/ So, how can you protect enterprise network from Rogue APs?

Can the firewall protect from Rogue AP No! Firewall works at traffic transfer point between LAN & Internet Firewall does not detect Rogue AP Firewall does not see traffic through Rogue AP Rogue AP Internet Firewall Office Premises and LAN Attacker

Can WPA2 protect from Rogue APs No! You can enforce security controls such as WPA2 only on APs which you manage, i.e., your Authorized APs Rogue AP is not your managed AP In fact, most Rogue APs found in the field installed by naïve users either have OPEN wireless link (out of box default) or WEP wireless link (deterministically crackable)

Is 802.1X port control sufficient to protect from Rogue AP As a matter of fact, most networks do not have 802.1x port control today If even if 802.1x is deployed, it cannot protect from all Rogue AP configurations, some examples below: 802.1X Rogue AP Legitimate user Rogue APs over bridging laptops MAC spoofer

Can antivirus, wired IDS protect from Rogue AP No! Rogue AP threats operates at a layer below antivirus and wired IDS protection

Is NAC sufficient to protect from Rogue AP As a matter of fact, most networks do not have NAC deployed today If even if NAC is deployed, it cannot protect from all Rogue AP configurations, some examples below: NAC Rogue AP Rogue APs over bridging laptops MAC spoofer Legitimate user

So what protects network from Rogue APs Sensor based wireless intrusion prevention system (WIPS) which Watches for Rogue APs 24x7 Performs wired/wireless correlation for AP network connectivity testing to detect Rogue AP Provides for automatic blocking of Rogue AP Locates Rogue AP for easy searching and removal from the network

WIPS in action - Rogue AP protection See demonstration video at http://www.airtightnetworks.com/fileadmin/content_images/ demos/rogueap-demo/rogueap-demo.html

What are different types of Rogue APs Various permutations and combinations of Bridging APs (on subnets coinciding with or different from wired interface address) Router (NAT) APs (with and without MAC cloning) APs with encrypted wireless links APs with open wireless links Soft APs (natively configured on wireless client or which use external devices such as USB sticks) APs on different VLANs in the LAN including no-wifi subnets

Can wire side only scanning protect from all Rogue AP No! Several Rogue AP types are undetectable by wire side only scanning, examples: Bridging APs on a subnet inconsistent with their wired IP address (default configuration) Soft APs Router (NAT) APs with cloned wire side MAC address See http://blog.airtightnetworks.com/rogue-ap-detectionpci-compliance/ for more details

What does AP auto-classification mean in the context of Rogue AP Automatically classifying APs visible in airspace into three categories: Authorized, External and Rogue Authorized AP External AP Managed APs (Static Part) All APs visible in air Unmanaged APs (Dynamic Part) Not connected to my network Rogue AP Connected to my network

What is key technology enabler for accurate autoclassification Robust testing of AP s connectivity to monitored enterprise network is the key technology enabler If AP is not detected as connected, when it is indeed connected to the monitored enterprise network, it results in security hole (false negative) If AP is detected as connected, when it is indeed not connected to the monitored enterprise network, it results in false alarm (false positive)

What are prevalent AP connectivity testing methods MAC Correlation (CAM table lookup) Collect all MAC addresses seen on wired network (CAM table lookup) Detect all MAC addresses seen on wireless network Presume network connectivity of APs based on match between wired and wireless MAC addresses Signature Packet Injection Inject signatures packets in the wired and wireless network Detect which APs forward signature packets between wired and wireless interfaces Confirm network connectivity of APs based on signature packet forwarding

How do these connectivity testing methods compare Packet injection method is superior to CAM table lookup as it is fast, accurate, gracefully scalable to large networks and capable of detecting all types of Rogue APs For more details on this comparison and auto-classification methods used in various WIPS in the market, see http://blog.airtightnetworks.com/ugly-bad-and-good-ofwireless-rogue-access-point-detection/ http://blog.airtightnetworks.com/making-the-right-choicefor-rogue-access-point-detection-technology/

How does WIPS block Rogue AP Over the air quarantine WIPS sensor blocks client s connection to Rogue AP by transmitting spoofed disconnection frames Deauthentication is popularly used disconnection frame Switch port disable WIPS attempts to locate switch port into which Rogue AP is connected If found, disables the switch port using SNMP WIPS Sensor Rogue AP

How do the two Rogue AP blocking methods compare Over the air quarantine Works independent of correlation between wired and wireless addresses of Rogue AP Non-intrusive with network infrastructure No interoperability problems with different switch vendors Deauthentication based over the air quarantine will not work with.11w Rogue APs Switch port disable Only works for those Rogue APs which have correlation between wired and wireless addresses Highly intrusive. WIPS needs need to know set password on switches. Error in tracing leaf switch may turn off entire switch branch Suffers from switch vendor interoperability problems

Conclusion Rogue AP is unmanaged AP plugged into wired enterprise network by unwilling or malicious employees or visitors Rogue AP can expose wired enterprise network to outsiders over its RF signal spillage Rogue AP threat is not mitigated by firewalls, WPA2, 802.1x, NAC, anti-virus or wire side scanners Sensor based wireless intrusion prevention system (WIPS) detects, blocks and locates Rogue APs Testing of AP s connectivity to monitored enterprise network is key technology enabler for reliable protection from Rogue APs