Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks



Similar documents
All You Wanted to Know About WiFi Rogue Access Points

PCI Wireless Compliance with AirTight WIPS

Wireless (In)Security Trends in the Enterprise

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Closing Wireless Loopholes for PCI Compliance and Security

Beyond the Firewall No. 72 March, 2012 Wireless LAN Edition

Wireless Vulnerability Management: What It Means for Your Enterprise

Wireless Vulnerability Management: What It Means for Your Enterprise

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

How To Protect A Wireless Lan From A Rogue Access Point

Sarbanes-Oxley Compliance and Wireless LAN Security

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Don t Let Wireless Detour Your PCI Compliance

Wireless Vulnerability Assessment For: ABC

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

How To Secure Wireless Networks

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

Best Practices for Securing Your Enterprise Wireless Network

Ensuring HIPAA Compliance in Healthcare

WHITE PAPER. Preventing Wireless Data Breaches in Retail

Technical Brief. Wireless Intrusion Protection

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Wireless Security with Cyberoam

Certified Wireless Security Professional (CWSP) Course Overview

Hole196 Vulnerability in WPA2

9 Simple steps to secure your Wi-Fi Network.

Wireless Security Strategies for ac and the Internet of Things

Wireless Intrusion Detection Systems (WIDS)

WHITE PAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Ensuring HIPAA Compliance in Healthcare

Industrial Communication. Securing Industrial Wireless

Introduction. Course Description

Security Awareness. Wireless Network Security

Wireless Security for Mobile Computers


PCI DSS 3.1 and the Impact on Wi-Fi Security

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Wi-Fish Finder: Who will bite the bait?

Developing Network Security Strategies

Wireless Network Standard and Guidelines

chap18.wireless Network Security

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

SecurityMetrics Vision whitepaper

CYBERTRON NETWORK SOLUTIONS

The next generation of knowledge and expertise Wireless Security Basics

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

New Avatars of Honeypot Attacks on WiFi Networks

Link Layer and Network Layer Security for Wireless Networks

Wireless LAN Security:

Wireless Vulnerability Assessment Airport Scanning Report Part - II

WHITE PAPER. Wireless Security: Ensuring Compliance with HIPAA, PCI, GLBA, SOX, DoD & Enterprise Policy

Integrated Health Systems. Enterprise Wireless LAN Security for Long Term Care. Integrated Systems, Inc. (866)

Topics in Network Security

How To Secure Your Store Data With Fortinet

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

Wireless Network Standard

Best Practices for Outdoor Wireless Security

WHITE PAPER. PCI Wireless Compliance Demystified Best Practices for Retail

CS 356 Lecture 29 Wireless Security. Spring 2013

White Paper. Understanding the Layers of Wireless LAN Security & Management

WHITE PAPER. Three Steps for Bullet-proof Wireless LAN Security & Management

Wireless Security: Ensuring Compliance with HIPAA,PCI, GLBA, SOX, DoD & Enterprise Policy

Air Marshal. White Paper

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

BUILDING OPEN AND SECURE WIRELESS NETWORKS ON CAMPUS

Wi-Fi, Health Care, and HIPAA

Enterprise A Closer Look at Wireless Intrusion Detection:

Securing end devices

The Hidden Dangers of Public WiFi

WHITE PAPER. Enterprise Wireless LAN Security

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Detailed Description about course module wise:

Wi-Fi Client Device Security and Compliance with PCI DSS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Top 10 Security Checklist for SOHO Wireless LANs

Chapter 2 Configuring Your Wireless Network and Security Settings

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

WIRELESS NETWORKING SECURITY

Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

Cisco Unified Wireless Network Solution Positioning for the New PCI DSS Wireless Guideline

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October Last updated: 11 October Rev: 1.

Using Wireless Technology Securely

Transcription:

Understanding WiFi Security Vulnerabilities and Solutions Dr. Hemant Chaskar Director of Technology AirTight Networks

WiFi Proliferation Global WiFi Radio Chipset Sales 387 307 Millions 120 200 2005 2006 Year 2007 2008 Source: WiFi Alliance, www.wifialliance.org

Irony of Information Age It's the great irony of our Information Age -- the very technologies that empower us to create and to build also empower those who would disrupt and destroy. - US President Obama on Cyber Security

WiFi Is No Exception WiFi throws new pieces in the information security puzzle! Signal spillage outside buildings Threats operative below Layer 3 Operation in unlicensed band, open technology Wired firewalls, IDS/IPS, anti-virus ineffective against WiFi threats

Everyone Is Talking About WiFi Security Financial Districts Airspace Reveals Wi-Fi Security Risks, Sarbanes-Oxley Compliance Journal, May 2009 http://www.s-ox.com/dsp_getnewsdetails.cfm?cid=2614 Citing safety, Govt bans WiFi in key offices, missions, Indian Express, August 2009 http://www.indianexpress.com/news/citing-safety-govt-bans-wifi-in-key-officesmissions/497766/) PCI (Payment Card Industry) DSS Wireless Guidelines, June 2009 https://www.pcisecuritystandards.org/education/info_sup.shtml WiFi networks under attack from wardrivers, The Times of India, September 2008 http://timesofindia.indiatimes.com/india/wifi_under_attack_from_wardrivers_/articleshow/ 3429169.cms Security experts warn of dangers of rogue Wi-Fi hotspots, CNN Business Traveler, August 2009 http://edition.cnn.com/2009/tech/science/08/11/wifi.security.hackers/index.html?iref=24h ours

Some Say It Is Top Priority Today Next Generation Threats and Vulnerabilities Projection June 2009

Sometimes We Learn The Hard Way 45.7 Million payment card accounts compromised at TJX stores in USA over WiFi Estimated liabilities more than $4.5 Billion

Closer Look At WiFi Vulnerabilities

Incorrect Views of WiFi Security No WiFi Enterprises I don t have any WiFi installed and hence I must be secure WiFi is officially deployed I have Firewalls, IDS, Anti-virus installed and hence I am already protected

Most Obvious WiFi Threat Eavesdropping, Unauthorized Access WPA, WPA2 Managed APs Firewall, Wired IPS Managed Clients Solution: Use of strong wireless authentication & encryption in WiFi OPEN and WEP are big NO! WPA can be used, but not enterprise grade, use WPA2 which is enterprise grade SSID hiding and MAC access control lists can be evaded Find tutorial on WPA/WPA2 at - http://www.airtightnetworks.com/fileadmin/content_images/news/webinars/authencryp_primer.pdf

WPA2 or No-WiFi Cannot Address Unmanaged Devices Eavesdropping Unauthorized Access Cracking Wi-Phishing Honeypots External APs External Users WPA, WPA2 Rogue AP Misconfigured AP Firewall, Wired IPS Ad hoc Connections Wireless DoS Threats from Unmanaged Devices

Rogue AP = Unmanaged AP attached to network = (Logically) LAN jack hanging out of window Malicious intent or simply an unwitting, impatient employee Wall Jack AP Pocket AP Wireless Router Provides direct access to wired network from areas of spillage Steal data on wire Scan network for vulnerabilities Firewall, anti-virus, WPA2 do not see this PCMCIA and USB APs

Case Studies Example: APs visible in airspace of client site 21 APs are unaccounted for (Open and WEP) Can one of the unaccounted for APs be on their 10 2 6 Open WEP wired network? How can they keep track of APs 24x7? 19 WPA2 Unknown Unaccounted Insecure APs Are Present in All Wireless Neighborhoods. AirTight Networks Scan of Financial Districts in USA, May 2009 http://www.airtightnetworks.com/home/resources/knowledge-center/financial-districts-scanning-report.html RSA Wireless Security Survey, 2007 and 2008 scans of London, New York, Paris http://www.rsa.com/node.aspx?id=3268 Deloitte Scan of Indian Cities, December 2008 http://bcm-india.org/wifi_india.pdf AirTight Networks Scan of Indian Cities, November 2008

Ad hoc Connections Employees may use ad hoc connections to share content Reduce productivity Leak sensitive data Inadvertent ad hoc connections Compromise laptop Bridge to enterprise network Enterprise Network Bridging Laptop For some real world data on ad hoc vulnerability, see AirTight s scan study at worldwide airports: http://www.airtightnetworks.com/home/resources/knowledge-center/airport-scan.html

Ad hoc Bridge to Wired Network Users may bridge wired and WiFi interfaces on their laptops

Misassociations Policy Bypassed WiPhishing, Evil Twin, Honeypot Internet Access Policy Policy violation Gmail, IM, banned websites, banned content MIM attack Password stealing, data interception Growing number of hack tools: KARMETASPLOIT, SSLstrip, Airbase

Honeypot/Evil Twin/WiPhishing KARMETASPLOIT: http://trac.metasploit.com/wiki/karmetasploit http://blog.trailofbits.com/karma/ http://blog.airtightnetworks.com/karmetasploit-integrated-tool-lowers-bar-onhacking-wireless-clients/ SSLstrip: http://www.blackhat.com/presentations/bh-dc-09/marlinspike/blackhat-dc-09- Marlinspike-Defeating-SSL.pdf http://blog.airtightnetworks.com/sslstrip-even-the-scrupulous-users-can-be-trappedby-wireless-honeypots/ Airbase: http://www.aircrack-ng.org/doku.php?id=airbase-ng#description YouTube - Fishing Windows Clients with airbase-ng and airchat WiFish Finder (free honeypot vulnerability assessment tool): http://www.airtightnetworks.com/wifishfinder

Cracking Exploits WEP protocol vulnerabilities Early WEP cracking tool LEAP, WPA-PSK vulnerability WPA-PSK cracking tool 2001 2002 Increasing sophistication of WEP cracking tools 2003 2004 PEAP misconfig PTW attack vulnerability Café Latte TKIP exploit 2005 2006 2007 2008 WEP WPA WPA2 For more information on cracking exploits: http://www.airtightnetworks.com/home/resources/knowledge-center/wep.html http://www.shmoocon.org/2008/videos.html (Look for PEAP Pwned Extensible Authentication ) http://www.airtightnetworks.com/home/resources/knowledge-center/wpawpa2-tkip-exploit.html

DoS Attacks Wireless DoS attacks are inevitable for WiFi Spoofed disconnects Spoofed connection floods Hogging wireless medium Even Cisco MFP and 802.11w are vulnerable to DoS attacks See Autoimmunity disorder in Wireless LANs http://www.airtightnetworks.com/home/resources/knowledge-center/wlan-selfdos.html

Comprehensive Protection From Protection WiFi From Wi-Fi Vulnerabilities Security Vulnerabilities Page 20 Wireless Vulnerability Management 2008 AirTight Networks, Inc.

WPA2 is Essential, But Not Enough! No-WiFi is Also Not Enough! Eavesdropping Unauthorized Access Cracking Wi-Phishing Honeypots External APs External Users WPA, WPA2 Rogue AP Misconfigured AP Firewall, Wired IPS Ad hoc Connections Wireless DoS

24x7 Comprehensive Protection with Wireless Intrusion Prevention System (WIPS) Eavesdropping Unauthorized Access Cracking Wi-Phishing Honeypots External APs External Users WIPS WPA, WPA2 Rogue AP Misconfigured AP Firewall, Wired IPS Ad hoc Connections Wireless DoS

WIPS Components At Work Monitoring Sensors Data Aggregation Server Optional Client Side Agent Away

WIPS Benefits Detect WiFi Threats and Vulnerabilities Block WiFi Threats and Vulnerabilities Locate Threat Posing Devices on Floor WHO WHEN WHERE HOW PCI HIPPA GLBA SOX GLBA Forensics Forensic Information MITS DoD Compliance Monitoring Performance Monitoring and Troubleshooting

WIPS Providers In The Market Source: July 2009 MarketScope for Wireless LAN Intrusion Prevention Systems

Conclusion WiFi warrants new security controls in enterprise networks For both WiFi and no-wifi networks Perceived as high priority item today Also a regulatory compliance requirement Strong authentication and encryption (WPA2) is essential for authorized Wi-Fi Prevents eavesdropping and unauthorized access Another layer of security in the form of WIPS (Wireless Intrusion Prevention System) is essential for comprehensive protection Prevents rogue APs, ad hoc connections, misassociations, cracking exploits, DoS attacks Compliance monitoring Performance monitoring and troubleshooting as added benefits

For More Information on WiFi Security www.airtightnetworks.com WiFi security knowledge resource Real world scans and case studies Industry news Blog Videos Best practices Security solutions