Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network



Similar documents
Wireless (In)Security Trends in the Enterprise

All You Wanted to Know About WiFi Rogue Access Points

PCI Wireless Compliance with AirTight WIPS

Don t Let Wireless Detour Your PCI Compliance

PCI DSS 3.1 and the Impact on Wi-Fi Security

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Wireless Security Strategies for ac and the Internet of Things

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

AirTight C-55 Access Point

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Closing Wireless Loopholes for PCI Compliance and Security

Wireless Local Area Network Deployment and Security Practices

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Air Marshal. White Paper

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Lucent VPN Firewall Security in x Wireless Networks

How To Buy Nitro Security

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

AirTight C-60 Access Point

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Chapter 11 Cloud Application Development

Enterprise Security Solutions

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Observer Analyzer Provides In-Depth Management

Achieving PCI-Compliance through Cyberoam

How To Secure Your Store Data With Fortinet

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Zone Labs Integrity Smarter Enterprise Security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Policy Management: The Avenda Approach To An Essential Network Service

Basics of Internet Security

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Overview to the Cisco Mobility Services Architecture

Industrial Communication. Securing Industrial Wireless

RAP Installation - Updated

Wi-Fi, Health Care, and HIPAA

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Did you know your security solution can help with PCI compliance too?

Recommended IP Telephony Architecture

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

SANS Top 20 Critical Controls for Effective Cyber Defense

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Ensuring HIPAA Compliance in Healthcare

Does your Citrix or Terminal Server environment have an Achilles heel?

POLICY MANAGEMENT MODULE

Systems Manager Cloud Based Mobile Device Management

Link Layer and Network Layer Security for Wireless Networks

Athena Mobile Device Management from Symantec

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Network Security: Introduction

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Hole196 Vulnerability in WPA2

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Symantec Mobile Management 7.1

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

White Paper. Five Steps to Firewall Planning and Design

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

Carbon Black and Palo Alto Networks

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Devising a Server Protection Strategy with Trend Micro

Complete Protection against Evolving DDoS Threats

Cisco Advanced Services for Network Security

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Transcription:

A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved.

Introduction Last few years have seen a sweeping commoditization of IT, more so in the mobile wireless space, with hardware and software vendors innovating to make their devices and applications easy and convenient for end-users. Virtual WiFi, one of the many cool features in Windows 7, is a great example of this shift. With Virtual Wi-Fi, users can now turn their Windows 7 laptops into a Wi-Fi access point (AP). Free utilities such as Connectify and Intel MyWiFi make it very easy to set up a personal Virtual Wi-Fi hotspot in less than a minute in two simple steps. This is not the first time that a laptop can be converted into a Soft AP. But it is the first time that a laptop can be used both as a Client and as a Soft AP simultaneously. In other words, while staying connected to an AP, a Windows 7 laptop can now share that connection, using Virtual Wi-Fi, with other Wi-Fi devices and users. Using this personal Wi-Fi hotspot, users can now easily synch up music files on their laptop with a Zune or ipod, transfer photos from their iphone onto their laptop, and share their Wi-Fi Internet connection. What does this mean for enterprise security? Using Virtual WiFi, Windows 7 laptops can now be connected to your enterprise 2010 AirTight Networks, Inc. All rights reserved. 2

Wi-Fi network while sharing their enterprise network access with other unauthorized Wi-Fi devices or users. This means that every Windows 7 laptop is a potential Rogue AP 1 that can be used to bypass your wired security and access your private enterprise LAN. Using a Rogue AP, an attacker could compromise your servers, access sensitive data, and launch network reconnaissance and disruption attacks 2. As Windows 7 becomes the de-facto standard for PC users in the near future, a typical enterprise security administrator may have to deal with tens if not hundreds of Rogue APs every day! Yet without the right security tools, a security administrator will have no visibility and control over how many of these Rogue APs are present on the corporate network and how many unauthorized devices or users are connecting to them. Interestingly, not much has been written about this issue yet. Robert Graham of Errata caught it right away and discussed it back in November of 2009 noting that users could previously set up Ad-hoc Wi-Fi and connection sharing, but that the Windows Virtual Wi-Fi capability will cause rogue access points to proliferate in companies. A Virtual Wi-Fi Soft AP operates similar to a Network Address Translation (NAT) Wi-Fi router. All Wi-Fi devices that are part of the Virtual Wi-Fi hosted network are assigned private IP addresses. All traffic from these devices bound to the enterprise network or the Internet is tunneled using the IP and MAC addresses of the Virtual 1 All You Want to Know About Rogue APs http://www.rogueap.com/rogue-ap-docs/rogueap-faq.pdf 2 Rogue AP: 5 Ways to (Mis)Use It http://blog.airtightnetworks.com/wifi-rogue-ap-5-ways-to-%e2%80%9cuse%e2%80%9d-it/ 2010 AirTight Networks, Inc. All rights reserved. 3

Wi-Fi Soft AP. This means that all traffic entering the wire is seen as coming from the authorized Windows 7 laptop. Naturally, all wired security measures such as network access control (NAC), 802.1x, firewall, wired IDS/IPS, and content filters are rendered useless. What can security administrators do about it? Windows user group policy Turning ON Virtual Wi-Fi on a Windows 7 laptop requires local administrative privileges. By defining user group policies in Active Directory, you can shutdown this privilege for your users. However, the ability to do this is currently supported only in Windows 2008 server R2. Further, this approach lacks flexibility. You may want to disallow Virtual Wi-Fi when a Windows 7 laptop is connected to your enterprise network (via Wi-Fi or Ethernet), but allow users to take advantage of the convenience when they are travelling or at home. This is not possible using Windows user group policy. Wireless endpoint security agent A wireless endpoint security agent such as AirTight s SpectraGuard SAFE can enable flexibility in enforcing your security policies on client devices. SAFE allows you to define granular laptop security policies, for instance, disallow use of Wi-Fi when laptop is connected to the wired enterprise network, or disallow Virtual Wi-Fi at work and allow when laptop is away, or allow WiFi hotspot connections only using VPN, and so on. It also saves you the trouble of configuring individual laptops. You can simply push your policies to all enterprise laptops from a central server. Wireless intrusion prevention system (WIPS) A WIPS can proactively protect your enterprise network from wireless threats by scanning the airspace 24x7. However, when it comes to Rogue AP detection, most WIPS solutions including those integrated into your WLAN infrastructure, rely on wire-side scanning. It cannot be stressed enough that wire-side scanning alone is incapable 3 of detecting Virtual WiFi Rogue APs because of the NAT operation and given that this new type of Rogue APs can connect to your enterprise network via Wi-Fi. The ability to correlate traffic in the air with that on the wire is the key for accurately 3 Wireside-only rogue detection: Inadequate for both security and compliance http://blog.airtightnetworks.com/rogue-ap-detection-pci-compliance/ 2010 AirTight Networks, Inc. All rights reserved. 4

About AirTight Networks AirTight Networks is the global leader in wireless security and compliance solutions providing customers best-of-breed technology to automatically detect, classify, locate and block all current and emerging wireless threats. AirTight offers both the industry s leading wireless intrusion prevention system (WIPS) and the world s first wireless vulnerability management (WVM) securityas-a-service (SaaS). AirTight s award-winning solutions are used by customers globally in the financial, government, retail, manufacturing, transportation, education, healthcare, telecom, and technology industries. AirTight owns the seminal patents for wireless intrusion prevention technology with 12 U.S. patents and two international patents granted (UK and Australia), and more than 20 additional patents pending. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com and automatically detecting the presence of a Virtual Wi-Fi Soft AP on your enterprise network. SpectraGuard Enterprise, powered with AirTight s patented Marker Packet technology, is the only WIPS that has visibility on both the wired and wireless sides. Unsurprisingly then, SpectraGuard Enterprise is able to instantly detect a Soft AP, pinpoint its physical location, and automatically block it over the air. Summary Windows 7 Virtual Wi-Fi enables a laptop to operate as a client and as an AP simultaneously, making it very easy to deploy Rogue APs on enterprise networks This is the first time that a Rogue AP can connect to your enterprise network using Wi-Fi Wire-side security measures such as 802.1X, NAC, wired IDS/IPS and firewall cannot protect you against this and other wireless threats WIPS solutions that rely on wire-side scanning alone are equally ineffective in detecting Virtual Wi-Fi Rogue APs A WIPS that correlates wired and wireless traffic can automatically detect the presence of Virtual Wi-Fi Rogue APs The Global Leader in Wireless Security Solutions AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.