securing wireless networks the myth.pdf · debunking the myths. 2 chaffey college chino information...

Post on 15-Jul-2020

13 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor

Securing Wireless NetworksSecuring Wireless NetworksDebunking the MythsDebunking the Myths

22Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is a Wireless Network?What is a Wireless Network?

The wireless telegraph is not difficult to understand. The ordinThe wireless telegraph is not difficult to understand. The ordinary ary telegraph is like a very long cat. You pull the tail in New Yorktelegraph is like a very long cat. You pull the tail in New York, and it , and it meows in Los Angeles. The wireless is the same way, only withoutmeows in Los Angeles. The wireless is the same way, only without the the cat.cat.

-- Attributed to Albert EinsteinAttributed to Albert Einstein

33Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is a Wireless Network? What is a Wireless Network? (really)(really)

•• It is a LANIt is a LAN•• Extension of Wired LANExtension of Wired LAN•• Uses High Frequency Radio Waves (RF)Uses High Frequency Radio Waves (RF)•• Speed : 2Mbps to 54MbpsSpeed : 2Mbps to 54Mbps•• Distance 100 feet to 15 miles Distance 100 feet to 15 miles (with fancy antennas)(with fancy antennas)

•• Most importantly, It lets you sit on your deck and use Most importantly, It lets you sit on your deck and use your computer while sipping a cocktail of your choiceyour computer while sipping a cocktail of your choice

44Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Is Wireless Secure?Is Wireless Secure?

•• Not Not ‘‘Out of the BoxOut of the Box’’•• There are steps you can takeThere are steps you can take

–– None are a total solutionNone are a total solution–– In combination they may be sufficientIn combination they may be sufficient

•• Defense in depthDefense in depth•• Making the hackers Making the hackers ‘‘go next doorgo next door’’

55Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What Is This Phenomenon of DriveWhat Is This Phenomenon of Drive--by Hacking?by Hacking?

•• Hacker taps into a network using a wireless rig Hacker taps into a network using a wireless rig that allows him to park in front of a building and that allows him to park in front of a building and gain access to your network while sitting in the gain access to your network while sitting in the car. car.

•• Unsecured wireless can be likened to installing a Unsecured wireless can be likened to installing a wired LAN jack in your front yard.wired LAN jack in your front yard.

•• Often referred to as Often referred to as ““WarDrivingWarDriving””

66Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

•• Term derived from War dialing, made popular in Term derived from War dialing, made popular in the movie War Gamesthe movie War Games

•• All that is required are a few readily available All that is required are a few readily available hardware and software componentshardware and software components–– A PC or PDA with a wireless network cardA PC or PDA with a wireless network card–– Optionally, a GPS and external antennaOptionally, a GPS and external antenna–– Software such as Software such as NetstumblerNetstumbler, Kismet, etc., Kismet, etc.

•• Freely downloadable on the InternetFreely downloadable on the Internet•• Easy for the average computer user to installEasy for the average computer user to install

77Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

88Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving (continued)(continued)

•• The software logs configuration of detected The software logs configuration of detected WiFiWiFidevices, optionally including the map locationdevices, optionally including the map location

•• Moving the Moving the WarDrivingWarDriving rig from place to place rig from place to place will eventually develop a large database of will eventually develop a large database of wireless networks and their locations wireless networks and their locations

99Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

1010Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving (continued)(continued)

•• IS THIS LEGAL?IS THIS LEGAL?–– Probably, if that is all the farther it goesProbably, if that is all the farther it goes–– Accessing a network is another matter entirelyAccessing a network is another matter entirely

•• Definitely NOT legal if you do not have the ownerDefinitely NOT legal if you do not have the owner’’s s permissionpermission

•• Even if you ONLY use it to access the InternetEven if you ONLY use it to access the Internet•• Most Most WardriversWardrivers do NOT access the networks that they do NOT access the networks that they

detectdetect–– Surprised?Surprised?

1111Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Why Is It Easy to Get Into a Wireless Network?Why Is It Easy to Get Into a Wireless Network?

•• The most common wireless local area networks The most common wireless local area networks are built based on a standard known as 802.11are built based on a standard known as 802.11

•• The security of this technology has been The security of this technology has been demonstrated to be inadequate when demonstrated to be inadequate when challenged by simple hacking attemptschallenged by simple hacking attempts

•• In addition, products sold with this technology In addition, products sold with this technology are usually delivered with security functionality are usually delivered with security functionality disabled.disabled.

1212Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What if I Change My NetworkWhat if I Change My Network’’s Name?s Name?

•• That is more than most do, but it doesnThat is more than most do, but it doesn’’t make t make you much more secureyou much more secure–– Your SSID (Service Set ID) is beaconed by your APYour SSID (Service Set ID) is beaconed by your AP–– You can turn off beaconing, but your SSID is still sent You can turn off beaconing, but your SSID is still sent

each time a computer connects and is easily capturedeach time a computer connects and is easily captured•• At least your neighbor will not accidentally connect!At least your neighbor will not accidentally connect!

beacon

beacon

beacon

1313Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

I Also Changed My ChannelI Also Changed My Channel

•• Once again, that is more than most do, but it Once again, that is more than most do, but it does nothing for securitydoes nothing for security–– Windows Windows xpxp will automatically scan all the available will automatically scan all the available

channels for an active access pointchannels for an active access point

•• It is helpful to select a channel that does not It is helpful to select a channel that does not overlap your neighbor!overlap your neighbor!–– This will improve the function of your WLANThis will improve the function of your WLAN–– Most Access Points are set to channel 6 by defaultMost Access Points are set to channel 6 by default

•• Pick 1 or 11 for your APPick 1 or 11 for your AP

1414Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me Secure?Secure?

•• Not if you donNot if you don’’t use it!t use it!–– Less than 50% of detected Less than 50% of detected WLANsWLANs have WEP enabledhave WEP enabled–– Many that do, have 64bit rather than 128bit Many that do, have 64bit rather than 128bit

encryptionencryption

•• Even if you use itEven if you use it……–– The algorithms used are well understood and The algorithms used are well understood and

not considered weak, but the way in which not considered weak, but the way in which they are used has resulted in a number of they are used has resulted in a number of easily exploitable weaknesseseasily exploitable weaknesses

1515Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)

•• WEP weakness WEP weakness –– WEP security flaws were documented in a 2001 UC WEP security flaws were documented in a 2001 UC

Berkley studyBerkley study•• Weak encryption (never intended for repeated use)Weak encryption (never intended for repeated use)•• Short keys (64bits Short keys (64bits –– 24bit Init Vector = 40 bits)24bit Init Vector = 40 bits)•• Static KeysStatic Keys•• No distribution method (shared key)No distribution method (shared key)

1616Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)

•• There are freely distributed programs that can There are freely distributed programs that can crack WEP keys crack WEP keys (but it takes a while)(but it takes a while)

1717Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What about WPA?What about WPA?

•• WPA is MUCH more secureWPA is MUCH more secure–– Encryption keys are frequently rotatedEncryption keys are frequently rotated

•• Before they can be crackedBefore they can be cracked

–– WPA uses a WPA uses a passphrasepassphrase as the starting point for the as the starting point for the key exchangekey exchange

•• Much more secure if a complex Much more secure if a complex passphrasepassphrase is usedis used–– Several upper & lower case letters, numbers, symbolsSeveral upper & lower case letters, numbers, symbols

–– Can also be used with enterprise systems (RADIUS) Can also be used with enterprise systems (RADIUS) for more securityfor more security

•• Not practical in a home or small officeNot practical in a home or small office

1818Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

So WPA Makes Me Secure?So WPA Makes Me Secure?

•• Not if you donNot if you don’’t use it!t use it!–– Are you seeing a trend here?Are you seeing a trend here?

•• IF you donIF you don’’t use too simple a t use too simple a passphrasepassphrase–– There are tools that will crack There are tools that will crack passphrasespassphrases, but it , but it

could take many could take many yearsyears on a COMPLEX on a COMPLEX passphrasepassphrase

1919Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is MAC Address Filtering?What is MAC Address Filtering?

•• Every network card ever produced has a unique Every network card ever produced has a unique address that can be used to limit access to your address that can be used to limit access to your wireless networkwireless network

•• This feature is disabled by defaultThis feature is disabled by default

2020Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

SoSo……MAC Address Filtering Makes Me MAC Address Filtering Makes Me Secure?Secure?

•• Not if you donNot if you don’’t use it!t use it!–– OK, so this is getting oldOK, so this is getting old

•• Authorized computers send their MAC address Authorized computers send their MAC address when they attempt to connectwhen they attempt to connect–– This can be loggedThis can be logged

•• In spite of what some people believe, MAC In spite of what some people believe, MAC addresses can be changed on most network addresses can be changed on most network cards (at least temporarily)cards (at least temporarily)

2121Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Are You Telling Me ItAre You Telling Me It’’s Hopeless?s Hopeless?

•• NONO–– Most of the security measures we have already Most of the security measures we have already

described work well when used correctlydescribed work well when used correctly–– When several are used in conjunction, they are a When several are used in conjunction, they are a

formidable barrier to attackformidable barrier to attack–– Just being better than the status quo is often enough Just being better than the status quo is often enough

to get the hacker to to get the hacker to ‘‘go next doorgo next door’’

2222Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Why Do I Care?Why Do I Care?

•• Why do I care if somebody uses my connection Why do I care if somebody uses my connection to check their mail?to check their mail?–– If that was all they did, you probably wouldnIf that was all they did, you probably wouldn’’t caret care–– Those engaged in illegal activity on the Internet Those engaged in illegal activity on the Internet

frequently steal network connections to frequently steal network connections to ‘‘conduct conduct businessbusiness’’

•• Try explaining to the FBI or the NSA that you are Try explaining to the FBI or the NSA that you are ‘‘not a not a crookcrook’’

–– Many Viruses, Worms and Denial of Service attacks Many Viruses, Worms and Denial of Service attacks are launched using stolen network connections in are launched using stolen network connections in order to hide the true sourceorder to hide the true source

2323Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Then What Should I Do?Then What Should I Do?

•• Most modern access points support WEP or Most modern access points support WEP or WPAWPA–– Use the highest level of security that your Access Use the highest level of security that your Access

Point and computer network card supports (they must Point and computer network card supports (they must be the same).be the same).

•• MAC filtering and disabling beaconing are good MAC filtering and disabling beaconing are good added measuresadded measures–– This will make it difficult for visitors to connect to your This will make it difficult for visitors to connect to your

networknetwork

•• Change the channel, password and address of Change the channel, password and address of your APyour AP

2424Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

HOWHOW……??

•• You will need to spend a little time in the manual You will need to spend a little time in the manual or website for your access pointor website for your access point

•• Some examples follow, but every AP works Some examples follow, but every AP works slightly differentlyslightly differently

Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor

Wireless LAN Protection StrategiesWireless LAN Protection Strategies

2626Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

RecommendationsRecommendations

•• Wireless LAN related ConfigurationWireless LAN related Configuration–– Enable WEP, use 128bit keyEnable WEP, use 128bit key–– Disable SSID BroadcastsDisable SSID Broadcasts–– No SNMP access No SNMP access –– Use MAC (hardware) address to restrict accessUse MAC (hardware) address to restrict access–– NonNon--default Access Point password default Access Point password –– Change default Access Point NameChange default Access Point Name–– Use 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)

2727Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

2828Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

2929Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

3030Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationDisable SSID BroadcastDisable SSID Broadcast

3131Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationNo SNMP access No SNMP access

3232Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationUse 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)

3333Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

General RecommendationsGeneral Recommendations

•• Always (wired or wireless)Always (wired or wireless)–– Install virus protection software plus automatic frequent patterInstall virus protection software plus automatic frequent pattern file n file

updateupdate–– Shared folders must impose passwordShared folders must impose password

•• Management IssueManagement Issue–– Prohibit installation of APProhibit installation of AP’’s without authorizations without authorization–– Discover any new Discover any new APsAPs constantly (constantly (NetStumblerNetStumbler is free, Antenna is cheap)is free, Antenna is cheap)–– Power off Access Point when not in usePower off Access Point when not in use–– Carefully select the physical location of your AP, not near windCarefully select the physical location of your AP, not near windows or ows or

front doors.front doors.

3434Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Thank You!Thank You!

•• Computer Network Security Resources at the Robert Pile Chaffey Computer Network Security Resources at the Robert Pile Chaffey College Chino Information Technology CenterCollege Chino Information Technology Center–– CISCIS--420420 PC Security & PrivacyPC Security & Privacy–– CISNTWKCISNTWK--440440 Fund. Of Network Security (Security+)Fund. Of Network Security (Security+)–– CISNTWKCISNTWK--441441 Firewalls & Intrusion DetectionFirewalls & Intrusion Detection–– CISNTWKCISNTWK--442442 Disaster Recovery PlanningDisaster Recovery Planning–– CISNTWKCISNTWK--445445 Windows Security AdministrationWindows Security Administration–– CISNTWKCISNTWK--447447 Linux Security AdministrationLinux Security Administration

Steve SiedschlagSteve Siedschlag steve.siedschlag@chaffey.edusteve.siedschlag@chaffey.eduAssociate ProfessorAssociate Professor

3535Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

top related