module7 wireless security-b

19
© 2010 – Foreground Security. All rights reserved Module 7 Wireless Security Module 7

Upload: bbaoc

Post on 22-Apr-2015

561 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Module 7Wireless Security

Module7

Page 2: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Module Objectives

• This module will familiarize you with the following:– Wi-Fi Security Issues – Bluetooth– Cell Phone Policy and Procedures

Module7

Page 3: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wireless Today

• Wi-Fi [Wireless Fidelity]

• Bluetooth

• Infrared

• RFID

• Satellite / Microwave

Page 4: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wi-Fi

• 802.11– b / g / a / n

• Modes– Infrastructure– Ad-Hoc (Peer Mode)

• SSID

• MAC Filtering

Page 5: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wireless Networks

Page 6: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wireless Issues

• Vulnerabilities– Signal Availability– Easy access to signals

• Not much required ($ or equipment)

– Signal Frequency Congestion• Microwave / Cordless Phone / Neighbor

– SSID Announce– False Security of Encryption

Page 7: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wireless Countermeasures

• User Awareness

• Security Settings– Confining the signal– Disguising the label (SSID)– Choosing allowed parties (MAC filter)– Hiding the data (Encryption)

Page 8: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wireless Trends

• Faster Speed– 802.11n / 802.16 (WiMax)

• Better Security– Stronger Encryption

– Authentication (802.1x)

Page 9: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wi-Fi Encryption

• WEP

• WPA

• WPA2

• EAP

Page 10: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wi-Fi Risks

• Key Reuse (WEP is flawed)

• Sniffing

• Open Access (sniffed credentials)

• Denial of Service [DoS]

• Rogue Access Points

• Improperly Configured APs

Page 11: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Wi-Fi Tools

• NetStumbler

• Kismet

• AirCrack

• AirMagnet

• SnifferPro

• Ethereal

Page 12: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Handhelds

• Vulnerabilities– Malware– Theft (Device or Data)– Exploit wireless signal– Denial of Service– HotSync

Page 13: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Handheld Countermeasures

• Firewalls / Anti-Malware

• Password protected

• No unnecessary data storage

• Encrypted transmissions

• 2-factor authentication

101

Page 14: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Bluetooth

List of applications• A typical Bluetooth mobile phone headset• More prevalent applications of Bluetooth include:• Wireless control of and communication between a mobile phone and a hands-free

headset. This was one of the earliest applications to become popular. • Wireless networking between PCs in a confined space and where little bandwidth is

required. • Wireless communications with PC input and output devices, the most common being the

mouse, keyboard and printer. • Transfer of files between devices with OBEX. • Transfer of contact details, calendar appointments, and reminders between devices with

OBEX. • Replacement of traditional wired serial communications in test equipment, GPS

receivers, medical equipment, bar code scanners, and traffic control devices. • For controls where infrared was traditionally used. • Sending small advertisements from Bluetooth enabled advertising hoardings to other,

discoverable, Bluetooth devices. • Two seventh-generation game consoles, Nintendo's Wii[4] and Sony's PlayStation 3 use

Bluetooth for their respective wireless controllers. • Dial-up internet access on personal computer or PDA using a data-capable mobile phone

as a modem.

Page 15: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Most important security weaknesses - Bluetooth

• Problems with E0

• Unit key

• PIN

• Problems with E1

• Location privacy

• Denial of service attacks

Page 16: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Other weaknesses

• No integrity checks

• No prevention of replay attacks

• Man in the middle attacks

• Turn off discovery

• Sometimes: default = no security

• …

Page 17: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Recommendations

• Never use unit keys!!!!

• Use long and sufficiently random PINs

• Always make sure security is turned on

• …

Page 18: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

Interesting solutions

• Replace E0 and E1 with AES

• Use MACs to protect integrity

• Pseudonyms

• Identity based cryptography

Page 19: Module7 wireless security-b

© 2010 – Foreground Security. All rights reserved

BluetoothIssues

• Hacking Movie(s)