Securing a Wireless Home Network

Download Report

Transcript Securing a Wireless Home Network

Securing a Wireless
Home Network
BY: ARGA PRIBADI
Wireless Facts
 Signal
Range
50 – 200 FT from access point
unblocked
 Approx
 Security
Anyone
can eavesdrop on an unsecured
wireless network
What is LAN?
 Stands
for Local Area Network
 Computer
Network interconnected with other
computers within a limited area
 wide
variety of LAN topologies have been
used, including ring, bus, mesh and star, but
the most common LAN topology in use today
is switched Ethernet
Difference between wireless and
wired LAN
 LAN
is much more faster and secure
 Must
physically be connected to switch or
router to steal information
 Up
to 1Gbps transfer speed
 WLAN
is slower and much less secure
 Vulnerable
 Limited
to attacks from outside
to 54mbps
Sample of LAN
Sample of WLAN
WLAN
 How
 All
it works
components that can connect into a wireless
medium in a network are referred to as stations. All
stations are equipped with wireless network
interface controllers
 Wireless base station has to signal existence to
allow devices to connect
 Makes it vulnerable for attackers with strong
transceivers
Types of attacks

Passive Attack: These attacks are not harmful to the networks; they
take place for information-gathering. A malicious user just listens to
the all inbound and outbound traffic of a wireless network.

Active Attack: As the attacker does a passive attack in order to get
information about the wireless network, now she/he will do an
active attack. Mostly, active attacks are IP spoofing & Denial of
Service attack.

MITM Attack: Here the attacker accesses the information of the
AccessPoint of any active SSID. Here dummy APs are created. The
attacker listens the communication between to end points.
Consequences of Attacks
 Things
that could happen
 Attack
on laptops and workstations on the
network
 Steal
 Steal
internet access
information transmitted over wireless
network
Attack on Laptops and
workstations

Attempt to steal data from hard drives

Damage data on hard drives

Planting malicious software to attack other
computers

Attacks are traced to your computer not the
attacker’s
Stealing internet access

Attacker joins your network, uses internet gateway

Things attacker could be doing while on your network
 Downloading
 Torrent
illegal files
 Broadcast
 Attacks
child porn
Spam
are traced to your network
How simple it is too attack WLAN

It is very simple

All you need is a laptop, wireless card, and some
software

Directional antenna will boost the range from where
you can access network

Directional antenna can be made from Pringles can
How do keep attackers out home
WLAN

Change the service set identifier (SSID)

Change router password

Shutoff base station’s SSID broadcast

Enable (wireless protected access) WPA or WPA2
encryption
Changing SSID

To gain access to LAN you need SSID of router

Default SSID can be easily guessed such as
(Linksys, Motorola)

Works best with previously stated security measures
Change Password

To access LAN you need router/base station
password

Most default passwords are manufacturer’s name

Changing the password would drastically reduce
chance of attacks
Close Your Network

Shutoff SSID broadcast

Reduces chance attacker sees your network

If you can’t see it you can’t steal it
Enable wireless encryption
 Encrypt
network traffic
 Has
to be done on base station and all access
points, wireless adapters, etc.
All
 Use
devices use the same WPA or WPA2 keys
WPA or WPA2 preferably WPA2
 Wifi Alliance
Setting up wireless security
 Make
all security changes through a wired link
 Changing
settings wirelessly could encounter
connection loss when applying changes
 Set
up devices in order:
 Base
station (cable/DSL/modem)
 Access points
 Test
each device for connectivity before
finalizing installation location
IBM network security

https://www.youtube.com/watch?v=RKvJyn8LCzc
Conclusion
 Change
default admin usernames and
passwords
 Change
default SSID
 Disable
SSID Broadcast
 Turn
on WPA Encryption
References

https://www.consumer.ftc.gov/articles/0013-securing-your-wirelessnetwork

http://www.pcmag.com/article2/0,2817,2420002,00.asp

http://compnetworking.about.com/od/wirelesssecurity/f/what-iswpa2.htm

http://compnetworking.about.com/od/networkdesign/u/set-upnetwork-connections.htm