Securing a Wireless Home Network
Download
Report
Transcript Securing a Wireless Home Network
Securing a Wireless
Home Network
BY: ARGA PRIBADI
Wireless Facts
Signal
Range
50 – 200 FT from access point
unblocked
Approx
Security
Anyone
can eavesdrop on an unsecured
wireless network
What is LAN?
Stands
for Local Area Network
Computer
Network interconnected with other
computers within a limited area
wide
variety of LAN topologies have been
used, including ring, bus, mesh and star, but
the most common LAN topology in use today
is switched Ethernet
Difference between wireless and
wired LAN
LAN
is much more faster and secure
Must
physically be connected to switch or
router to steal information
Up
to 1Gbps transfer speed
WLAN
is slower and much less secure
Vulnerable
Limited
to attacks from outside
to 54mbps
Sample of LAN
Sample of WLAN
WLAN
How
All
it works
components that can connect into a wireless
medium in a network are referred to as stations. All
stations are equipped with wireless network
interface controllers
Wireless base station has to signal existence to
allow devices to connect
Makes it vulnerable for attackers with strong
transceivers
Types of attacks
Passive Attack: These attacks are not harmful to the networks; they
take place for information-gathering. A malicious user just listens to
the all inbound and outbound traffic of a wireless network.
Active Attack: As the attacker does a passive attack in order to get
information about the wireless network, now she/he will do an
active attack. Mostly, active attacks are IP spoofing & Denial of
Service attack.
MITM Attack: Here the attacker accesses the information of the
AccessPoint of any active SSID. Here dummy APs are created. The
attacker listens the communication between to end points.
Consequences of Attacks
Things
that could happen
Attack
on laptops and workstations on the
network
Steal
Steal
internet access
information transmitted over wireless
network
Attack on Laptops and
workstations
Attempt to steal data from hard drives
Damage data on hard drives
Planting malicious software to attack other
computers
Attacks are traced to your computer not the
attacker’s
Stealing internet access
Attacker joins your network, uses internet gateway
Things attacker could be doing while on your network
Downloading
Torrent
illegal files
Broadcast
Attacks
child porn
Spam
are traced to your network
How simple it is too attack WLAN
It is very simple
All you need is a laptop, wireless card, and some
software
Directional antenna will boost the range from where
you can access network
Directional antenna can be made from Pringles can
How do keep attackers out home
WLAN
Change the service set identifier (SSID)
Change router password
Shutoff base station’s SSID broadcast
Enable (wireless protected access) WPA or WPA2
encryption
Changing SSID
To gain access to LAN you need SSID of router
Default SSID can be easily guessed such as
(Linksys, Motorola)
Works best with previously stated security measures
Change Password
To access LAN you need router/base station
password
Most default passwords are manufacturer’s name
Changing the password would drastically reduce
chance of attacks
Close Your Network
Shutoff SSID broadcast
Reduces chance attacker sees your network
If you can’t see it you can’t steal it
Enable wireless encryption
Encrypt
network traffic
Has
to be done on base station and all access
points, wireless adapters, etc.
All
Use
devices use the same WPA or WPA2 keys
WPA or WPA2 preferably WPA2
Wifi Alliance
Setting up wireless security
Make
all security changes through a wired link
Changing
settings wirelessly could encounter
connection loss when applying changes
Set
up devices in order:
Base
station (cable/DSL/modem)
Access points
Test
each device for connectivity before
finalizing installation location
IBM network security
https://www.youtube.com/watch?v=RKvJyn8LCzc
Conclusion
Change
default admin usernames and
passwords
Change
default SSID
Disable
SSID Broadcast
Turn
on WPA Encryption
References
https://www.consumer.ftc.gov/articles/0013-securing-your-wirelessnetwork
http://www.pcmag.com/article2/0,2817,2420002,00.asp
http://compnetworking.about.com/od/wirelesssecurity/f/what-iswpa2.htm
http://compnetworking.about.com/od/networkdesign/u/set-upnetwork-connections.htm