PowerPoint presentation

Download Report

Transcript PowerPoint presentation

www.iss.net
Wireless Security
August 10, 2006
Michael H. Warfield
Senior Researcher and Fellow
ISS X-Force
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
This presentation is also available on-line:
http://www.wittsend.com/mhw/2006/Wireless-Security-ALE
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Outline
 Introduction and Standards
 Common Uses and Abuses
 Security Incident Examples
 Access Control and Confidentiality
 Securing Wireless Networks
 Closing Summary and References
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Introduction
 Many forms of wireless






Point-to-point
Wi-Fi / 802.11
WiMax / 802.16
Mobile Broadband / 802.20
Bluetooth
3rd Generation Cellular, EVDO, GPRS, Wireless Broadband
 Wi-Fi is becoming ubiquitous
 Cheap and easy and popular
 Wireless is incredibly flexible
 Cost effective compared to hard wired networks
 Works in harsh environments
 Works in mobile environments
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Wi* 802.* Standards
(Alphabet Soup?)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11
 IEEE ratified in 1997
 General wireless standards family
 Has now grown to include 6 over-the-air modulation protocols
 Lots and lots of protocol amendments
 2.4 GHz shared unlicensed band
 Covered by FCC Part 15 regulations
 Initially 1-2 Mbps
 Poor performance
 Poor acceptance
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11a
 IEEE Ratified in 1999
 First ship in 2001
 5 GHz unlicensed band
 54 Mbps
 High Performance
 Costly
 Poor range
 Adoption was slow and poor
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11b
 IEEE ratified in 1999
 2.4Ghz shared unlicensed Band
 Up to 11Mbps
 Moderate Performance
 Relatively inexpensive
 Moderate range (twice that of 802.11a)
 Moderate interference from other services
 Quickly became very popular
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11g
 IEEE ratified in June 2003
 Shipping in January 2003
 2.4GHz shared unlicensed band
 54 Mbps (Super G bounding to over 100 Mbps)
 Good Performance
 Inexpensive (dirt cheap)
 Powerful (many have third party upgrades)
 Compatible with 802.11b
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11n
 100+ Mbps
 Compatible with 802.11b and 802.11g
 Upcoming standard
 Multiple proposals submitted
 No consensus as of yet
 Continuing disagreements are delaying final standardization
 Availability is poor
 Cost is relatively high
 MIMO – 802.11n preview?
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11s
 IEEE Working group first met in July 2004
 802.11 w/ Mesh topology
 Intel early proposal for 802.11s
 Builds on 802.11 a/b/g
 Should be applicable to 802.11n
 No current standards for 802.11 mesh
 Access points and nodes autonomously relay packets
 Self organizing and extensible
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.1X
 IEEE standard for Network Access Controls
 Applies to both wired and wireless networking
 There is no 802.11X
 Common misunderstanding
 Instantiated in the 802.11i wireless standard
 Incorporates a number of authentication methodologies
 PSK – Pre-Shared Keys
 EAP – Extensible Authentication Protocol
 LEAP – Cisco Limited Extensible Authentication Protocol
 Radius
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.16
 WiMax
 WorldWide Interoperability of Microwave Access
 802.16a – Metropolitan Area Network
 802.16e – Moble Broadband
 Other amendments address other concerns in the standard
 Both Licensed and Unlicensed modes
 Higher power
 Broader coverage
 Sprint selecting WiMax for Mobile Broadband
 Anticipated network rollout in 4th quarter of 2007
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Common (and Uncommon) Uses
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Hotspots
 Hotspots are publicly accessible wireless zones
 Pay and free hotspots are proliferating
 Most airports now have hotspots
 Some are free, some for pay
 Some hotels are opting for wireless for broadband
 Some are teaming up with wireless providers
 Some coffee chains have wireless for customers
 Some shops are dealing with customers who won't leave
 Some shops dealing with users in parking lots
 Some people set up hotspots just for kicks
 Some criminals set up hotspots looking for victims
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Neighborhood Networks
 Cul-De-Sac Area Networks (CDSAN)?
 High power APs cover a couple of small streets
 Antennas extend range even further
 YES! You really CAN be the ISP for your entire cul-de-sac!
 Example neighborhood net in Canada
 Broadband
 VoIP
 Video
 Being commercialized for businesses
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Municipal WiFi
 Municipalities considering WiFi as a utility
 Antennas / Access Points on lights and utility poles
 Mesh networking avoids need for wired backbones
 WiMax may extend range and coverage
 Uniform coverage and management
 Narrows “the digital divide”
 Provides additional emergency services backup
 Conflicts with commercial competition
 Mixed legislative actions
 Some active deployments
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Communities
 Philadelphia
 Proposal for community WiFi resulted in state legislation to prevent it
 Philadelphia has an exemption in resulting legislation
 San Fransisco
 Google initially contracted to providing free service
 New Orleans
 Free service in aftermath of Katrina using donated equipment
 BellSouth reported to have withdrawn a donation as a result
 Boston
 May contract with a non-profit to run city-wide WiFi
 Washtenhaw County, MI
 County wide WiFi deployment approved
 85Kbps Free, 500Kbps $35/month
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Wireless Police Knocking?
 New York
 Westchester County New York proposed mandatory WiFi security
 Encryption is NOT mandatory
 Security is mandatory even WITH encryption
 Canola Ranch Resorts
 Tucson condo resort
 Provides wireless and broadband to each unit
 Covenants require that all wireless be secured
 This one requires encryption
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Wireless VoIP
 Wireless PBX
 Great for mobile employees
 Hospitals
 Schools
 Conference Centers
 Cost effective
 Versatile
 Isolated Access Points and networks control security
 Potential eavesdropping / sniffing threats
 Some cell phones now support cellular plus VoIP on
802.11*
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Industry and Agriculture
 Supports mobile equipment
 Farm equipment in the field
 Mobile factory floor equipment and employees
 Eases deployment and installation
 Wiring problems in old installations
 Connections between buildings
 Aids with hostile environments
 Not merely end networking services
 Part of the industrial process
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Personal Area Networks
 Wireless cards and access points are as cheap as network





interfaces now
Employees may install APs under desks for their laptops
Convenient for home-to-office road warriors
Home lan security problems may become corporate lan
security problems
Unauthorized or rogue access points can create gaping
security holes
Open workstations can open up your wired network
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
WiFi Defense Against the RIAA???
 Two recent court cases decided against the RIAA
 Argued that an IP address is not a person
 Evidence of pervasive activity
 Evidence of access by others in the home
 Each case was settled and dismissed
 Use an open access point to argue others may have access?
 Neither case resulted in a judgment
 No legal precedent
 Both cases presented evidence of others in the home
 Hand waving arguments are unlikely to work
 Other evidence may be brought into play (on either side)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Trick Out Your WiFi Router!
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Trick Out That Router
 LinkSys WRT54GS Router
 “Linux based” version
 100 MBit “Speed Booster”
 Has more RAM and Flash than the G / GL
 Add high gain antennas
 Cheap pair of 7 db Onmi
 D-Link directional
 Larger 11 db omni “billy club”
 Add run of low-loss coax to the attic for antenna height
 Add range extenders (repeaters)
 Upgrade to 3rd party firmware
 Add “mesh” or WDS access points
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
DD-WRT Firmware
 Based on Sveasoft Talisman release
 Based on Linksys sources and OpenWRT sources
 Adjustable power (26 mW -> 250 mW)
 Multiple VLAN's and VPN's
 Supports many many vendors (not just Linksys) and







models
Multiple ESSID's per access point
WEP / WPA / WPA2 / Radius support
OpenVPN
IPv6
VoIP
Kismet (an access point that can wardrive as well)
Turns that $60 router into a $600 super performer
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Common (and Uncommon) Abuses
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Wardriving
 Popular sport
 Simple as a PDA
 A small mobile antenna is non-intrusive
 Pringles cans are cheap and effective antennas
 Good directional antennas can work for miles
 Automated tools build wardriving maps with gps
 Majority of access points have no encryption!
 Majority of access points use default settings!
 An FBI representative has stated that wardriving and
warchalking are legal (but bandwidth theft is not).
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Inverse Wardriving
 Wardriving with an Access Point
 Linux based access points have extra features
 Extra power
 Remote command line
 Can run Kismet on the Access Point
 Trolling for open clients willing to connect
 Many workstations are enabled for “any” AP
 Can compromise associated wired networks
 Early tests were run at Democratic National Convention
 Windows was vulnerable to an Ad-Hoc Evil Twin
Wardriving
 Windows boxes would probe for previous connections
 Attacker could emulate other access points based on probes
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Open Workstations
 Easy and common to “attach” to the “wrong” access point
 Many laptops come with built-in WiFi
 WiFi may be enabled without realization
 Difficult to lock down laptops to limited connections
 Open workstations may be contaminated outside of security
perimeters
 Open workstations may bridge wireless to wired networks
 Home users may bring wireless enabled into the workplace
 WiFi policy must include workstation setups!
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Driver Attacks
 Workstations may be directly attacked through WiFi drivers
 They don't have to be in use
 Workstation does not have to be connected to a WiFi network
 User may not even realize WiFi is enabled
 Recent BlackHat 2006 demonstration
 Demonstration was video only
 (They were practicing safe WiFi)
 Attack against Mac OSX
 Other operating systems also vulnerable to similar attacks
 Demonstrated against third party drivers
 Native drivers are also vulnerable
 Recent Intel security advisory on the Centrino WiFi drivers
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Evil Twin
 Variation on the “inverse wardriving”
 Evil access point mimics existing access point ESSID
 Looking for specific networks
 Not just for promiscuous workstations
 Increased power can override legitimate access points
 Evil twins can be more difficult to find than rogues
 Kismet can spot “time stamp” anomalies from Evil Twins
 Shield from within, shield from without
 May be used for WiPhishing
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
SSL Attacks
 Some sites use SSL to protect admin access to web interface
 Some access points used a static server certificate
 SSL does not provide for “Perfect Forward Secrecy”
 SSL does not provide for “Diffie Hellman Key Exchange” in
default “server authenticated” sessions
 Access point firmware readily available for download
 Static certificate from access point firmware image allows
attackers to intercept and decrypt the SSL traffic!
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Broadcast Leakage
 Access points will broadcast LAN broadcast packets
 Local LAN or directed broadcasts
 Netbios is extremely “chatty”
 Workstation names
 Domain / Workgroup names
 Login (user) names
 Services
 ARP requests
 Network mapping
 ARP cache poisoning
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Hotspot Battles
 Only 11 channels in North America
 Competition with and between fee services
 Providers have set up fee based wireless access
 Cybercafes have set up wireless services
 Competing individuals have used directional antennas to
broadcast into competing locations
 Organizations have set up free hot spots
 Companies seeking to set up services for a fee have come into
conflict with community hotspots
 Some hot-spots in airports have become free
 WiFi spectrum overlaps with some Amateur Radio
 Amateurs use much more power
 Accidental cross access and cross interference have occurred
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Security Incidents
(What were you thinking?)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Information Leakage
 Information may leak from insecure wireless networks
 Networks may be routed over wireless links
 Information may leak in broadcast messages
 Attackers can use techniques such as “arp cache poisoning”
to intercept and redirect traffic
 Schools have had student data accidentally exposed through
wireless networks
 What's your legal liability?
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Threats to Reputation
 Wireless is easy to use for inappropriate activity
 Retail chains have used wireless for temporary cash




registers
Researchers have found insecure wireless nets
broadcasting sensitive customer information
Publication of wireless leaks have lead to major public
relations incidents for several companies
What if the researchers had been “bad guys”?
(Some have been)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Computer Break-ins
 Major hardware chain had an insecure wireless network in





Michigan
Intruders used it to break into the home office computers
in North Carolina
Law enforcement contacted but access not shut down
during investigation
Intruders were caught sitting in the parking lot during a
subsequent break-in
Intruder sentenced to 9 years in jail though he failed!
What about using a high gain directional antennas?
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Spammers
 Drive-by-spamming is taking place
 Spammers can send millions of E-Mails in minutes
 Your servers get blamed
 Your abuse people get harassed
 Your company gets blacklisted
 California man plead guilty to spamming people through
unprotected hotspots
 Convicted under Can-Spam Act
 What about wireless theft?
 Also being used to launch phishing scams
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Extortionists
 Extortionists have exploited open access points
 Maryland man used unsecured wireless networks to make
“untraceable” threats and extortion demands
 Threats traced to homes and a dentist's office
 Caught by his demand for money
 (Make the check payable to...)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Simple Bandwidth Theft
 Individual in Florida observes someone sitting in his
neighborhood playing with a laptop
 Individual hides laptop whenever people approach
 Individual still present several hours later
 Suspicious behavior reported to police
 Police find the suspicious individual using WiFi
 Charged with theft of bandwidth
 Other charges pending?
 Neighborhood watch?
 Coffee shop tired of non-customer in parking lot
 Asked to leave several times
 Charged with theft of bandwidth after several months
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Other Illegal Activities
 Canadian police caught an individual driving the wrong





way down a one-way residential street
Individual had wardriving equipment in the car
Individual had been exploiting open residential access
points to download child pornography
Additional charge: Theft of telecommunications
What if it was your access point?
How would you explain the network activity to law
enforcement?
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Denial of Service
 Various Denial of Service attacks possible
 “Omerta” disassociate attacks disconnect workstations
 Also useful in WPA-PSK attacks
 RF attacks overwhelm channels and spectrum
 Overpowered access points generate interference
 General congestion and channel crowding
 RF “Ping of Death”
 Unlicensed services are not protected from RF interference
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Access and Confidentiality
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Gateway Control
 Access control through an application gateway
 Use web site authentication to open a firewall
 Little or no link level security
 Wireless traffic may be sniffed
 Very common in hotels
 Very common in paid-for “hot spots”
 Somewhat common at universities
 Prone to “information leakage”
 Prone to MAC hijacking
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
MAC level access control
 Access granted based on MAC address
 No protection from sniffing
 MAC addresses may be spoofed or hijacked
 Business often have batches of MAC addresses
 Administrative headache to maintain MAC tables
 Does not scale well
 In really POOR implementations, multiple WiFi clients can
share MAC addresses and get away with it.
 MAC access control
 Block ICMP
 Use orthogonal activity (difference servers and services)
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
VLAN access control
 Combination of Gateway and MAC using VLANS
 VLAN assigned based on MAC address
 Gateway access control switches MAC between VLANS
 Scales much better than pure MAC level access
 Still has disadvantages of both
 No protection from sniffing
 MAC addresses may be spoofed or hijacked
 Business often have batches of MAC addresses
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
SSID Access Control
 SSID broadcast (Wi-Fi network name)
 Cloak a network by disabling SSID broadcast
 Network can still be probed and uncloaked
 Network traffic can still be sniffed
 SSID can be determined from other traffic
 Automated tools are designed to collect information about




cloaked networks
Useful for network selection control
Little use as access control
Can help with network selection control
Does indicate that this is NOT a public network
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
To SSID or Not To SSID
 Advantages to broadcasting SSID / ESSID
 Autodetection of Networks by workstations
 Disadvantages to broadcasting SSID / ESSID
 Closed network names appearing on foreign workstations
 Potential for accidental connections (if not encrypted)
 Advantages to NOT broadcasting SSID / ESSID
 Notice: “This network is not public”
 Accidental connections highly unlikely
 Disadvantages to NOT broadcasting SSID / ESSID
 Manual configuration of networks and workstations
 “False sense of security”
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
WEP
 Wire Equivalent Privacy
 IEEE standard adopted in 2000
 Simple shared key encryption
 40/56 bit DES (export grade - worthless)
 128 bit RC4
 Weakness unveiled in 2001 led to many attacks
 Design is vulnerable to plaintext codebook attacks
 Some implementations are extremely insecure
 Recent attacks effective against all variations
 Really poor design – even worse implementations
 Some older implementations worse than others
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
WPA
 Wireless Protected Access
 Based on subset of IEEE 802.11i draft
 WiFi Alliance interim specification
 Can use preshared keys (PSK – WPA Personal)
 Serious problems with weak passwords and PSK!
 Can use Radius / EAP / LEAP authentication
 Leap is vulnerable to known attacks (asleap)
 Uses stronger encryption and initialization vectors
 TKIP avoids IV codebook attacks
 Support is mandatory for Wi-Fi logo
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
802.11i / WPA2
 Security standard applicable to 802.11 family
 Application of 802.1X to 802.11 protocols
 Ratified by IEEE in mid 2004
 WiFi alliance brands 802.11i as WPA2
 Requires AES layer 2 encryption
 Fully encrypted WLAN
 Not all legacy cards can be supported
 Support for Windows XP/SP2 and Linux available
 Linux / *NIX – wpa_supplicant
 Generic 802.1X on Linux support - XSupplicant
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Virtual Private Networks
 Virtual Private Networks (VPNs) can provide secure
connections on insecure networks
 IPSec
 PPTP
 L2TP
 VPNs should be used in open environments for secure
access to private resources
 VPNs do not protect from threats or viruses on the open
network
 VPNs should be used with personal firewalls
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Securing Wireless Networks
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Securing your network
 Define your wireless policy in writing and enforce
 Don't use default settings!
 Change the SSID
 Disable SSID broadcast, if so desired
 Use WPA if possible (802.11i/WPA2 where available)
 Use WEP where WPA is not available
 Watch for rogue access points and eliminate
 Disable wireless where not used
 Disallow open connections
 Treat wireless networks as untrusted networks
 Keep access points and systems up to date!
 Employ a security tool such as ISS Proventia Desktop
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Physical Access
 Plan for physical (RF) access controls
 Reduce power to reduce leakage
 Use more access points for better defined coverage
 Plan antenna locations
 Avoid outer walls
 Provide for shielding of sensitive areas
 Provide spot coverage for weak areas
 Test for RF leakage and coverage
 Physical controls help, but are not the total answer!
 They can get better antennas
 They can boost more power
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Encryption and authentication
 What level(s) are necessary and/or sufficient?
 What is being protected?
 Confidentiality?
 Access?
 Link level
 WEP/WPA/WPA2
 VPN
 Application
 Multiple layers may be necessary
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Security on Open Networks
 Use a secure VPN to access private resources
 Use SSL encrypted versions of access protocols
 https instead of http
 pop3s instead of pop3
 imaps instead of imap
 Use a personal firewall or similar protection
 Use an intrusion protection system (IPS)
 ISS Proventia Desktop
 Scan for viruses
 Keep systems religiously up to date
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Securing WEP
 Use WEP only if nothing else better is available
 Use 128 bit encryption
 Test all access points for weak packets (Kismet)
 Consider changing shared access keys periodically or
when security situation changes
 Use with MAC controls on small networks
 Keep access points behind a firewall in a DMZ
 Assume the network is untrusted and provide for
additional security
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Securing WPA/WPA2
 Use WPA2 or WPA when ever available
 Use hardened authentication where possible
 Radius
 EAP
 Use strong passwords for WPA Pre-Shared Keys
 Minimum of 17 characters
 Include complex characters (numbers, caps, punctuation)
 It's easier to break weak passwords on WPA PSK than it is
to do codebook attacks on WEP!
 Avoid LEAP
 Known attacks
 Online attack tool: asleap
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Who Forgot to Invite the Cryptographers?
 Hardened crypto may not provide hardened security
 Flaws in algorithms
 Flaws in design
 Flaws in implementation
 WEP used RC4 – 128 bit cryptography
 Lots of design and implementation errors
 WPA was suppose to address flaws in WEP
 Still some serious problems in WPA-PSK
 SSL servers on APs may be using shared certificates
 Static shared certificates are worse than shared keys
 People can download firmware with certificates to your AP
 Dynamic, self-signed, certificates are better than shared certs
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Deception Tools
 Fake access points can befuddle war drivers
 Deception tools can detect intruders looking for access
 Access attempts to honeypot access points can trigger
alerts that intruders may be in the area
 Fake access points do no good if they are not monitored
and maintained!
 Generally not a worth-while investment unless you are
protecting a high profile target
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Closing
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Summary
 Wireless networking is inherently insecure
 Default configurations are insecure (but getting better)
 Wireless takes effort and direction to secure
 Wireless networks can be made secure
 Insecure networks can be used securely
 Simply throwing cryptography at it may not be the answer!
 You may need additional security tools on the workstation
 Be paranoid – They are out there and they are out to get you!
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Tools
 DD-WRT
 Linksys Info
 Kismet
 Airsnort
 BSD-Airtools
 THC-Wardrive
 Netstumbler
 AiroPeek
 Airmagnet
<http://www.dd-wrt.com>
<http://www.linksysinfo.org>
<http://www.kismetwireless.net>
<http://airsnort.shmoo.com>
<http://www.dachb0den.com>
<http://www.thc.org>
<http://stumbler.net>
<http://www.ig.com.au/AiroPeekMain.htm>
<http://www.airmagnet.com>
 FakeAP
<http://www.blackalchemy.to/project/fakeap>
 Wardriving CD
<http://www.wardrive.net/wardriving/tools>
 Proventia Desktop <http://www.iss.net>
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
Resources and References
 http://www.wittsend.com/mhw/2006/Wireless-Security-ALE
 http://www.informationheadquarters.com/Internet/WIFI.sht







ml
http://www.networkintrusion.co.uk/wireless.htm
http://www.usbwifi.orcon.net.nz/
http://www.wi-fi.org/
http://www.wifinetnews.com/
http://www.wi-fiplanet.com/
http://grouper.ieee.org/groups/802/11/
http://www.drizzle.com/~aboba/IEEE/
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.
www.iss.net
Wireless Security
August 10, 2006
Michael H. Warfield
[email protected]
[email protected]
© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.