SlideShare uma empresa Scribd logo
1 de 53
CompTIA Security+ Guide to
Network Security Fundamentals,
Fifth Edition
Chapter 9
Wireless Network Security
© Cengage Learning 2015
Objectives
• Describe the different types of wireless network
attacks
• List the vulnerabilities in IEEE 802.11 security
• Explain the solutions for securing a wireless
network
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
2
© Cengage Learning 2015
Wireless Attacks
• Several attacks can be directed against wireless
data system:
– Bluetooth attacks
– Near Field Communication (NFC) attacks
– Wireless local area network attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
3
© Cengage Learning 2015
Bluetooth Attacks
• Bluetooth
– Wireless technology that uses short-range radio
frequency (RF) transmissions
– Provides rapid ad-hoc, “on-the-fly” device pairings
• Example: smartphone and a Bluetooth mouse
– Personal Area Network (PAN) technology
• Two types of Bluetooth network topologies
– Piconet
– Scatternet
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
4
© Cengage Learning 2015
Bluetooth Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
5
© Cengage Learning 2015
Bluetooth Attacks
• Piconet
– Established when two Bluetooth devices come within
range of each other
– One device (master) controls all wireless traffic
– Other device (slave) takes commands
• Active slaves are sending transmissions
• Parked slaves are connected but not actively
participating
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
6
© Cengage Learning 2015
Bluetooth Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
7
© Cengage Learning 2015
Bluetooth Attacks
• Scatternet
– Group of piconets with connections between
different piconets
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
8
© Cengage Learning 2015
Bluetooth Attacks
• Bluejacking - an attack that sends unsolicited
messages to Bluetooth-enabled devices
– Text messages, images, or sounds
• Bluejacking is considered more annoying than
harmful
– No data is stolen
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
9
© Cengage Learning 2015
Bluetooth Attacks
• Bluesnarfing
– An attack that accesses unauthorized information
from a wireless device through a Bluetooth
connection
– Often between cell phones and laptops
– Attacker copies e-mails, contacts, or other data by
connecting to the Bluetooth device without owner’s
knowledge
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
10
© Cengage Learning 2015
Near Field Communication (NFC)
Attacks
• Near field communication (NFC)
– A set of standards primarily for smartphones and
smart cards that can be used to establish
communication between devices in close proximity
• NFC devices are used in contactless payment
systems
– A consumer can pay for a purchase by simply
tapping a store’s payment terminal with their
smartphone
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
11
© Cengage Learning 2015
Near Field Communication (NFC)
Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
12
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• A WLAN is designed to replace or supplement a
wired LAN
• It is important to know about the:
– History and specifications of IEEE WLANs
– Hardware necessary for a wireless network
– Different types of WLAN attacks directed at
enterprise and home users
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
13
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Institute of Electrical and Electronics Engineers
(IEEE) WLANS
– Most influential organization for computer networking
and wireless communications
– Dates back to 1884
– Began developing network architecture standards in
the 1980s
• 1997: release of IEEE 802.11
– Standard for wireless local area networks (WLANs)
– Higher speeds added in 1999: IEEE 802.11b
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
14
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• IEEE 802.11a
– Specifies maximum rated speed of 54Mbps using
the 5GHz spectrum
• IEEE 802.11g
– Preserves stable and widely accepted features of
802.11b and increases data transfer rates similar to
802.11a
• IEEE 802.11n
– Ratified in 2009
– Improvements: speed, coverage area, resistance to
interference, and strong security
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
15
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• IEEE 802.11ac
– Ratified in early 2014 and has data rates over 7
Gbps
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
16
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• WLAN Hardware
– Wireless client network interface card adapter
• Performs same functions as wired adapter
• Antenna sends and receives signals
– Access point (AP) major parts
• Antenna and radio transmitter/receiver send and
receive wireless signals
• Bridging software to interface wireless devices to
other devices
• Wired network interface allows it to connect by cable
to standard wired network
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
17
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• WLAN Hardware (cont’d)
– Access point (AP) functions
• Acts as “base station” for wireless network
• Acts as a bridge between wireless and wired networks
– Can connect to wired network by a cable
– Wireless broadband routers
• Single hardware device containing AP, firewall, router,
and DHCP server
• Also known as residential WLAN gateways
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
18
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
19
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• In a network, a well-defined boundary protects data
and resources
– Boundary is known as a “hard edge”
• The introduction of WLANs in enterprises has
changed hard edges to “blurred edges”
• Types of wireless attacks
– Rogue access points
– Evil twins
– Intercepting wireless data
– Wireless replay attacks and denial of service attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
20
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Rogue access point
– An unauthorized access point that allows an attacker
to bypass network security configurations
– Usually set up by an insider (employee)
– May be set up behind a firewall, opening the network
to attacks
• Evil twin
– AP set up by an attacker
– Attempts to mimic an authorized AP
– Attackers capture transmissions from users to evil
twin AP
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
21
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
22
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Intercepting Wireless Data
– Wireless traffic captured to decode and analyze
packet contents by using a protocol analyzer
– Network interface card (NIC) adapter must be in the
correct mode in order for data to be captured
• It is necessary for the wireless NIC to operate in
monitor mode so that it can capture frames without
first being associated with an AP
– Monitor mode is also called RF Monitor or RFMON
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
23
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Wireless Replay Attack
– Also known as “hijacking”
– A passive attack in which the attacker captures
transmitted wireless data, records it, and then sends
it on to the original recipient without the attacker’s
presence being detected
– Can be accomplished using an evil twin AP
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
24
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Wireless Denial of Service Attack
– RF jamming - attackers use intentional RF
interference to flood the RF spectrum with enough
interference to prevent a device from communicating
with the AP
– Spoofing - attackers craft a fictitious frame that
pretends to come from a trusted client when it
actually comes from the attacker
– Manipulating duration field values - attackers send a
frame with the duration field set to a high value,
preventing other devices from transmitting for that
period of time
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
25
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• Wireless Home Attacks - most home users fail to
configure any security on their home networks
• Attackers can:
– Steal data
– Read wireless transmissions
– Inject malware
– Download harmful content
• War driving
– Searching for wireless signals from an automobile or
on foot using a portable computing device
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
26
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
27
© Cengage Learning 2015
Wireless Local Area Network (WLAN)
Attacks
• War chalking
– Documenting and then advertising location of
wireless LANs for others to use
– Previously done by drawing on sidewalks or walls
around network area
– Today, locations are posted on Web sites
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
28
© Cengage Learning 2015
Vulnerabilities of IEEE 802.11 Security
• Original IEEE 802.11 committee recognized
wireless transmissions could be vulnerable
– Implemented several wireless security protections in
the standard
– Left others to WLAN vendor’s discretion
– Protections were vulnerable and led to multiple
attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
29
© Cengage Learning 2015
Wired Equivalent Privacy (WEP)
• IEEE 802.11 security protocol designed to ensure
that only authorized parties can view transmissions
– Encrypts plaintext into ciphertext
• Secret key is shared between wireless client device
and AP
• WEP vulnerabilities
– WEP can only use 64-bit or 128-bit number to
encrypt
• Initialization vector (IV) is only 24 of those bits
• Short length makes it easier to break
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
30
© Cengage Learning 2015
Wired Equivalent Privacy (WEP)
• WEP vulnerabilities (cont’d.)
– Violates cardinal rule of cryptography: avoid a
detectable pattern
• Attackers can see duplication when IVs start repeating
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
31
© Cengage Learning 2015
Wi-Fi Protected Setup (WPS)
• WPS is an optional means of configuring security
on WLANS
• Two common WPS methods:
– PIN method - utilizes a PIN printed on a sticker of
the wireless router or displayed through a software
wizard
• User enters Pin and security configuration
automatically occurs
– Push-button method - user pushes buttons and
security configuration takes place
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
32
© Cengage Learning 2015
Wi-Fi Protected Setup (WPS)
• Design and implementation flaws:
– There is no lockout limit for entering PINs
– The last PIN character is only a checksum
– The wireless router reports the validity of the first
and second halves of the PIN separately
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
33
© Cengage Learning 2015
MAC Address Filtering
• Method of controlling WLAN access
– Limit a device’s access to AP
• Media Access Control (MAC) address filtering
– Used by nearly all wireless AP vendors
– Permits or blocks device based on MAC address
• Vulnerabilities of MAC address filtering
– Addresses exchanged in unencrypted format
• Attacker can see address of approved device and
substitute it on his own device
– Managing large number of addresses is challenging
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
34
© Cengage Learning 2015
MAC Address Filtering
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
35
© Cengage Learning 2015
Disabling SSID Broadcasts
• Each device must be authenticated prior to
connecting to the WLAN
• Service Set Identifier (SSID)
– The user-supplied network name of a wireless
network; usually broadcast so that any device can
see it
• The broadcast can be restricted
• Some wireless security sources encourage users
to configure their APs to prevent the broadcast of
the SSID
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
36
© Cengage Learning 2015
Disabling SSID Broadcasts
• Not advertising the SSID only provides a weak
degree of security and has limitations:
– SSID can be discovered when transmitted in other
frames
– May prevent users from being able to freely roam
from one AP coverage area to another
– It’s not always possible to turn off SSID beaconing
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
37
© Cengage Learning 2015
Wireless Security Solutions
• A unified approach to WLAN security was needed
– IEEE and Wi-Fi Alliance began developing security
solutions
• Resulting standards used today
– IEEE 802.11i
– WPA and WPA2
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
38
© Cengage Learning 2015
Wi-Fi Protected Access (WPA)
• Introduced in 2003 by the Wi-Fi Alliance
• A subset of IEEE 802.11i
• Design goal: protect present and future wireless
devices
• Temporal Key Integrity Protocol (TKIP) Encryption
– Used in WPA
– Uses a longer 128 bit key than WEP
– Dynamically generated for each new packet
– Includes a Message Integrity Check (MIC), designed
to prevent man-in-the-middle attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
39
© Cengage Learning 2015
Wi-Fi Protected Access (WPA)
• Preshared Key (PSK) Authentication
– After AP configured, client device must have same
key value entered
– Key is shared prior to communication taking place
– Uses a passphrase to generate encryption key
• Must be entered on each AP and wireless device in
advance
– Not used for encryption
• Serves as starting point for mathematically generating
the encryption keys
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
40
© Cengage Learning 2015
Wi-Fi Protected Access (WPA)
• WPA Vulnerabilities
– Key management
• Key sharing is done manually without security
protection
• Keys must be changed on a regular basis
• Key must be disclosed to guest users
– Passphrases
• PSK passphrases of fewer than 20 characters subject
to cracking
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
41
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
• Second generation of WPA is known as WPA2
– Introduced in 2004
– Based on final IEEE 802.11i standard
– Allows wireless clients using TKIP to operate in the
same WLAN
• AES-CCMP Encryption
– Advanced Encryption Standard (AES) block cipher
– AES performs three steps on every block (128 bits) of
plaintext
• Within second step, multiple iterations are performed
• Bytes are substituted and rearranged
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
42
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
• AES-CCMP Encryption (cont’d)
– Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol (CCMP) is the
encryption protocol used for WPA2
• Specifies the use of CCM with AES
– The Cipher Block Chaining Message Authentication
Code (CBC-MAC) component of CCMP provides
data integrity and authentication
– Both CCMP and TKIP use a 128-bit key for
encryption
• Both methods use a 64-bit MIC value
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
43
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
• IEEE 802.1x authentication
– Originally developed for wired networks
– Provides greater degree of security by implementing
port-based authentication
– Blocks all traffic on a port-by-port basis until client is
authenticated
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
44
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
• Extensible Authentication Protocol (EAP)
– Created as a more secure alternative than CHAP
and PAP
– A framework for transporting authentication protocols
– Defines message format
– Uses four types of packets
• Request
• Response
• Success
• Failure
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
45
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
• Two common EAP protocols:
– Lightweight EAP (LEAP)
• A proprietary method developed by Cisco Systems
• Requires mutual authentication used for WLAN
encryption using Cisco client software
• Can be vulnerable to specific types of attacks
– No longer recommended by Cisco
– Protected EAP (PEAP)
• Simplifies deployment of 802.1x by using Microsoft
Windows logins and passwords
• Creates encrypted channel between client and
authentication server
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
46
© Cengage Learning 2015
Wi-Fi Protected Access 2 (WPA2)
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
47
© Cengage Learning 2015
Additional Wireless Security
Protections
• Captive Portal APs
– Uses a standard web browser to provide information
– Gives the wireless user the opportunity to agree to a
policy or present valid login credentials
• Rouge AP Discovery Tools - 4 types of wireless
probes can monitor airwaves for traffic:
– Wireless device probe
– Desktop probe
– Access point probe
– Dedicated probe
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
48
© Cengage Learning 2015
Additional Wireless Security
Protections
• Power level controls
– Some APs allow adjustment of the power level at
which the LAN transmits
– Reducing power allows less signal to reach outsiders
• Antennas
– AP should be located near center of coverage area
– Place high on a wall to reduce signal obstructions
and deter theft
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
49
© Cengage Learning 2015
Additional Wireless Security
Protections
• Site Surveys
– An in-depth examination and analysis of a wireless
LAN site
– Reasons for conducting a site survey
• Achieving the best possible performance from the
WLAN
• Determining the best location for APs
• Ensuring coverage area will fulfill the organization’s
requirements
• Map existing radio interference
• Enhance the security of a WLAN
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
50
© Cengage Learning 2015
Summary
• Bluetooth is a wireless technology using short-
range RF transmissions
• Near field communication (NFC) is a set of
standards primarily for smartphones and
smartcards used to communicate with devices in
close proximity
• IEEE has developed six wireless LAN standards to
date
• A rouge AP is an unauthorized AP that allows an
attacker to bypass network security and open the
network and its users to attacks
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
51
© Cengage Learning 2015
Summary
• IEEE 802.11 committee implemented several
wireless security protections in the 802.11 standard
– WEP and WPS, however, have significant design
and implementation flaws
• Wi-Fi Protected Access (WPA) and WPA2 have
become the foundations of wireless security today
• Extensible Authentication Protocol (EAP) is a
framework for transporting authentication protocols
by defining the format of the messages
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
52
© Cengage Learning 2015
Summary
• Other steps to protect a wireless network include:
– Captive portal APs
– Detecting rogue access points
– Access point power level adjustment
– Antenna positioning
– Conducting a site survey
CompTIA Security+ Guide to Network Security Fundamentals, Fifth
Edition
53

Mais conteúdo relacionado

Mais procurados

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 

Mais procurados (20)

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Network Security
Network SecurityNetwork Security
Network Security
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 

Destaque

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 ReviewAmy McMullin
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 ReviewAmy McMullin
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 ReviewAmy McMullin
 
How to hack the web
How to hack the webHow to hack the web
How to hack the webAmy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 

Destaque (20)

Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 15 Presentation
Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
A+ Chapter 3 Review
A+ Chapter 3 ReviewA+ Chapter 3 Review
A+ Chapter 3 Review
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
A+ Chapter 5 Review
A+ Chapter 5 ReviewA+ Chapter 5 Review
A+ Chapter 5 Review
 
A+ Chapter 4 Review
A+ Chapter 4 ReviewA+ Chapter 4 Review
A+ Chapter 4 Review
 
hacker culture
hacker culturehacker culture
hacker culture
 
How to hack the web
How to hack the webHow to hack the web
How to hack the web
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 

Semelhante a Chapter 9 PowerPoint

Chapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptxChapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptxNguynThnhLun62
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecuritySUBHAK25
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architectureLan & Wan Solutions
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYHari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYIGN MANTRA
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanZaibi Gondal
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
UETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesUETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesAgustin Argelich Casals
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks
 

Semelhante a Chapter 9 PowerPoint (20)

Chapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptxChapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptx
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access Architecture
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYHari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
UETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesUETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications Services
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1
 

Último

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Último (20)

Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

Chapter 9 PowerPoint

  • 1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 9 Wireless Network Security
  • 2. © Cengage Learning 2015 Objectives • Describe the different types of wireless network attacks • List the vulnerabilities in IEEE 802.11 security • Explain the solutions for securing a wireless network CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 2
  • 3. © Cengage Learning 2015 Wireless Attacks • Several attacks can be directed against wireless data system: – Bluetooth attacks – Near Field Communication (NFC) attacks – Wireless local area network attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 3
  • 4. © Cengage Learning 2015 Bluetooth Attacks • Bluetooth – Wireless technology that uses short-range radio frequency (RF) transmissions – Provides rapid ad-hoc, “on-the-fly” device pairings • Example: smartphone and a Bluetooth mouse – Personal Area Network (PAN) technology • Two types of Bluetooth network topologies – Piconet – Scatternet CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 4
  • 5. © Cengage Learning 2015 Bluetooth Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 5
  • 6. © Cengage Learning 2015 Bluetooth Attacks • Piconet – Established when two Bluetooth devices come within range of each other – One device (master) controls all wireless traffic – Other device (slave) takes commands • Active slaves are sending transmissions • Parked slaves are connected but not actively participating CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 6
  • 7. © Cengage Learning 2015 Bluetooth Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 7
  • 8. © Cengage Learning 2015 Bluetooth Attacks • Scatternet – Group of piconets with connections between different piconets CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 8
  • 9. © Cengage Learning 2015 Bluetooth Attacks • Bluejacking - an attack that sends unsolicited messages to Bluetooth-enabled devices – Text messages, images, or sounds • Bluejacking is considered more annoying than harmful – No data is stolen CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 9
  • 10. © Cengage Learning 2015 Bluetooth Attacks • Bluesnarfing – An attack that accesses unauthorized information from a wireless device through a Bluetooth connection – Often between cell phones and laptops – Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 10
  • 11. © Cengage Learning 2015 Near Field Communication (NFC) Attacks • Near field communication (NFC) – A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity • NFC devices are used in contactless payment systems – A consumer can pay for a purchase by simply tapping a store’s payment terminal with their smartphone CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 11
  • 12. © Cengage Learning 2015 Near Field Communication (NFC) Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
  • 13. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • A WLAN is designed to replace or supplement a wired LAN • It is important to know about the: – History and specifications of IEEE WLANs – Hardware necessary for a wireless network – Different types of WLAN attacks directed at enterprise and home users CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 13
  • 14. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Institute of Electrical and Electronics Engineers (IEEE) WLANS – Most influential organization for computer networking and wireless communications – Dates back to 1884 – Began developing network architecture standards in the 1980s • 1997: release of IEEE 802.11 – Standard for wireless local area networks (WLANs) – Higher speeds added in 1999: IEEE 802.11b CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 14
  • 15. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • IEEE 802.11a – Specifies maximum rated speed of 54Mbps using the 5GHz spectrum • IEEE 802.11g – Preserves stable and widely accepted features of 802.11b and increases data transfer rates similar to 802.11a • IEEE 802.11n – Ratified in 2009 – Improvements: speed, coverage area, resistance to interference, and strong security CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 15
  • 16. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • IEEE 802.11ac – Ratified in early 2014 and has data rates over 7 Gbps CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
  • 17. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • WLAN Hardware – Wireless client network interface card adapter • Performs same functions as wired adapter • Antenna sends and receives signals – Access point (AP) major parts • Antenna and radio transmitter/receiver send and receive wireless signals • Bridging software to interface wireless devices to other devices • Wired network interface allows it to connect by cable to standard wired network CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 17
  • 18. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • WLAN Hardware (cont’d) – Access point (AP) functions • Acts as “base station” for wireless network • Acts as a bridge between wireless and wired networks – Can connect to wired network by a cable – Wireless broadband routers • Single hardware device containing AP, firewall, router, and DHCP server • Also known as residential WLAN gateways CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 18
  • 19. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 19
  • 20. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • In a network, a well-defined boundary protects data and resources – Boundary is known as a “hard edge” • The introduction of WLANs in enterprises has changed hard edges to “blurred edges” • Types of wireless attacks – Rogue access points – Evil twins – Intercepting wireless data – Wireless replay attacks and denial of service attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 20
  • 21. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Rogue access point – An unauthorized access point that allows an attacker to bypass network security configurations – Usually set up by an insider (employee) – May be set up behind a firewall, opening the network to attacks • Evil twin – AP set up by an attacker – Attempts to mimic an authorized AP – Attackers capture transmissions from users to evil twin AP CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 21
  • 22. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 22
  • 23. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Intercepting Wireless Data – Wireless traffic captured to decode and analyze packet contents by using a protocol analyzer – Network interface card (NIC) adapter must be in the correct mode in order for data to be captured • It is necessary for the wireless NIC to operate in monitor mode so that it can capture frames without first being associated with an AP – Monitor mode is also called RF Monitor or RFMON CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 23
  • 24. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Wireless Replay Attack – Also known as “hijacking” – A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker’s presence being detected – Can be accomplished using an evil twin AP CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 24
  • 25. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Wireless Denial of Service Attack – RF jamming - attackers use intentional RF interference to flood the RF spectrum with enough interference to prevent a device from communicating with the AP – Spoofing - attackers craft a fictitious frame that pretends to come from a trusted client when it actually comes from the attacker – Manipulating duration field values - attackers send a frame with the duration field set to a high value, preventing other devices from transmitting for that period of time CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 25
  • 26. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • Wireless Home Attacks - most home users fail to configure any security on their home networks • Attackers can: – Steal data – Read wireless transmissions – Inject malware – Download harmful content • War driving – Searching for wireless signals from an automobile or on foot using a portable computing device CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 26
  • 27. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 27
  • 28. © Cengage Learning 2015 Wireless Local Area Network (WLAN) Attacks • War chalking – Documenting and then advertising location of wireless LANs for others to use – Previously done by drawing on sidewalks or walls around network area – Today, locations are posted on Web sites CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 28
  • 29. © Cengage Learning 2015 Vulnerabilities of IEEE 802.11 Security • Original IEEE 802.11 committee recognized wireless transmissions could be vulnerable – Implemented several wireless security protections in the standard – Left others to WLAN vendor’s discretion – Protections were vulnerable and led to multiple attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 29
  • 30. © Cengage Learning 2015 Wired Equivalent Privacy (WEP) • IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmissions – Encrypts plaintext into ciphertext • Secret key is shared between wireless client device and AP • WEP vulnerabilities – WEP can only use 64-bit or 128-bit number to encrypt • Initialization vector (IV) is only 24 of those bits • Short length makes it easier to break CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 30
  • 31. © Cengage Learning 2015 Wired Equivalent Privacy (WEP) • WEP vulnerabilities (cont’d.) – Violates cardinal rule of cryptography: avoid a detectable pattern • Attackers can see duplication when IVs start repeating CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 31
  • 32. © Cengage Learning 2015 Wi-Fi Protected Setup (WPS) • WPS is an optional means of configuring security on WLANS • Two common WPS methods: – PIN method - utilizes a PIN printed on a sticker of the wireless router or displayed through a software wizard • User enters Pin and security configuration automatically occurs – Push-button method - user pushes buttons and security configuration takes place CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 32
  • 33. © Cengage Learning 2015 Wi-Fi Protected Setup (WPS) • Design and implementation flaws: – There is no lockout limit for entering PINs – The last PIN character is only a checksum – The wireless router reports the validity of the first and second halves of the PIN separately CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 33
  • 34. © Cengage Learning 2015 MAC Address Filtering • Method of controlling WLAN access – Limit a device’s access to AP • Media Access Control (MAC) address filtering – Used by nearly all wireless AP vendors – Permits or blocks device based on MAC address • Vulnerabilities of MAC address filtering – Addresses exchanged in unencrypted format • Attacker can see address of approved device and substitute it on his own device – Managing large number of addresses is challenging CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 34
  • 35. © Cengage Learning 2015 MAC Address Filtering CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 35
  • 36. © Cengage Learning 2015 Disabling SSID Broadcasts • Each device must be authenticated prior to connecting to the WLAN • Service Set Identifier (SSID) – The user-supplied network name of a wireless network; usually broadcast so that any device can see it • The broadcast can be restricted • Some wireless security sources encourage users to configure their APs to prevent the broadcast of the SSID CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 36
  • 37. © Cengage Learning 2015 Disabling SSID Broadcasts • Not advertising the SSID only provides a weak degree of security and has limitations: – SSID can be discovered when transmitted in other frames – May prevent users from being able to freely roam from one AP coverage area to another – It’s not always possible to turn off SSID beaconing CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 37
  • 38. © Cengage Learning 2015 Wireless Security Solutions • A unified approach to WLAN security was needed – IEEE and Wi-Fi Alliance began developing security solutions • Resulting standards used today – IEEE 802.11i – WPA and WPA2 CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 38
  • 39. © Cengage Learning 2015 Wi-Fi Protected Access (WPA) • Introduced in 2003 by the Wi-Fi Alliance • A subset of IEEE 802.11i • Design goal: protect present and future wireless devices • Temporal Key Integrity Protocol (TKIP) Encryption – Used in WPA – Uses a longer 128 bit key than WEP – Dynamically generated for each new packet – Includes a Message Integrity Check (MIC), designed to prevent man-in-the-middle attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 39
  • 40. © Cengage Learning 2015 Wi-Fi Protected Access (WPA) • Preshared Key (PSK) Authentication – After AP configured, client device must have same key value entered – Key is shared prior to communication taking place – Uses a passphrase to generate encryption key • Must be entered on each AP and wireless device in advance – Not used for encryption • Serves as starting point for mathematically generating the encryption keys CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 40
  • 41. © Cengage Learning 2015 Wi-Fi Protected Access (WPA) • WPA Vulnerabilities – Key management • Key sharing is done manually without security protection • Keys must be changed on a regular basis • Key must be disclosed to guest users – Passphrases • PSK passphrases of fewer than 20 characters subject to cracking CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 41
  • 42. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) • Second generation of WPA is known as WPA2 – Introduced in 2004 – Based on final IEEE 802.11i standard – Allows wireless clients using TKIP to operate in the same WLAN • AES-CCMP Encryption – Advanced Encryption Standard (AES) block cipher – AES performs three steps on every block (128 bits) of plaintext • Within second step, multiple iterations are performed • Bytes are substituted and rearranged CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 42
  • 43. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) • AES-CCMP Encryption (cont’d) – Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used for WPA2 • Specifies the use of CCM with AES – The Cipher Block Chaining Message Authentication Code (CBC-MAC) component of CCMP provides data integrity and authentication – Both CCMP and TKIP use a 128-bit key for encryption • Both methods use a 64-bit MIC value CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 43
  • 44. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) • IEEE 802.1x authentication – Originally developed for wired networks – Provides greater degree of security by implementing port-based authentication – Blocks all traffic on a port-by-port basis until client is authenticated CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 44
  • 45. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) • Extensible Authentication Protocol (EAP) – Created as a more secure alternative than CHAP and PAP – A framework for transporting authentication protocols – Defines message format – Uses four types of packets • Request • Response • Success • Failure CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 45
  • 46. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) • Two common EAP protocols: – Lightweight EAP (LEAP) • A proprietary method developed by Cisco Systems • Requires mutual authentication used for WLAN encryption using Cisco client software • Can be vulnerable to specific types of attacks – No longer recommended by Cisco – Protected EAP (PEAP) • Simplifies deployment of 802.1x by using Microsoft Windows logins and passwords • Creates encrypted channel between client and authentication server CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 46
  • 47. © Cengage Learning 2015 Wi-Fi Protected Access 2 (WPA2) CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 47
  • 48. © Cengage Learning 2015 Additional Wireless Security Protections • Captive Portal APs – Uses a standard web browser to provide information – Gives the wireless user the opportunity to agree to a policy or present valid login credentials • Rouge AP Discovery Tools - 4 types of wireless probes can monitor airwaves for traffic: – Wireless device probe – Desktop probe – Access point probe – Dedicated probe CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 48
  • 49. © Cengage Learning 2015 Additional Wireless Security Protections • Power level controls – Some APs allow adjustment of the power level at which the LAN transmits – Reducing power allows less signal to reach outsiders • Antennas – AP should be located near center of coverage area – Place high on a wall to reduce signal obstructions and deter theft CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 49
  • 50. © Cengage Learning 2015 Additional Wireless Security Protections • Site Surveys – An in-depth examination and analysis of a wireless LAN site – Reasons for conducting a site survey • Achieving the best possible performance from the WLAN • Determining the best location for APs • Ensuring coverage area will fulfill the organization’s requirements • Map existing radio interference • Enhance the security of a WLAN CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 50
  • 51. © Cengage Learning 2015 Summary • Bluetooth is a wireless technology using short- range RF transmissions • Near field communication (NFC) is a set of standards primarily for smartphones and smartcards used to communicate with devices in close proximity • IEEE has developed six wireless LAN standards to date • A rouge AP is an unauthorized AP that allows an attacker to bypass network security and open the network and its users to attacks CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 51
  • 52. © Cengage Learning 2015 Summary • IEEE 802.11 committee implemented several wireless security protections in the 802.11 standard – WEP and WPS, however, have significant design and implementation flaws • Wi-Fi Protected Access (WPA) and WPA2 have become the foundations of wireless security today • Extensible Authentication Protocol (EAP) is a framework for transporting authentication protocols by defining the format of the messages CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 52
  • 53. © Cengage Learning 2015 Summary • Other steps to protect a wireless network include: – Captive portal APs – Detecting rogue access points – Access point power level adjustment – Antenna positioning – Conducting a site survey CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 53

Notas do Editor

  1. CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 9 Wireless Network Security
  2. Objectives Describe the different types of wireless network attacks List the vulnerabilities in IEEE 802.11 security Explain the solutions for securing a wireless network
  3. Wireless Attacks Several attacks can be directed against wireless data system: Bluetooth attacks Near Field Communication (NFC) attacks Wireless local area network attacks
  4. Bluetooth Attacks Bluetooth Wireless technology that uses short-range radio frequency (RF) transmissions Provides rapid ad-hoc, “on-the-fly” device pairings Example: smartphone and a Bluetooth mouse Personal Area Network (PAN) technology Two types of Bluetooth network topologies Piconet Scatternet
  5. Bluetooth Attacks Table 9-1 Bluetooth products
  6. Bluetooth Attacks Piconet Established when two Bluetooth devices come within range of each other One device (master) controls all wireless traffic Other device (slave) takes commands Active slaves are sending transmissions Parked slaves are connected but not actively participating
  7. Bluetooth Attacks Figure 9-1 Bluetooth piconet
  8. Bluetooth Attacks Scatternet Group of piconets with connections between different piconets Figure 9-2 Bluetooth scatternet
  9. Bluetooth Attacks Bluejacking - an attack that sends unsolicited messages to Bluetooth-enabled devices Text messages, images, or sounds Bluejacking is considered more annoying than harmful No data is stolen
  10. Bluetooth Attacks Bluesnarfing An attack that accesses unauthorized information from a wireless device through a Bluetooth connection Often between cell phones and laptops Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge
  11. Near Field Communication (NFC) Attacks Near field communication (NFC) A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity NFC devices are used in contactless payment systems A consumer can pay for a purchase by simply tapping a store’s payment terminal with their smartphone
  12. Near Field Communication (NFC) Attacks Table 9-2 NFC risks and defenses
  13. Wireless Local Area Network (WLAN) Attacks A WLAN is designed to replace or supplement a wired LAN It is important to know about the: History and specifications of IEEE WLANs Hardware necessary for a wireless network Different types of WLAN attacks directed at enterprise and home users
  14. Wireless Local Area Network (WLAN) Attacks Institute of Electrical and Electronics Engineers (IEEE) WLANS Most influential organization for computer networking and wireless communications Dates back to 1884 Began developing network architecture standards in the 1980s 1997: release of IEEE 802.11 Standard for wireless local area networks (WLANs) Higher speeds added in 1999: IEEE 802.11b
  15. Wireless Local Area Network (WLAN) Attacks IEEE 802.11a Specifies maximum rated speed of 54Mbps using the 5GHz spectrum IEEE 802.11g Preserves stable and widely accepted features of 802.11b and increases data transfer rates similar to 802.11a IEEE 802.11n Ratified in 2009 Improvements: speed, coverage area, resistance to interference, and strong security
  16. Wireless Local Area Network (WLAN) Attacks IEEE 802.11ac Ratified in early 2014 and has data rates over 7 Gbps Table 9-3 IEEE WLAN standards
  17. Wireless Local Area Network (WLAN) Attacks WLAN Hardware Wireless client network interface card adapter Performs same functions as wired adapter Antenna sends and receives signals Access point (AP) major parts Antenna and radio transmitter/receiver send and receive wireless signals Bridging software to interface wireless devices to other devices Wired network interface allows it to connect by cable to standard wired network
  18. Wireless Local Area Network (WLAN) Attacks WLAN Hardware (cont’d) Access point (AP) functions Acts as “base station” for wireless network Acts as a bridge between wireless and wired networks Can connect to wired network by a cable Wireless broadband routers Single hardware device containing AP, firewall, router, and DHCP server Also known as residential WLAN gateways
  19. Wireless Local Area Network (WLAN) Attacks Figure 9-4 Access point (AP) in WLAN
  20. Wireless Local Area Network (WLAN) Attacks In a network, a well-defined boundary protects data and resources Boundary is known as a “hard edge” The introduction of WLANs in enterprises has changed hard edges to “blurred edges” Types of wireless attacks Rogue access points Evil twins Intercepting wireless data Wireless replay attacks and denial of service attacks
  21. Wireless Local Area Network (WLAN) Attacks Rogue access point An unauthorized access point that allows an attacker to bypass network security configurations Usually set up by an insider (employee) May be set up behind a firewall, opening the network to attacks Evil twin AP set up by an attacker Attempts to mimic an authorized AP Attackers capture transmissions from users to evil twin AP
  22. Wireless Local Area Network (WLAN) Attacks Figure 9-7 Rogue access point and evil twin attacks
  23. Wireless Local Area Network (WLAN) Attacks Intercepting Wireless Data Wireless traffic captured to decode and analyze packet contents by using a protocol analyzer Network interface card (NIC) adapter must be in the correct mode in order for data to be captured It is necessary for the wireless NIC to operate in monitor mode so that it can capture frames without first being associated with an AP Monitor mode is also called RF Monitor or RFMON
  24. Wireless Local Area Network (WLAN) Attacks Wireless Replay Attack Also known as “hijacking” A passive attack in which the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker’s presence being detected Can be accomplished using an evil twin AP
  25. Wireless Local Area Network (WLAN) Attacks Wireless Denial of Service Attack RF jamming - attackers use intentional RF interference to flood the RF spectrum with enough interference to prevent a device from communicating with the AP Spoofing - attackers craft a fictitious frame that pretends to come from a trusted client when it actually comes from the attacker Manipulating duration field values - attackers send a frame with the duration field set to a high value, preventing other devices from transmitting for that period of time
  26. Wireless Local Area Network (WLAN) Attacks Wireless Home Attacks - most home users fail to configure any security on their home networks Attackers can: Steal data Read wireless transmissions Inject malware Download harmful content War driving Searching for wireless signals from an automobile or on foot using a portable computing device
  27. Wireless Local Area Network (WLAN) Attacks Table 9-4 War driving tools
  28. Wireless Local Area Network (WLAN) Attacks War chalking Documenting and then advertising location of wireless LANs for others to use Previously done by drawing on sidewalks or walls around network area Today, locations are posted on Web sites Figure 9-8 War chalking symbols
  29. Vulnerabilities of IEEE 802.11 Security Original IEEE 802.11 committee recognized wireless transmissions could be vulnerable Implemented several wireless security protections in the standard Left others to WLAN vendor’s discretion Protections were vulnerable and led to multiple attacks
  30. Wired Equivalent Privacy (WEP) IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmissions Encrypts plaintext into ciphertext Secret key is shared between wireless client device and AP WEP vulnerabilities WEP can only use 64-bit or 128-bit number to encrypt Initialization vector (IV) is only 24 of those bits Short length makes it easier to break
  31. Wired Equivalent Privacy (WEP) WEP vulnerabilities (cont’d.) Violates cardinal rule of cryptography: avoid a detectable pattern Attackers can see duplication when IVs start repeating
  32. Wi-Fi Protected Setup (WPS) WPS is an optional means of configuring security on WLANS Two common WPS methods: PIN method - utilizes a PIN printed on a sticker of the wireless router or displayed through a software wizard User enters Pin and security configuration automatically occurs Push-button method - user pushes buttons and security configuration takes place
  33. Wi-Fi Protected Setup (WPS) Design and implementation flaws: There is no lockout limit for entering PINs The last PIN character is only a checksum The wireless router reports the validity of the first and second halves of the PIN separately
  34. MAC Address Filtering Method of controlling WLAN access Limit a device’s access to AP Media Access Control (MAC) address filtering Used by nearly all wireless AP vendors Permits or blocks device based on MAC address Vulnerabilities of MAC address filtering Addresses exchanged in unencrypted format Attacker can see address of approved device and substitute it on his own device Managing large number of addresses is challenging
  35. MAC Address Filtering Figure 9-10 MAC address filtering
  36. Disabling SSID Broadcasts Each device must be authenticated prior to connecting to the WLAN Service Set Identifier (SSID) The user-supplied network name of a wireless network; usually broadcast so that any device can see it The broadcast can be restricted Some wireless security sources encourage users to configure their APs to prevent the broadcast of the SSID
  37. Disabling SSID Broadcasts Not advertising the SSID only provides a weak degree of security and has limitations: SSID can be discovered when transmitted in other frames May prevent users from being able to freely roam from one AP coverage area to another It’s not always possible to turn off SSID beaconing
  38. Wireless Security Solutions A unified approach to WLAN security was needed IEEE and Wi-Fi Alliance began developing security solutions Resulting standards used today IEEE 802.11i WPA and WPA2
  39. Wi-Fi Protected Access (WPA) Introduced in 2003 by the Wi-Fi Alliance A subset of IEEE 802.11i Design goal: protect present and future wireless devices Temporal Key Integrity Protocol (TKIP) Encryption Used in WPA Uses a longer 128 bit key than WEP Dynamically generated for each new packet Includes a Message Integrity Check (MIC), designed to prevent man-in-the-middle attacks
  40. Wi-Fi Protected Access (WPA) Preshared Key (PSK) Authentication After AP configured, client device must have same key value entered Key is shared prior to communication taking place Uses a passphrase to generate encryption key Must be entered on each AP and wireless device in advance Not used for encryption Serves as starting point for mathematically generating the encryption keys
  41. Wi-Fi Protected Access (WPA) WPA Vulnerabilities Key management Key sharing is done manually without security protection Keys must be changed on a regular basis Key must be disclosed to guest users Passphrases PSK passphrases of fewer than 20 characters subject to cracking
  42. Wi-Fi Protected Access 2 (WPA2) Second generation of WPA is known as WPA2 Introduced in 2004 Based on final IEEE 802.11i standard Allows wireless clients using TKIP to operate in the same WLAN AES-CCMP Encryption Advanced Encryption Standard (AES) block cipher AES performs three steps on every block (128 bits) of plaintext Within second step, multiple iterations are performed Bytes are substituted and rearranged
  43. Wi-Fi Protected Access 2 (WPA2) AES-CCMP Encryption (cont’d) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol used for WPA2 Specifies the use of CCM with AES The Cipher Block Chaining Message Authentication Code (CBC-MAC) component of CCMP provides data integrity and authentication Both CCMP and TKIP use a 128-bit key for encryption Both methods use a 64-bit MIC value
  44. Wi-Fi Protected Access 2 (WPA2) IEEE 802.1x authentication Originally developed for wired networks Provides greater degree of security by implementing port-based authentication Blocks all traffic on a port-by-port basis until client is authenticated
  45. Wi-Fi Protected Access 2 (WPA2) Extensible Authentication Protocol (EAP) Created as a more secure alternative than CHAP and PAP A framework for transporting authentication protocols Defines message format Uses four types of packets Request Response Success Failure
  46. Wi-Fi Protected Access 2 (WPA2) Two common EAP protocols: Lightweight EAP (LEAP) A proprietary method developed by Cisco Systems Requires mutual authentication used for WLAN encryption using Cisco client software Can be vulnerable to specific types of attacks No longer recommended by Cisco Protected EAP (PEAP) Simplifies deployment of 802.1x by using Microsoft Windows logins and passwords Creates encrypted channel between client and authentication server
  47. Wi-Fi Protected Access 2 (WPA2) Table 9-5 EAP protocols supported by WPA2 Enterprise
  48. Additional Wireless Security Protections Captive Portal APs Uses a standard web browser to provide information Gives the wireless user the opportunity to agree to a policy or present valid login credentials Rouge AP Discovery Tools - 4 types of wireless probes can monitor airwaves for traffic: Wireless device probe Desktop probe Access point probe Dedicated probe
  49. Additional Wireless Security Protections Power level controls Some APs allow adjustment of the power level at which the LAN transmits Reducing power allows less signal to reach outsiders Antennas AP should be located near center of coverage area Place high on a wall to reduce signal obstructions and deter theft
  50. Additional Wireless Security Protections Site Surveys An in-depth examination and analysis of a wireless LAN site Reasons for conducting a site survey Achieving the best possible performance from the WLAN Determining the best location for APs Ensuring coverage area will fulfill the organization’s requirements Map existing radio interference Enhance the security of a WLAN
  51. Summary Bluetooth is a wireless technology using short-range RF transmissions Near field communication (NFC) is a set of standards primarily for smartphones and smartcards used to communicate with devices in close proximity IEEE has developed six wireless LAN standards to date A rouge AP is an unauthorized AP that allows an attacker to bypass network security and open the network and its users to attacks
  52. Summary IEEE 802.11 committee implemented several wireless security protections in the 802.11 standard WEP and WPS, however, have significant design and implementation flaws Wi-Fi Protected Access (WPA) and WPA2 have become the foundations of wireless security today Extensible Authentication Protocol (EAP) is a framework for transporting authentication protocols by defining the format of the messages
  53. Summary Other steps to protect a wireless network include: Captive portal APs Detecting rogue access points Access point power level adjustment Antenna positioning Conducting a site survey