SlideShare a Scribd company logo
1 of 14
Download to read offline
WIRELESS	
  AND	
  	
  
INFRASTRUCTURE	
  SECURITY	
  101	
  
Why Care About Wireless
Security?
Speed!
•  Fewer services, less noise in the pipe means better network throughput
Stability of the network
•  Wireless is visible and becoming mission critical to the classroom
Unintentional harm to others
•  Credentials collection
•  Malware risks
•  Permitting spam relays or other unauthorized access

Legal liability
•  You might lose your access to the internet (ISP could yank your plug)
•  Illicit traffic traced to or from your district! (putting you on ban lists)
•  Personal media downloads (movies) could get district sued
•  Potential Loss of future Erate funds if you violate CIPA
How Vulnerable Am I?
LOTS of devices (1 billion by 2015) make big target
•  Android is built on 80 open source libraries and programs w/ known
exploits
! SymbOS/Zitmo.A and Android/Geinimi
•  Ipad/Iphone is vulnerable to PDF and Browser exploits
•  Old tricks like bluejacking (sending txt for $$$)
•  and bluesnarfing data are still out there, especially for older phones
	
  
Bad guys are out there.
•  Fake Netflix app for Android captured passwords and accounts
•  Jailbreak 8.1.2 for Iphone – rootkits your iphone in 20 seconds
•  Public Wifi - Firesheep can see your SSL sessions and take them over
! http://www.youtube.com/watch?v=zi2r7oVLUEc
! fix via https everywhere or vpn fixes, blacksheep detector
! Facesniff does the same thing for android
•  WAPs make man-in-the-middle attacks invisible to users
•  They make $$$ doing this
! Accounts and bank data, spam hosting, click fraud, ID theft
	
  
Finding Balance
Licensed	
  for	
  use	
  through	
  ar1zans.com	
  
WAP setup Hints
Use the security options you have
•  Activate WPA2 (user isolation). WEP allows sniffing across the SSID.
•  Change ALL of the default management passwords, record the changes!
•  Turn off SNMP management on exposed interfaces
•  Change the SSID’s name. Hiding the SSID actually broadcasts a “where are you
beacon” from configured clients
•  Only allow your wireless devices (certificates!)
Plan antenna placement
•  Manage for coverage and interference
•  Place it central to the area you want to cover
•  Don’t assume just because you can’t detect it, that hackers can’t
Disable ‘extra’ services
•  Disable FTP, HTTP and other extra services on multi-function routers
•  Disable remote WAN management
•  Disable UPnP
Update firmware
•  Manufacturers frequently release better ways to secure your system
•  Take the free updates - you have little to lose, and you might even gain some
throughput
Alphabet Soup
What Options Do I have? From least trusted to best.
•  WEP/WEP2 – widely used, easy to break, “retired” in 2004. 64 bit. (awful!)
•  WPA/PSK – Preshared key WPA. 256 bit. Keys static, guessable (bad!)
•  WPA/TKIP – Temporal Key WPA. 256 bit. Keys change (good!)
•  WPA/AES – Advanced Encryption WPA. 256 bit. (Better)
•  WPA2/AES – Advanced Encryption WPA2. 256 bit. (BEST!)
Other Concerns:
•  WPS (Wi-Fi protected setup) – easy avenue of attack
•  WPA/TKIP is backwards compatible and has some WEP-like exploits
•  MAC addresses are easily spoofed (just type it in, once you see it)
•  Hidden SSID’s actually create “where are you” broadcasts from the clients!
•  SSID spoofing happens – any domain admins using 802.1x?
•  LEAP is ok for guest traffic, but allows for easily guessed passwords
The Password Game
Passwords and Encryption
•  Enable Passwords and local encryption on mobile devices
•  Leverage activesync and MDM management policies
•  Use DIFFERENT passwords for various admin functions and
segments
•  Force SSL/SSH for activesync and other interlinks
Use everything that’s available to you
•  Use rogue detection and manage it.
•  Do you have an AV client available for mobile devices?
•  New tools allow separation of company vs personal apps and data
•  Review logs
•  AAA - Authentication, Authorization and Accounting in Enterprise
configs
who are you?
what’s your password?
do I really want to let you do that?
let's keep records, shall we?
Dead on Arrival
Patch and update everything both infrastructure & mobile
•  Even Cisco has seen vulnerabilities in embedded software

(Open SSH exploits, SNMP DOS attacks, 6500 blades wRPC exploits)
Change ALL default configurations
•  Change your default passwords, snmp keys, SSIDs, whatever you can
•  Disable Services that should NOT be auto-enabled
•  Enable Services that should be auto-enabled (like password-encryption)
•  Make it hard for the bad guy to ‘guess’ his way in
•  Don’t use *anything* right out of the box - especially not network hardware.
•  Do this for hardware AND software (out of the box isn’t secure by default)
Unmanaged and stand-alone AP’s
•  Management is difficult but not impossible with tools like airwave
•  Avoid WEP (use WPA2)
•  Limited Authentication options
•  Rotate keys periodically
•  Consider sourcing DHCP centrally, protect/mitigate via switch *dhcp snooping*

Policies and Procedures
Leverage your Network Use Policies
•  Document password requirement
•  Get signature to allow remote wipe of mobile devices
•  Consider enabling multiple bad password auto-wipe
•  Document forensic access requirement
•  Require VPN for FERPA student data including nurse traffic
•  Remind Users re: liability as they authorize license agreements 4 apps
•  Extend your *existing* agreements – it’s like a tiny PC
•  Policy should include something about theft reporting
•  Warn users about the dangers of open WiFi connections
Sanity Check
Deny first, allow later
•  You wouldn’t tell your child to allow everyone in the door without permission, so
why allow your network to do so?
-  turn off services you don’t need
-  don’t use ‘DMZ’ firewall ports on SoHo gear, open ONLY the ports you need
-  use a hardware or software firewall for the wireless traffic
Use multiple layers of protection for Wireless segment
•  A password is good
•  A firewall plus a password is even better
Think of it like birth control.
More protection methods decrease your risk.
Keep an eye out & make backups
•  Audit your logs, follow up on suspicious messages, compare to your baseline
•  Ignorance is NOT bliss – it’s an invitation to disaster
•  Make backups of your policies and your device configs.
Task List for the Backbone
Limit access via Guest/Quarantine or Wireless DMZ networks
"  craft ACL to limit exposure
"  disable services you don’t need (cdp, http server, etc.)
"  Portals are only as solid as YOU craft them
Protect your infrastructure on exposed VLANS
"  password protect your VTP domain (or equiv)
"  password protect your routed protocols (EIGRP, OSPF, etc.)
"  Block broadcasting of infrastructure routing to Wireless networks
"  Lock critical MAC addresses to specific ports (avoid spoofing)
Configure auditing/tracking/logging on exposed devices
"  enable NTP
"  enable AAA (Authentication/Authorization/Accounting)
"  enable syslogs
"  display warning banners
Shun bad traffic
"  Null-route illegal traffic (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16,127.0.0.0/8 etc.)
"  Use NBAR controls to eat in-line http attacks
Advanced Suggestions
Create filters for routed protocols
•  Make sure the interfaces are set passive where possible (routes out)
•  Don’t listen to updates from hosts you don’t trust (routes in)
•  HSRP is a protocol you should password protect too. Where possible protect
exposure of routing hardware and protocols to guests.
Baseline your organization
•  Set up MRTG graphs so you know what ‘normal’ looks like
•  Set up a sniffer while it looks ‘normal’ so you have something to compare to
Intrusion Detection
•  Leverage WAP Rogue detection and stay current
•  Install Intrusion Detection software on exposed servers to wireless
•  Consider leveraging Blacksheep to detect Firesheep and Facesniff use
•  Force https for ALL traffic where possible
•  Warn users about risk for open SSIDs
•  Watch for unusual traffic from single MAC addresses (>100 connections)
Virtual Networks, Virtual Servers, and SDN
•  These bring new, sometimes unseen networks and critical traffic you may want
to protect into your environment – think backplane
Closing Thoughts
Keep it simple:
A – AAA, Authenticate, Authorize and Audit
B – Be Careful, check your assumptions
C – Change defaults
D – Detect and Deny unwanted hosts/traffic
E – Educate your users so they can protect themselves
Questions? Comments?
References:
Wireless Security:
http://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-
or-both/
http://www.zdnet.com/article/the-six-dumbest-ways-to-secure-a-wireless-lan/
Attack vectors for routers:
http://www.securite.org/presentations/secip/
Router and Switch Security Configuration Guide, NSA
https://www.nsa.gov/ia/_files/switches/switch-guide-version1_01.pdf
https://www.nsa.gov/ia/_files/routers/c4-040r-02.pdf
Improving Security on Cisco Routers
http://www.cisco.com/warp/public/707/21.html
Cartoon - Graham Harrop
http://zone.artizans.com

More Related Content

What's hot

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 

What's hot (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Data security
Data securityData security
Data security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Software security
Software securitySoftware security
Software security
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
IT security
IT securityIT security
IT security
 
Information security
Information securityInformation security
Information security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 

Similar to WIRELESS AND INFRASTRUCTURE SECURITY 101

How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementTapas Shome
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure InfrastructuresPROIDEA
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 

Similar to WIRELESS AND INFRASTRUCTURE SECURITY 101 (20)

How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Flipping the script
Flipping the scriptFlipping the script
Flipping the script
 
Myles firewalls
Myles firewallsMyles firewalls
Myles firewalls
 
2012 ah apj wlan security fundamentals
2012 ah apj   wlan security fundamentals2012 ah apj   wlan security fundamentals
2012 ah apj wlan security fundamentals
 
Topic22
Topic22Topic22
Topic22
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Securityic2
Securityic2Securityic2
Securityic2
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 

Recently uploaded

presentation about microsoft power point
presentation about microsoft power pointpresentation about microsoft power point
presentation about microsoft power pointchhavia330
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Pooja Nehwal
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhisoniya singh
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)kojalkojal131
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...Amil baba
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...motiram463
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...tanu pandey
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 

Recently uploaded (20)

presentation about microsoft power point
presentation about microsoft power pointpresentation about microsoft power point
presentation about microsoft power point
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
young call girls in Sainik Farm 🔝 9953056974 🔝 Delhi escort Service
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 

WIRELESS AND INFRASTRUCTURE SECURITY 101

  • 1. WIRELESS  AND     INFRASTRUCTURE  SECURITY  101  
  • 2. Why Care About Wireless Security? Speed! •  Fewer services, less noise in the pipe means better network throughput Stability of the network •  Wireless is visible and becoming mission critical to the classroom Unintentional harm to others •  Credentials collection •  Malware risks •  Permitting spam relays or other unauthorized access
 Legal liability •  You might lose your access to the internet (ISP could yank your plug) •  Illicit traffic traced to or from your district! (putting you on ban lists) •  Personal media downloads (movies) could get district sued •  Potential Loss of future Erate funds if you violate CIPA
  • 3. How Vulnerable Am I? LOTS of devices (1 billion by 2015) make big target •  Android is built on 80 open source libraries and programs w/ known exploits ! SymbOS/Zitmo.A and Android/Geinimi •  Ipad/Iphone is vulnerable to PDF and Browser exploits •  Old tricks like bluejacking (sending txt for $$$) •  and bluesnarfing data are still out there, especially for older phones   Bad guys are out there. •  Fake Netflix app for Android captured passwords and accounts •  Jailbreak 8.1.2 for Iphone – rootkits your iphone in 20 seconds •  Public Wifi - Firesheep can see your SSL sessions and take them over ! http://www.youtube.com/watch?v=zi2r7oVLUEc ! fix via https everywhere or vpn fixes, blacksheep detector ! Facesniff does the same thing for android •  WAPs make man-in-the-middle attacks invisible to users •  They make $$$ doing this ! Accounts and bank data, spam hosting, click fraud, ID theft  
  • 4. Finding Balance Licensed  for  use  through  ar1zans.com  
  • 5. WAP setup Hints Use the security options you have •  Activate WPA2 (user isolation). WEP allows sniffing across the SSID. •  Change ALL of the default management passwords, record the changes! •  Turn off SNMP management on exposed interfaces •  Change the SSID’s name. Hiding the SSID actually broadcasts a “where are you beacon” from configured clients •  Only allow your wireless devices (certificates!) Plan antenna placement •  Manage for coverage and interference •  Place it central to the area you want to cover •  Don’t assume just because you can’t detect it, that hackers can’t Disable ‘extra’ services •  Disable FTP, HTTP and other extra services on multi-function routers •  Disable remote WAN management •  Disable UPnP Update firmware •  Manufacturers frequently release better ways to secure your system •  Take the free updates - you have little to lose, and you might even gain some throughput
  • 6. Alphabet Soup What Options Do I have? From least trusted to best. •  WEP/WEP2 – widely used, easy to break, “retired” in 2004. 64 bit. (awful!) •  WPA/PSK – Preshared key WPA. 256 bit. Keys static, guessable (bad!) •  WPA/TKIP – Temporal Key WPA. 256 bit. Keys change (good!) •  WPA/AES – Advanced Encryption WPA. 256 bit. (Better) •  WPA2/AES – Advanced Encryption WPA2. 256 bit. (BEST!) Other Concerns: •  WPS (Wi-Fi protected setup) – easy avenue of attack •  WPA/TKIP is backwards compatible and has some WEP-like exploits •  MAC addresses are easily spoofed (just type it in, once you see it) •  Hidden SSID’s actually create “where are you” broadcasts from the clients! •  SSID spoofing happens – any domain admins using 802.1x? •  LEAP is ok for guest traffic, but allows for easily guessed passwords
  • 7. The Password Game Passwords and Encryption •  Enable Passwords and local encryption on mobile devices •  Leverage activesync and MDM management policies •  Use DIFFERENT passwords for various admin functions and segments •  Force SSL/SSH for activesync and other interlinks Use everything that’s available to you •  Use rogue detection and manage it. •  Do you have an AV client available for mobile devices? •  New tools allow separation of company vs personal apps and data •  Review logs •  AAA - Authentication, Authorization and Accounting in Enterprise configs who are you? what’s your password? do I really want to let you do that? let's keep records, shall we?
  • 8. Dead on Arrival Patch and update everything both infrastructure & mobile •  Even Cisco has seen vulnerabilities in embedded software
 (Open SSH exploits, SNMP DOS attacks, 6500 blades wRPC exploits) Change ALL default configurations •  Change your default passwords, snmp keys, SSIDs, whatever you can •  Disable Services that should NOT be auto-enabled •  Enable Services that should be auto-enabled (like password-encryption) •  Make it hard for the bad guy to ‘guess’ his way in •  Don’t use *anything* right out of the box - especially not network hardware. •  Do this for hardware AND software (out of the box isn’t secure by default) Unmanaged and stand-alone AP’s •  Management is difficult but not impossible with tools like airwave •  Avoid WEP (use WPA2) •  Limited Authentication options •  Rotate keys periodically •  Consider sourcing DHCP centrally, protect/mitigate via switch *dhcp snooping*

  • 9. Policies and Procedures Leverage your Network Use Policies •  Document password requirement •  Get signature to allow remote wipe of mobile devices •  Consider enabling multiple bad password auto-wipe •  Document forensic access requirement •  Require VPN for FERPA student data including nurse traffic •  Remind Users re: liability as they authorize license agreements 4 apps •  Extend your *existing* agreements – it’s like a tiny PC •  Policy should include something about theft reporting •  Warn users about the dangers of open WiFi connections
  • 10. Sanity Check Deny first, allow later •  You wouldn’t tell your child to allow everyone in the door without permission, so why allow your network to do so? -  turn off services you don’t need -  don’t use ‘DMZ’ firewall ports on SoHo gear, open ONLY the ports you need -  use a hardware or software firewall for the wireless traffic Use multiple layers of protection for Wireless segment •  A password is good •  A firewall plus a password is even better Think of it like birth control. More protection methods decrease your risk. Keep an eye out & make backups •  Audit your logs, follow up on suspicious messages, compare to your baseline •  Ignorance is NOT bliss – it’s an invitation to disaster •  Make backups of your policies and your device configs.
  • 11. Task List for the Backbone Limit access via Guest/Quarantine or Wireless DMZ networks "  craft ACL to limit exposure "  disable services you don’t need (cdp, http server, etc.) "  Portals are only as solid as YOU craft them Protect your infrastructure on exposed VLANS "  password protect your VTP domain (or equiv) "  password protect your routed protocols (EIGRP, OSPF, etc.) "  Block broadcasting of infrastructure routing to Wireless networks "  Lock critical MAC addresses to specific ports (avoid spoofing) Configure auditing/tracking/logging on exposed devices "  enable NTP "  enable AAA (Authentication/Authorization/Accounting) "  enable syslogs "  display warning banners Shun bad traffic "  Null-route illegal traffic (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16,127.0.0.0/8 etc.) "  Use NBAR controls to eat in-line http attacks
  • 12. Advanced Suggestions Create filters for routed protocols •  Make sure the interfaces are set passive where possible (routes out) •  Don’t listen to updates from hosts you don’t trust (routes in) •  HSRP is a protocol you should password protect too. Where possible protect exposure of routing hardware and protocols to guests. Baseline your organization •  Set up MRTG graphs so you know what ‘normal’ looks like •  Set up a sniffer while it looks ‘normal’ so you have something to compare to Intrusion Detection •  Leverage WAP Rogue detection and stay current •  Install Intrusion Detection software on exposed servers to wireless •  Consider leveraging Blacksheep to detect Firesheep and Facesniff use •  Force https for ALL traffic where possible •  Warn users about risk for open SSIDs •  Watch for unusual traffic from single MAC addresses (>100 connections) Virtual Networks, Virtual Servers, and SDN •  These bring new, sometimes unseen networks and critical traffic you may want to protect into your environment – think backplane
  • 13. Closing Thoughts Keep it simple: A – AAA, Authenticate, Authorize and Audit B – Be Careful, check your assumptions C – Change defaults D – Detect and Deny unwanted hosts/traffic E – Educate your users so they can protect themselves
  • 14. Questions? Comments? References: Wireless Security: http://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip- or-both/ http://www.zdnet.com/article/the-six-dumbest-ways-to-secure-a-wireless-lan/ Attack vectors for routers: http://www.securite.org/presentations/secip/ Router and Switch Security Configuration Guide, NSA https://www.nsa.gov/ia/_files/switches/switch-guide-version1_01.pdf https://www.nsa.gov/ia/_files/routers/c4-040r-02.pdf Improving Security on Cisco Routers http://www.cisco.com/warp/public/707/21.html Cartoon - Graham Harrop http://zone.artizans.com