Module7 wireless security-b

506 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
506
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Module7 wireless security-b

  1. 1. Module 7 Wireless Security Module 7
  2. 2. Module Objectives <ul><li>This module will familiarize you with the following: </li></ul><ul><ul><li>Wi-Fi Security Issues </li></ul></ul><ul><ul><li>Bluetooth </li></ul></ul><ul><ul><li>Cell Phone Policy and Procedures </li></ul></ul>Module 7
  3. 3. Wireless Today <ul><li>Wi-Fi [Wireless Fidelity] </li></ul><ul><li>Bluetooth </li></ul><ul><li>Infrared </li></ul><ul><li>RFID </li></ul><ul><li>Satellite / Microwave </li></ul>
  4. 4. Wi-Fi <ul><li>802.11 </li></ul><ul><ul><li>b / g / a / n </li></ul></ul><ul><li>Modes </li></ul><ul><ul><li>Infrastructure </li></ul></ul><ul><ul><li>Ad-Hoc (Peer Mode) </li></ul></ul><ul><li>SSID </li></ul><ul><li>MAC Filtering </li></ul>
  5. 5. Wireless Networks
  6. 6. Wireless Issues <ul><li>Vulnerabilities </li></ul><ul><ul><li>Signal Availability </li></ul></ul><ul><ul><li>Easy access to signals </li></ul></ul><ul><ul><ul><li>Not much required ($ or equipment) </li></ul></ul></ul><ul><ul><li>Signal Frequency Congestion </li></ul></ul><ul><ul><ul><li>Microwave / Cordless Phone / Neighbor </li></ul></ul></ul><ul><ul><li>SSID Announce </li></ul></ul><ul><ul><li>False Security of Encryption </li></ul></ul>
  7. 7. Wireless Countermeasures <ul><li>User Awareness </li></ul><ul><li>Security Settings </li></ul><ul><ul><li>Confining the signal </li></ul></ul><ul><ul><li>Disguising the label (SSID) </li></ul></ul><ul><ul><li>Choosing allowed parties (MAC filter) </li></ul></ul><ul><ul><li>Hiding the data (Encryption) </li></ul></ul>
  8. 8. Wireless Trends <ul><li>Faster Speed </li></ul><ul><ul><li>802.11n / 802.16 (WiMax) </li></ul></ul><ul><li>Better Security </li></ul><ul><ul><li>Stronger Encryption </li></ul></ul><ul><ul><li>Authentication (802.1x) </li></ul></ul>
  9. 9. Wi-Fi Encryption <ul><li>WEP </li></ul><ul><li>WPA </li></ul><ul><li>WPA2 </li></ul><ul><li>EAP </li></ul>
  10. 10. Wi-Fi Risks <ul><li>Key Reuse (WEP is flawed) </li></ul><ul><li>Sniffing </li></ul><ul><li>Open Access (sniffed credentials) </li></ul><ul><li>Denial of Service [DoS] </li></ul><ul><li>Rogue Access Points </li></ul><ul><li>Improperly Configured APs </li></ul>
  11. 11. Wi-Fi Tools <ul><li>NetStumbler </li></ul><ul><li>Kismet </li></ul><ul><li>AirCrack </li></ul><ul><li>AirMagnet </li></ul><ul><li>SnifferPro </li></ul><ul><li>Ethereal </li></ul>
  12. 12. Handhelds <ul><li>Vulnerabilities </li></ul><ul><ul><li>Malware </li></ul></ul><ul><ul><li>Theft (Device or Data) </li></ul></ul><ul><ul><li>Exploit wireless signal </li></ul></ul><ul><ul><li>Denial of Service </li></ul></ul><ul><ul><li>HotSync </li></ul></ul>
  13. 13. Handheld Countermeasures <ul><li>Firewalls / Anti-Malware </li></ul><ul><li>Password protected </li></ul><ul><li>No unnecessary data storage </li></ul><ul><li>Encrypted transmissions </li></ul><ul><li>2-factor authentication </li></ul>101
  14. 14. Bluetooth <ul><li>List of applications </li></ul><ul><li>A typical Bluetooth mobile phone headset </li></ul><ul><li>More prevalent applications of Bluetooth include: </li></ul><ul><li>Wireless control of and communication between a mobile phone and a hands-free headset . This was one of the earliest applications to become popular. </li></ul><ul><li>Wireless networking between PCs in a confined space and where little bandwidth is required. </li></ul><ul><li>Wireless communications with PC input and output devices, the most common being the mouse , keyboard and printer . </li></ul><ul><li>Transfer of files between devices with OBEX . </li></ul><ul><li>Transfer of contact details, calendar appointments, and reminders between devices with OBEX. </li></ul><ul><li>Replacement of traditional wired serial communications in test equipment, GPS receivers , medical equipment, bar code scanners, and traffic control devices. </li></ul><ul><li>For controls where infrared was traditionally used. </li></ul><ul><li>Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices. </li></ul><ul><li>Two seventh-generation game consoles , Nintendo's Wii [4] and Sony's PlayStation 3 use Bluetooth for their respective wireless controllers. </li></ul><ul><li>Dial-up internet access on personal computer or PDA using a data-capable mobile phone as a modem. </li></ul>
  15. 15. Most important security weaknesses - Bluetooth <ul><li>Problems with E0 </li></ul><ul><li>Unit key </li></ul><ul><li>PIN </li></ul><ul><li>Problems with E1 </li></ul><ul><li>Location privacy </li></ul><ul><li>Denial of service attacks </li></ul>
  16. 16. Other weaknesses <ul><li>No integrity checks </li></ul><ul><li>No prevention of replay attacks </li></ul><ul><li>Man in the middle attacks </li></ul><ul><li>Turn off discovery </li></ul><ul><li>Sometimes: default = no security </li></ul><ul><li>… </li></ul>
  17. 17. Recommendations <ul><li>Never use unit keys!!!! </li></ul><ul><li>Use long and sufficiently random PINs </li></ul><ul><li>Always make sure security is turned on </li></ul><ul><li>… </li></ul>
  18. 18. Interesting solutions <ul><li>Replace E0 and E1 with AES </li></ul><ul><li>Use MACs to protect integrity </li></ul><ul><li>Pseudonyms </li></ul><ul><li>Identity based cryptography </li></ul>
  19. 19. Bluetooth Issues <ul><li>Hacking Movie(s) </li></ul>

×