Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation

  • 1,286 views
Uploaded on

Motorola Wireless Security Concerns. ...

Motorola Wireless Security Concerns.
Visit http://www.systemid.com/symbol/ for barcode equipments

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,286
On Slideshare
1,285
From Embeds
1
Number of Embeds
1

Actions

Shares
Downloads
16
Comments
0
Likes
0

Embeds 1

http://www.slashdocs.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Wireless changes that paradigm. Radio waves cannot be stopped by walls and doors. As soon as you connect a wireless Access Point to the intranet, any traffic sent wirelessly is now visible in the enterprise’s parking lot.  This introduces several new vulnerabilities that did not exist in the wired world. The most common problem is rogue wireless access. An employee or contractor might bring in an unauthorized AP and connect it to the intranet without enabling security. This rogue AP can then provide unrestricted access to hackers in the vicinity sniffing for open or poorly secured wireless APs. Similarly, authorized wireless APs may have weak security like WEP that can allow similar “behind the firewall” access to the sensitive enterprise internal network. Once on the “soft” internal network, hackers can mount several different attacks given the fact that intranets were designed to block attacks at the edge. Wireless also aggravates the “insider threat”. Users can connect their laptops to external wireless networks and bypass internet filters and enterprise proxy’s while being in the enterprise perimeter. Sometimes, laptops can simultaneous be connected to the wired and an unauthorized external wireless network. Many enterprises that have deployed wireless also have to deal with the support costs of managing and troubleshooting wireless connectivity and performance issues that are very different from wired access problems.
  • New School Method - Direct attacks on Wireless Clients using Cellphone Attack vector on any wifi enabled cell phone… Got a WiFi iPad, iPod, Mac? 
  • Captive portal doesn’t allow “access” until authenticated via the portal It does allow access to the wireless network, and provides an IP… What can I do with access to the local network? Unless PSPF is enabled, hacker can scan and target other users of the wireless network Exploit their laptop and steal credentials for other wireless networks (metasploit anyone?) Validate if portal ACL rules are properly prohibiting access Virtually every captive portal we tested was only controlling HTTP/HTTPS access to the Internet and internal networks We could ping, ssh, telnet, ftp, etc. without EVER authenticating to the portal!!!
  • Section Slide Example TITLE ALL CAPS ARIAL 44 PT BOLD, line spacing .8 lines. A divider slide can use a photo that bleeds all 3 edges of the right side of the slide. Recommended size of this imagery use is one-half of the slide width. Image can be swapped out using any brand image on www.motorolasolutionscollective.com …crop/size as needed. Directions on page 21.
  • More payment cards have been skimmed (financial details hijacked) as a result of PIN pads being replaced. Recent example: PIN pads replaced at a fast food chain to steal payment card details The breach occurred at a fast food chain in a busy part of Edmonton, Canada. A "Bluetooth" device was used in the phony PIN pads to transmit all the card details, using a wireless connection. The fraud was discovered when a large number of Edmonton cards started showing up with unusual activity in Montreal.”
  • Windows 7 (all versions - Starter through Ultimate) provide Virtual Wi-Fi with the operating the system, essentially allowing any desktop user to setup a Virtual Wireless Access Point This is not an adhoc network, but an actually virtual access point that behaves, lives, and breathes like an actual Access Point
  • The Motorola AirDefense solution provides 3 fundamental value additions for wireless LANs – robust security & wireless regulatory compliance, cost-effective centralized troubleshooting and performance management, and wireless infrastructure management.  <Read though the bullets>

Transcript

  • 1. THE THREAT OF WIRELESS AND EMERGING ATTACKS FEB 23, 2011 AIRDEFENSE SOLUTIONS, MOTOROLA SOLUTIONS
  • 2. AGENDA
    • COMMON WIRELESS NETWORK RISKS
    • EMERGING THREATS
    • RECOMMENDATIONS
  • 3. WIRELESS SECURITY CONCERNS INTERNET Server Muni Wi-Fi or Neighbors Network Edge Blurred New Attack Vectors ‘Behind’ the Firewall 1 Rogue AP Connected to Network (Network Breach) Hacker 3 Leaked Wired Traffic & Insertion (Data Leakage) Hotspot Evil Twin Mobile User 2 Hotspot Phishing (Data Leakage) 5 Users Bypassing Network Security Controls (Data Leakage/Network Backdoor) 4 Non-Compliant AP (Network Breach/Data Leakage/ Data Compromise)
  • 4. MOBILE WORKERS VULNERABILITIES Do I have wired & wireless on at the same time? Is my laptop probing for SSIDs not on the safe list? Are my employees using Municipal Wi-Fi? Am I connected to an insecure access point? Am I connected to a real hotspot connection? Am I connected to someone nearby in ad-hoc mode?
  • 5. HOTSPOT PHISHING/ EVIL TWIN & MORE
    • Attack Vector: Any Wi-Fi Enabled Device
    New Hotspot Phishing (Data Leakage) : + Mobile Devices
    • Direct attacks on Wireless Clients using Cellphone
    PalmPre with Hacked Mobile Hotspot
  • 6. COMPARING PACKETS
    • Comparing packets from Access Points versus Wireless Clients
    PalmPre sending beacons & probe responses 3 Naïve user Associates with Fake AP Laptop sends Probe Request AP provides IP address to User Scan laptop for vulnerabilities & compromise it 5 Use station as a launch pad 6 User Station Corporate Network Intruder Laptop 2 Fake AP responds with Probe Response
  • 7. SUMMARY OF 802.11 VULNERABILITIES Type Attacks Tools Reconnaissance
    • Rogue APs
    • Open/Misconfigured APs
    • Ad Hoc stations
    Netstumbler, Kismet, Wellenrighter Sniffing
    • WEP, WPA, LEAP cracking
    • Dictionary attacks
    • Leaky APs
    AirSnort, Wepcrack, Cowpatty, Wireshark, Cain, Ettercap Masquerade
    • MAC spoofing
    • AirSnarf/HotSpot attacks
    • Evil Twin/Wi-Phishing attacks
    AirSnarf, Hotspotter, HostAP, SMAC Insertion
    • Multicast/Broadcast injection
    • Routing cache poisoning
    • Man in the Middle attack
    Airpwn, WepWedgie, ChopChop, Vippr, irpass, CDPsniffer Denial-of-Service
    • Disassociation
    • Duration field spoofing
    • RF jamming
    AirJack, void11, Bugtraq, IKE-crack
  • 8. CAPTIVE PORTAL BYPASS – GUEST ACCESS
    • What can I do with access to the
    • local network?
    • Scan and target other users of the wireless network
    • Exploit laptops and steal credentials for other wireless networks
    • Validate if portal ACL rules are properly prohibiting access
    • Ping, ssh, telnet, ftp, etc. without EVER authenticating to the portal
    WAN Appsvr1.corp.com 10.5.1.15 IP: 192.168.1.45 DNS: 10.5.1.10 Appsvr1.corp.com Credit card system exposed to the wireless network! !
  • 9. EMERGING ATTACK VECTORS
  • 10. PINPAD SWAPPING: BLUETOOTH
      • Bluetooth Specs:
      • All Bluetooth devices operate at the 2.4 GHz band
      • Bluetooth defines 79 channels for communication on the 2.4 GHz band each channel being separated by 1 MHz
      • The frequency range 2.402 GHz - 2.480 GHz
      • Allows for 1600 frequency hops per second
    Class Maximum Permitted Power Range (approximate) mW dBm Class 1 100 20 ~100 meters Class 2 2.5 4 ~10 meters Class 3 1 0 ~1 meters
  • 11. WINDOWS 7 VIRTUAL WI-FI
    • Setup at the DOS Prompt & Share either a Wired or Wireless connection
    • The user can share their own desktop (like an ad-hoc network) & the user can share their network connection with others
    • Wireless network may use authentication and encryption, BUT the user can share that connection with others, allowing those users to connect to the corporate network with weaker authentication & encryption
  • 12.
    • Comparing packets from Access Points versus Wireless Clients
    WINDOWS 7 – COMPARING PACKETS Intruder Laptop 2 Win7 responds with Probe Response Laptop sends Probe Request 1 Win7 provides IP address to User 3 Intruder on Network 4 User Station Corporate Network
  • 13. INCIDENT RESPONSE & FORENSIC ANALYSIS
    • Historical
    • Device logs/syslog
    • Firewall logs (Wireless Switches, APs, Wired Firewall)
    • Wireless IDS alarms, events, logs
    • Wired IDS alarms, events, logs
    • Remnants on wireless clients (registry, saved wireless networks, etc.)
    • Live
    • Wired Sniffing
    • Wireless Sniffing
    • Spectrum Analysis
    • Bluetooth
    • RF Analysis, Heat Maps/Location Tracking
    • Live analysis on IPS, WIPS, Firewalls, etc.
    • Roaming behavior (AP to AP, or client to client )
    • Others…
    Sources for Analyzing Wireless Attacks
  • 14. MOTOROLA AIRDEFENSE SOLUTION Ensure Security and Comply with Regulatory & Industry Requirements Centrally Control and Monitor WLAN Infrastructure with One Management Console Infrastructure Management Network Assurance Managed Services Advanced Services Solutions for Any WLAN Allows Remote Troubleshooting and Proactive Analysis of Wireless Issues Security & Compliance
  • 15. THANK YOU…