Your SlideShare is downloading. ×
  • Like
  • Save
Wireless Security
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Wireless Security


Wireless Security : A False Sense of Security @ BarCamp Melaka. Made/Presented by Ahmad Siddiq b. Mohd Adnan

Wireless Security : A False Sense of Security @ BarCamp Melaka. Made/Presented by Ahmad Siddiq b. Mohd Adnan

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Wireless Security: A False Sense of Security
    BarCamp Melaka – 14th November 2009
  • 2. Introduction
    A false sense of security is worse than a true sense of insecurity
  • 3. Me
    Ahmad Siddiqb. MohdAdnan
    CCNA, MCSE, Red Hat Trainer. Asia Talk Sdn. Bhd.
    Guide young Jedi’s how to deal with cables, switches and servers
  • 4. IEEE 802.11 Introduction
    Wireless Security: A False Sense of Security
  • 5. How 802.11 Works
    Designed to integrate easily with existing wired networks
    802.11 uses CSMA/CA to access the medium
    Each device has a unique 48bit MAC address just like the 802.3 Ethernet
  • 6. 802.11 Modes of Communication
    All client adapters associate with the Access point.
    Each client adapter only communicates with the Access Point
    Wireless client adapters communicate with each other directly
  • 7. Nature of The Medium
    Unlike on wired networks, all communications are essentially broadcasts
    This makes passive sniffing and MITM easier
    Therefore encryption of data is key to secure communication
  • 8. WiFiProfileration
    Source: WiFi Alliance,
  • 9. Attack Hierarchy
    Denial Of Service
    Traffic Analysis
    Message Modification
  • 10. Securi..what?
    Wireless Security: A False Sense of Security
  • 11. Wi-Fi is No Exception
    Wi-Fi throws new pieces in the information security puzzle
    • Signal spillage outside building
    • 12. Threats operative below Layer 3
    • 13. Wired firewalls, IDS/IPS, anti-virus ineffective against Wi-Fi threats
  • Incorrect Views of Wi-Fi Security
    Dude check this shit out. I have this cool Cisco hardware firewall and some slick IDS installed on my LAN. I also have some kind of Anti-Virus installed, and hence I am already been protected.
  • 14. 802.11 Inbuilt Security
    Wired Equivalent Privacy (WEP)
    Uses RC4 Stream cipher for encryption
    WiFi Protected Access (WPA or TKIP)
    Uses RC4 Stream cipher for encryption
    Uses AES Block cipher for encryption
  • 15. Wired Equivalent Privacy (WEP)
    So damn popular in Malaysia
    WEP implementation has many flaws
    WEP encryption is easily broken
    Client side attacks on WEP make it even easier
  • 16. Wireless Security
    A False sense of Security
    Demo 1: WEP key pwnage within a few minutes
  • 17. Wi-Fi Protected Access (WPA)
    WPA or TKIP is more secure than WEP
    WPA-PSK is the easiest to implement
    WPA-PSK is susceptible to an offline brute-force attack
    WPA2 uses AES and is so far considered secure
  • 18. Cracking Exploits
  • 19. Most Obvious Wi-Fi Threat
    Solution: Use of strong wireless authentication and encryption in Wi-Fi
    OPEN and WEP are a BIG NO
    WPA can be used, but not enterprise grade. Use WPA2 which is enterprise graded.
    SSID and MAC access control can be evaded
  • 20. Wi-Fi or No Wi-Fi Cannot Address Unmanaged Devices
    Threats From Unmanaged Devices
  • 21. Rogue APs
    Unmanaged APs attached to the network
    (Logically) LAN jacks hanging out from the window
    • Malicious intent or simply an unwitting, impatient employee
    • 22. Provides direct access to wired network from the areas of spillage
    • 23. Steal data on wire
    • 24. Scan network for vulnerabilities
    • 25. Firewall, anti-virus, WPA2 do not see this
  • Ad-hoc connections
    Employees may use ad-hoc connection to share content
    Reduce productivity
    Leak sensitive data
    Inadvertent ad-hoc connection
    Compromise laptop
    Bridge to enterprise network
  • 26. Ad-hoc Bridge to Wired Network
    Users may bridge wired and Wi-Fi network on their laptops
  • 27. Misassociation
    Policy violation
    Gmail, IM, banned websites, banned content
    • MIM attack
    • 28. Password stealing, data interception
    • 29. Growing number of hack tools: KARMETASPLOIT, SSLstrip, Airbase
  • Wi-Fi Device Driver Security
    Wi-Fi device drivers may be vulnerable to remote exploits and DOS
    May allow remote code execution at kernel mode (XSS, CR;LF, etc)
    One must always use the latest versions of hardware drivers.
  • 30. WiFi Hotspots
    Hotspots offer unencrypted connectivity
    MITM & sniffing is very easily implemented
    Tools like SSL strip can nullify HTTPS protection (lol)
    Use of VPN or higher layer encryption is recommended
  • 31. DoS Attacks
    Wireless DoS attacks are inevitable for WiFi
    Spoofed disconnects
    Spoofed connection floods
    Hogging wireless medium
    Even Cisco MFP and 802.11w are vulnerable to DoS attacks
    Google “Auto immunity disorder in Wireless LANs”
  • 32. WPA-2 is Essential, But Not Enough!No-WiFi is Also Not Enough!
  • 33. 24x7 Comprehensive Protection with Wireless Intrusion Prevention System (WIPS)
    Wireless DOS
  • 34. WIPS Providers in the Market
  • 35. Wireless Security
    A False sense of Security
    Demo 2: Cuz I’m a Man In The Mirror
  • 36. Conclusion
    Wi-Fi warrants new security controls in enterprise networks
    For both Wi-Fi and no Wi-Fi networks
    Perceived as high priority item today
    Also a regulatory compliance requirements
    Strong authorization and encryption (WPA2) is essential for authorized Wi-Fi
    Prevents eavesdropping and unauthorized access
    Another layer of security in the form of WIPS (Wireless Intrusion Prevention System) is essential for comprehensive protection
    Prevents Rogue AP’s, ad-hoc connection, misassociations, cracking exploits, DoS attacks
    Compliance monitoring
    Performance monitoring and troubleshooting as added benefits
  • 37. Questions?
    I don’t bring my name card. I love trees.
    Thanks for listening
    May your next day be more secure