null Pune meet - Wireless Security
Upcoming SlideShare
Loading in...5
×
 

null Pune meet - Wireless Security

on

  • 1,187 views

null Pune meet - Wireless Security – By Rohit Srivastwa

null Pune meet - Wireless Security – By Rohit Srivastwa
http://null.co.in

Statistics

Views

Total Views
1,187
Views on SlideShare
1,127
Embed Views
60

Actions

Likes
0
Downloads
41
Comments
0

3 Embeds 60

http://nullpresentations.blogspot.com 37
http://null.co.in 22
https://inoreader.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • IV provides more randomness to the encryption process, to avoid pattern recognition in the ciphertext

null Pune meet - Wireless Security Presentation Transcript

  • 1. Wireless Security The breaking and fixing
  • 2. History
  • 3. Types of Security
    • OPEN : No security configured X
      • Obviously not advised
      • Data is in the air in plain text and anyone can read it
    • WEP : Wired Equivalent privacy X
      • Was broken years ago and takes 15 min to break in
      • Very week and not recommended
      • Accepts only hexadecimal password
  • 4. Types of Security…
    • WPA: Wi-Fi Protected Access 
      • Much better than WEP
      • Accept long password and with all possible combinations
      • Easy to setup, as easy as WEP
      • Available in all the common wi-fi routers
      • A must for all home users
      • Will take a looong time to break in
  • 5. Types of Security…
    • WPA2: Advance Wi-Fi Protected Access 
      • Better than WPA
      • Takes little more pain to setup
      • Advised in corporate environments
      • Strong encryption and authentication support
  • 6. Wireless Security Standards
  • 7. Description of WEP Protocol
    • WEP relies on a shared secret key (64 bit/128 bit) which is shared between the sender (client) and the receiver (Access Point).
    • Secret Key - to encrypt packets before they are transmitted
    • Integrity Check - to ensure packets are not modified in transit.
    • The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points.
  • 8. CHAP Authentication © ClubHack http://clubhack.com Supplicant Authenticator username challenge response Accept/reject
  • 9. How WEP works IV RC4 key IV encrypted packet original unencrypted packet checksum
  • 10. WEP Cracking Demo
  • 11. Immediate Solution
    • WPA
      • Easy to configure
      • Every home router has this
      • No special hardware or software required
      • Boost security level to a comfortable level
  • 12. How to configure WPA
    • Open the configuration of your wi-fi device
    • Go to wireless setting
    • Under security option, select any one
      • WPA
      • WPA-PSK
      • WPA-Personal
      • WPA2-Personal
    • Set a complex password
    • Change the login password of the wireless router.
    • Done
  • 13. Example : Linksys
  • 14. Example : Netgear
  • 15. Example : ZyXEL
  • 16. Look for this
  • 17. Further Advised
    • Change the router login password frequently
      • Atleast once a month
    • Change the wireless WPA password also
      • Atleast once a month
    • Avoid temptation to connect to open wireless just looking for free internet.
  • 18. What’s next (added security)
    • We can configure DHCP more tightly.
      • Lets not keep an open pool where any one can connect
      • Example
          • I have 3 machines in my home (desktop/laptop/phone)
          • I’ll create a IP pool of 3 IPs only
          • I’ll do DHCP reservation using the MAC of these 3 IP
          • Effectively I’m not allowing any outsider machine to connect
  • 19. What’s next (added security) …
    • We can configure MAC binding.
      • Allow only MY machines to connect
      • Many access points support MAC binding
      • Any other machine will not be able to connect to my Wi-Fi
  • 20. Not only terrorism, what else
    • Connected to open network??
      • Attacker can read your mails
      • Attacker can see your password (even gmail)
      • Attacker can see your credit card numbers
      • Attacker can access confidential information on your computer
      • Attacker can chat with your girlfriend posing as you.
  • 21. So…
    • 6 easy steps to counter 95% of attack on your wi-fi
    • Secure your wi-fi today.
  • 22. Q & 42 ?
    • Rohit Srivastwa
    • Founder, Club Hack
    • [email_address]
    member