Your SlideShare is downloading. ×
Inseguridad en Redes Wireless
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Inseguridad en Redes Wireless

308
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
308
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. (In)Seguridad en redesinalámbricas (WiFi)Raúl Siles, GSE - raul@raulsiles.comHP, Madrid, Mayo 2006
  • 2. Ponente• Raúl Siles (raul@raulsiles.com)• Ingeniero informático - UPM• GSE• Consultor de Seguridad de HP: www.hp.es “Servicios de seguridad en redes inalámbricas”.• Instructor del SANS Institute: www.sans.com “SECURITY 617: Assessing and Securing Wireless Networks”. Londres, UK. 26 Junio – 1 Julio. 2
  • 3. Agenda• ¿(In)Seguridad en redes inalámbricas 802.11_ (WiFi)?• Demostraciones: • WEP • WPA • KARMA• Historia de la seguridad WiFi• Recomendaciones de seguridad en redes WiFi 3
  • 4. ¿(In)Seguridad WiFi?¿Cuál es el estado actual de la (in)seguridad WiFi? 802.11 PSK RC4 MIC TTLS 802.11a GTK PEAPv1 RADIUS 802.11n WPA2 EAP/TLS CBC-MAC MSCHAPv2 802.16 WPA PEAPv0 802.11i LEAP NAS WEP+ PEAPv2 AES EAP-MD5 RSN PMK 802.11g WMM EAP- WEP 802.15 FAST AAA PTK 802.11w CCMP 802.1x CRC32 LDAP TKIP 802.11b PEAP-EAP/TLS
  • 5. ¿Dónde está Wally? 5
  • 6. Defcon WiFi Shootout 2005(802.11b) 124.9 miles 200.96 Km www.wifi-shootout.com
  • 7. Historia de la seguridad WiFi 100 Retransmisión 90 de tráfico 80 Obtención de la clave WEP 70 Cambio de 60 MAC 50 Identificación 40 de la red 30 Interceptación de tráfico 20 10 0 802.11_ SSID Filtros WEP WEP+ cloaked MAC
  • 8. Historia de la seguridad WiFi (2) 100 Ataque de diccionario (WPA-PSK) DoS 90 80 MITM 70 60 Ataque inductivo inverso 50 Inyección de 40 tráfico 30 PSK 20 10 0 Cifrado Descifrado Auth. WPA WPA2 sin clave WEP simple (802.1x/EAP)
  • 9. Demostraciones 9
  • 10. Demo: WEP• Suite aircrack-ng: •airodump-ng •aireplay-ng •aircrack-ng 10
  • 11. Demo: WPA• Suite cowpatty: •cowpatty •genpmk• v2.0 vs v3.0 11
  • 12. Demo: Clientes inalámbricos (PNL)• Suite Karma: •karma •modules 12
  • 13. Recomendaciones deseguridad en redes WiFi 13
  • 14. Recomendaciones de seguridad WiFi:soluciones y contramedidas• Cifrado: WPA o WPA2• Autentificación: PSK (+20 chars) o 802.1X/EAP • PSK: http://www.grc.com/pass (8-63 chars) • Autentificación mutua (MITM): EAP-TLS, TTLS, PEAP…• Defensa en profundidad: múltiples contramedidas• Clientes 802.11_: MITM, Hotspots, Ad-hoc…• DoS: • Capa física (radiofrequencia) • 802.11 MAC: 802.11w (•2007) 14
  • 15. 802.11_• Wi-Fi Alliance: www.wi-fi.org• IEEE802.11: http://grouper.ieee.org/groups/802/11/• IETF: www.ietf.org• HP: www.hp.es• SANS: www.sans.org – “SECURITY 617: Assessing and Securing Wireless Networks”• http://www.raulsiles.com/resources/wifi.html 15
  • 16. ¿Preguntas? ¡¡Gracias!! 16
  • 17. Attribution-NonCommercial-NoDerivs2.0 You are free: to copy, distribute, display, and perform the work Under the following conditions: Attribution. You must give the original author credit. Noncommercial. You may not use this work for commercial purposes. No Derivative Works. You may not alter, transform, or build upon this work. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the author. Your fair use and other rights are in no way affected by the above. This is a human-readable summary of the http://creativecommons.org/licenses/by-nc-nd/2.0/. 17