WiFi Secuiry: Attack & Defence

12,192 views

Published on

We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!

Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!

Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?

Published in: Technology
4 Comments
33 Likes
Statistics
Notes
No Downloads
Views
Total views
12,192
On SlideShare
0
From Embeds
0
Number of Embeds
154
Actions
Shares
0
Downloads
1,396
Comments
4
Likes
33
Embeds 0
No embeds

No notes for slide

WiFi Secuiry: Attack & Defence

  1. 1. HACKING & INFORMATION SECURITY Presents: -With TechNext
  2. 2. We Are…The Speakers… Sudarshan Pawar Certified Security Expert(C.S.E.) Certified Information Security Specialist (C.I.S.S.) Security Xplained (TechNext Speaker) Computer Engg. & a Security Professional Prakashchandra Suthar Security Enthusiast Cisco Certified Network Associate Red Hat Linux Certified Security Xplained (TechNext Speaker) Computer Engg Security Researcher.
  3. 3. Topics to be covered • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools We are not including stats, history, who did what/when/why-> Bcoz it’s Booooring….!!! U can google them later….!
  4. 4. Current Generation
  5. 5. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  6. 6. Wifi Basics • WiFi(Wireless Fidelity)->Wireless networks(commonly referred as WLAN • Developed on IEEE 802.11 standards • Wireless networks include: Bluetooth, Infrared communication, Radio Signal etc. • Components used: o Wireless Client Receiver o Access Point o Antennas
  7. 7. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  8. 8. Extension to a wired network (BROADBAND ROUTER) (ACCESS POINT) (EXTENSION POINT)
  9. 9. Multiple Access points (BROADBAND ROUTER) (ACCESS POINT-1) (ACCESS POINT-2)
  10. 10. LAN -2-LAN LAN-1 LAN-2
  11. 11. 3g Hotspot GPRS 3G 4G Internet
  12. 12. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  13. 13. How many of you have tried this???
  14. 14. WiFi Standards Points 802.11b 802.11a 802.11g 802.11n Extension to 802.11 802.11 802.11a 802.11g Bandwidth (Mhz) 20 (11Mbps) 20 (54Mbps) 20 (54Mbps) 20 (54Mbps) 40 (150Mbps) Frequency(Ghz) 2.4 5 2.4 2.4, 5 Pros Lowest cost; signal range is good and not easily obstructed fast maximum speed; regulated frequencies prevent signal interference from other devices fast maximum speed; signal range is good and not easily obstructed fastest maximum speed and best signal range; more resistant to signal interference from outside sources Cons slowest maximum speed highest cost; shorter range signal that is more easily obstructed costs more than 802.11b; appliances may interfere on the unregulated signal frequency standard is not yet finalized;
  15. 15. Are u seriously concerned about wifi security????? Be honest!
  16. 16. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  17. 17. WEP(Wired Equivalence Privacy) • The first encryption scheme made available for Wi-Fi. • Uses 24 bit initialization vector for cipher stream RC4 for confidentiality • CRC-32 bit checksum for integrity. • Typically used by home users. • Uses 64,128, 256 bit keys • Flawed from the get go.
  18. 18. WEP Working KEY STORE WEP Key IV RC4 CIPHER KEYSTREAM DATA ICV PAD KID CIPHERTEXTIV WEP ENCRYPTED PACKET(MAC FRAME) CRC 32 CHECKSUM XOR ALGO.
  19. 19. WEP Weakness 1. Key management and key size 2. 24 bit IV size is less. 3. The ICV algorithm is not appropriate 4. Use of RC4 algorithm is weak 5. Authentication messages can be easily forged
  20. 20. Wep Broken beyond repair
  21. 21. WPA (Wi-Fi Protected Access) • Data Encryption for WLAN based on 802.11 std. • Improved Encryption & Authentication Method. • Uses TKIP – Based on WEP – Michael algorithm • Hardware changes not required • Firmware update Types 1. Personal 2. Enterprise PSK 802.1x + RADIUS
  22. 22. WPA Working Temporary Encryption key Transmit Address T.S.C. KEY MIXING WEP SEED RC4 CIPHER KEYSTREAM MAC HEADER IV KID EIV CIPHER TEXT MSDU MIC KEY MPDU ICV MICHAELS ALGORITHM MSDU + MIC KEY ( PACKET TO BE TRANSMITTED )
  23. 23. WPA2 • Long Term Solution (802.11) • Stronger Data protection & Network access control • Used CCMP – Based on AES • Hardware changes required Types 1. Personal Pre Shared Key 2. Enterprise 802.1x + RADIUS
  24. 24. WPA2 Working Source: EC Council
  25. 25. Source: someecards
  26. 26. Breaking WPA/WPA2 • Dictionary Attacks(Not so successful, but yeah some time…) • Brute Force(tools like: Kismac, Aireplay etc) • WPA PSK
  27. 27. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  28. 28. Security breaching sequence Find the network Study its traffic Study Security mechanisms ATTACK!!!!!!!! (i.e. Decrypt the packets)
  29. 29. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  30. 30. BEFORE ATTACK DOS
  31. 31. Access point is busy handling attackers request AFTER ATTACK
  32. 32. Man In The Middle Attack(MITM) • Before
  33. 33. After…
  34. 34. ARP Poisoning/Spoofing Source: http://securitymusings.com/wp-content/uploads/2008/12/arp-spoofing.png
  35. 35. WiFi JAMMING….
  36. 36. WiFi JAMMING….
  37. 37. Fake Access Points SSID: XYZ Bank
  38. 38. Fake Access Points SSID: XYZ Bank
  39. 39. • Basics of Wifi • Types of wireless networks • Wireless Standards(802.11 series) • Encryption Algorithms • Wireless hacking methodology • ATTACKS(commonly encountered) • Staying secure(Defense) • Security Tools
  40. 40. Defense against WPA / WPA2 attacks • Extremely Complicated keys can help • Passphrase should not one from dictionary, so use uncommon-senseless words. • Key should be more than 20 chars with combination of special chars, numbers, alphabets. Change them at regular intervals.
  41. 41. #eY,t#!$c@//_B-gUd0n3?@$sW0rD
  42. 42. 1. WPA instead of WEP 2. WPA2 Enterprise implementation 3. Place AP at secured location. 4. Centralized authentication & Update Drivers regularly. 5. Changing default SSID after Configuring WLAN 6. Firewall policies & Router access Password Security Checkboxes
  43. 43. 1. MAC add. Filtering 2. Encryption at Access Point 3. Packet Filtering between AP 4. Network Strength configuration. 5. Use Ipsec’s for encryption on WLANS 6. Check out for Rogue Access Points Security Checkboxes(contd…)
  44. 44. Wi-Fi Security Auditing Tools • AirMagnet Wifi Analyzer • AirDefense • Adaptive wireless IPS • ARUBA RF Protect WIPS • And many others…
  45. 45. Questions? • What you want to ask, many already have that same question on their mind. Be bold and lead • OK, if you don’t want to speak and keep shut and keep thinking about it in your mind and take those questions home, make sure you email those to us and sleep well at night!
  46. 46. What should be our topic for the next meet? I hate to ask but, how can we make this better?

×