Wireless Network Security

683 views

Published on

Presentation by Morgan Quirk and Thomas Liu at WPI

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
683
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wireless Network Security

  1. 1. Wireless Network Security<br />Thomas Liu<br />Morgan Quirk<br />1<br />
  2. 2. Introduction<br />Wireless Network<br />BSSID: cs440x<br />WEP Open Key: BEEFFACADE<br />http://thomas/<br />2<br />
  3. 3. Today’s Topics<br />3<br />Wireless vs. Wired<br />Wireless security concerns<br />Why WEP is Awful<br />Why WPA is Less Awful<br />Good Wireless Practices<br />
  4. 4. Wireless vs. Wired<br />4<br />Packet Sniffing<br />Remote Access<br />Multiple targets<br />Ease of Use<br />
  5. 5. Wireless Security Concerns<br />5<br />Man in the middle attacks<br />Accidental/Malicious association<br />Ad-hoc networks<br />Denial of service<br />Unauthorized network access<br />
  6. 6. Attacker Incentive<br />6<br />Free internet!<br />[Industrial] espionage<br />General malice<br />Fun and profit<br />
  7. 7. Wired Equivalent Privacy<br />7<br />Wireless security as good as having a wire!<br />Turns out it isn’t so great.<br />Introduced in 1997<br />Deprecated in 2004<br />Still widely used<br />
  8. 8. WEP Encryption<br />8<br />
  9. 9. Cracking WEP<br />9<br />Sniff the air for packets<br />Look for IV collisions<br />Use statistical analysis<br />Not enough packets?<br />De-authentication attack<br />Replay attacks<br />Chop-chop<br />
  10. 10. Wi-Fi Protected Access / TKIP<br />10<br />WEP replacement without replacing legacy hardware<br />Soon to be deprecated<br />TKIP – Temporal Key Protocol<br />Mixes IV and Key instead of simple concatenation<br />Uses sequence numbers to prevent replay attacks<br />Message integrity check<br />IEEE standard for WPA requires handshaking<br />Generates a session key to be used in packet encryption<br />
  11. 11. TKIP Encryption<br />11<br />
  12. 12. TKIP: It fixes things, but it could be better<br />12<br />Still vulnerable to Chop-chop, but it takes longer.<br />QoS packet injection<br />
  13. 13. AES – Advanced Encryption Standard<br />13<br />Adopted by the U.S. government<br />15 competing designs, won by Rijndael<br />Replaces parts of TKIP/WEP<br />
  14. 14. The AES Process<br />14<br />Key Expansion<br />Add Round Key<br />Per round:<br />Byte Substitution<br />Shift Rows<br />Mix Columns<br />Add Round Key<br />Final Round<br />Listen, it’s complicated.<br />http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html<br />
  15. 15. Best Practices<br />15<br />Use good encryption<br />MAC Filtering<br />Static IPs<br />Network separation<br />Policy<br />
  16. 16. Questions?<br />16<br />

×