Wireless Network SecurityThomas LiuMorgan Quirk1
IntroductionWireless NetworkBSSID: cs440xWEP Open Key: BEEFFACADEhttp://thomas/2
Today’s Topics3Wireless vs. WiredWireless security concernsWhy WEP is AwfulWhy WPA is Less AwfulGood Wireless Practices
Wireless vs. Wired4Packet SniffingRemote AccessMultiple targetsEase of Use
Wireless Security Concerns5Man in the middle attacksAccidental/Malicious associationAd-hoc networksDenial of serviceUnauthorized network access
Attacker Incentive6Free internet![Industrial] espionageGeneral maliceFun and profit
Wired Equivalent Privacy7Wireless security as good as having a wire!Turns out it isn’t so great.Introduced in 1997Deprecated in 2004Still widely used
WEP Encryption8
Cracking WEP9Sniff the air for packetsLook for IV collisionsUse statistical analysisNot enough packets?De-authentication attackReplay attacksChop-chop
Wi-Fi Protected Access / TKIP10WEP replacement without replacing legacy hardwareSoon to be deprecatedTKIP – Temporal Key ProtocolMixes IV and Key instead of simple concatenationUses sequence numbers to prevent replay attacksMessage integrity checkIEEE standard for WPA requires handshakingGenerates a session key to be used in packet encryption
TKIP Encryption11
TKIP: It fixes things, but it could be better12Still vulnerable to Chop-chop, but it takes longer.QoS packet injection
AES – Advanced Encryption Standard13Adopted by the U.S. government15 competing designs, won by RijndaelReplaces parts of TKIP/WEP
The AES Process14Key ExpansionAdd Round KeyPer round:Byte SubstitutionShift RowsMix ColumnsAdd Round KeyFinal RoundListen, it’s complicated.http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Best Practices15Use good encryptionMAC FilteringStatic IPsNetwork separationPolicy
Questions?16

Wireless Network Security