SlideShare a Scribd company logo
1 of 33
Download to read offline
Wireless security

                       The Competa Plane
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 1
Wireless security

                            See if it Flies ....
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 2
Wireless security

                                               Me

               • Rudi van Drunen
                     •   Senior Consultant & CTO Competa IT
                         •   Design, Deliver and Maintain Complex IT Infrastructure

                     •   CTO XlexiT Technology B.V.
<XlexiT>




                         •   Wireless / Embedded / Networking

                     •   Tech Guru Wireless Leiden
                         •   Largest wireless community network in NL



ver. 1.3
           © 2008 R.van.Drunen@competa.com                        Slide 3
Wireless security

                                     This Talk

                  • Attacks
                  • What to do about it, Applied to wireless
                    • RF level
                    • Protocol level
                      • Encryption
<XlexiT>




                      • Authentication
                    • Application level

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 4
Wireless security

                                           Hierarchy

                                                    Attacks



                     Passive                                                          Active
<XlexiT>




                   Eavesdropping                                                       Denial
                                                 Replay
                                                                                     of Service
                               Traffic analysis            Masquerade

                                                                        Message
                                                                       Modification




ver. 1.3
           © 2008 R.van.Drunen@competa.com                                       Slide 5
Wireless security

                                       Passive


                • Eavesdropping
                   •   Need signal

                   •   Decrypt if needed
<XlexiT>




                • Traffic Analysis
                   •   Get data from signal and traffic


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 6
Wireless security

                                    Active (1)


                • Denial of Service
                   •   Radio Level (microwave method)

                   •
<XlexiT>




                       Flooding AP with packets

                   •   Disconnect messages



ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 7
Wireless security

                                    Active (2)


                • Replay
                   •   Listen to the traffic, get SSID, MAC

                   •   replay and associate, masquerade
<XlexiT>




                • Message modification
                   •   Rogue Accesspoint


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 8
Wireless security

                       802.11 alphabet soup
                •   802.11a 5 GHz WLAN


                •   802.11b 2.4 GHz WLAN


                •   802.11c Bridging between APs


                •   802.11d Global frequency harmonization


                •   802.11e MAC level enhancements for QoS


                •
<XlexiT>




                    802.11f Inter Access Point Protocol for Roaming


                •   802.11g High Rate 2.4 GHz WLAN


                •   802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control


                •   802.11i   Security Enhancements


                •   802.11n Super Fast WLAN (mimo)



ver. 1.3
           © 2008 R.van.Drunen@competa.com                                            Slide 9
Wireless security

                                      Wireless



                • RF Level ...
                   •
<XlexiT>




                       cf. ethernet level.....




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 10
Wireless security

                           leaky building ...
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 11
Wireless security

                                    Antennae
<XlexiT>




                  Omnidirectional                   Directional

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 12
Wireless security

                         Shaping coverage
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 13
Wireless security

                                  Site Survey
<XlexiT>




                  - Outside-in
                  - Use Antennas (remember:Leaky building)
                  - Check RF interference

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 14
Wireless security

                               Protocol Level
                  • Encryption
                        •   WEP, WPA, WPA2

                  • Key management
                  • Authorization - Authentication
<XlexiT>




                        •   802.1x, RADIUS

                        •   EAP Methods

                  • Cooking it up: WPA2 with EAP-TLS
ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 15
Wireless security

                                             WEP
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 16
Wireless security

                              Next please ...

                • 802.11i
                   •   WPA
                        •   Transient Security Network (TSN)

                              •   TSN = TKIP + WPA(1) + Radius
<XlexiT>




                        •   Temporal keys, Message Integrity Check


                   •   WPA2
                        •   Robust Security Network (RSN)

                              •   RSN = CCMP + WPA(2) + Radius


ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 17
Wireless security

                                             WPA

                • 802.11i framework
                • Try to fix the flaws introduced in WEP
                   •   TKIP, MIC, tsc

                • Keep backwards compatible
<XlexiT>




                   •   (HW level (should be firmware update))

                • Add authentication layer (802.1x)
ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 18
Wireless security

                                             WPA
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 19
Wireless security

                                         WPA2
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 20
Wireless security

                               Key managment

            •       Pairwise Keys

                •    Between EACH client and AP different pair

                •    Computed / Distributed @association time

                •    Unicast
<XlexiT>




            •       Group Keys

                •    Same key between AP and every client

                •    Broadcast (and multicast)




ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 21
Wireless security

                                Key Hierachy
               • Pairwise master key (PMK)
                  •   From Auth server (or pre-shared)

                  •   Generated during authentication (tls/ssl)

                  •   WPA: Radius server sends PMK to AP

               • From PMK AP derives Temporal keys
<XlexiT>




                  •   Pairwise Transient Keys
                        •   Data Encryption ,Integrity keys ; EAPOL keys

                        •   These keys are used in encryption engines
ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 22
Wireless security

                              Authentication



                • 802.1x
                   •   Not part of 802.11 suite
<XlexiT>




                   •   Can also be used on wired networks.




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 23
Wireless security

                   Authentication: Radius

                • Component in 802.1x
                • Other Applications in Wireless
                   •   MAC Address authentication
<XlexiT>




                       •   NOT SECURE !

                   •   Captive Portal
                       •   nocat, m0n0wall   (www.m0n0.ch/wall)




ver. 1.3
           © 2008 R.van.Drunen@competa.com                        Slide 24
Wireless security

                         802.1x + RADIUS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 25
Wireless security

                               Cooking it up

               • EAP-TLS enterprise in time
                  •   Authentication mechanism

                  •   Key distribution mechanism

               • Other fun things wpa
<XlexiT>




               • WPA @home

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 26
Wireless security

                                      EAP-TLS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 27
Wireless security

                                      EAP-TLS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 28
Wireless security

                               Fun things WPA

                 • Key caching
                       •   Returning authenticated client
                           •   send (PM)Key name in associate request

                           •   AP start 4-way handshake
<XlexiT>




                           •   AP verifies PMKey


                 • Pre-authentication
                           •   Makes Roaming seamless and faster



ver. 1.3
           © 2008 R.van.Drunen@competa.com                         Slide 29
Wireless security

                                  WPA@home
                • No Radius server
                • Primary Master Key as Shared Secret
                   •   Key generation from password (rfc 2898)
                           •   good passwords: https://www.grc.com/passwords
<XlexiT>




                   •   AP and Client have same PMK

                   •   4 way handshake between AP - Client

                   •   Client / AP derive temporal keys for
                       encryption
ver. 1.3
           © 2008 R.van.Drunen@competa.com                           Slide 30
Wireless security

                       WPA-PSK Overview
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 31
Wireless security

                           Application Level

                • VPN (ipsec, OpenVPN)
                   •   Some Setup required

                • SSL connections
                   •
<XlexiT>




                       You thought everything did ssl, right ?!

                • Captive portals
                   •   Hotspot model

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 32
Wireless security




                               Questions ?!
<XlexiT>




                   R.van.Drunen@competa.com


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 33

More Related Content

What's hot

Nexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentNexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentSal Lopez
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...Erol TOKALACOGLU
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleAri Zoldan
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07Niit Care
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15Niit Care
 

What's hot (8)

Nexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentNexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15
 

Viewers also liked

Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchImage Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchMatt Hancher
 
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationNASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationDavid Mittelman
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionJOLLUSUDARSHANREDDY
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldApplications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldAshwani Srivastava
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSahil Biswas
 

Viewers also liked (10)

Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchImage Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
 
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationNASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
 
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldApplications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
 
Medical Image Processing
Medical Image ProcessingMedical Image Processing
Medical Image Processing
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 

Similar to Wireless Security

Cours Cisco
Cours CiscoCours Cisco
Cours Cisco123addou
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switchesKJ Savaliya
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27JungIn Jung
 
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Jake Yoo
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡zman
 
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica  Fabian Kienle FinalCvc2009 Moscow Repeater+Ica  Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle FinalLiudmila Li
 
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication   Herman ClausTr@Ins6 Trackside Communication   Herman Claus
Tr@Ins6 Trackside Communication Herman Clausimec.archive
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationNir Cohen
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksYaser Rahmati
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01Lema John Michael
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalFisal Anwari
 

Similar to Wireless Security (20)

L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
Cours Cisco
Cours CiscoCours Cisco
Cours Cisco
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
 
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡
 
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica  Fabian Kienle FinalCvc2009 Moscow Repeater+Ica  Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
 
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication   Herman ClausTr@Ins6 Trackside Communication   Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
NetX
NetXNetX
NetX
 
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Wireless Security

  • 1. Wireless security The Competa Plane <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 1
  • 2. Wireless security See if it Flies .... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 2
  • 3. Wireless security Me • Rudi van Drunen • Senior Consultant & CTO Competa IT • Design, Deliver and Maintain Complex IT Infrastructure • CTO XlexiT Technology B.V. <XlexiT> • Wireless / Embedded / Networking • Tech Guru Wireless Leiden • Largest wireless community network in NL ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 3
  • 4. Wireless security This Talk • Attacks • What to do about it, Applied to wireless • RF level • Protocol level • Encryption <XlexiT> • Authentication • Application level ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 4
  • 5. Wireless security Hierarchy Attacks Passive Active <XlexiT> Eavesdropping Denial Replay of Service Traffic analysis Masquerade Message Modification ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 5
  • 6. Wireless security Passive • Eavesdropping • Need signal • Decrypt if needed <XlexiT> • Traffic Analysis • Get data from signal and traffic ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 6
  • 7. Wireless security Active (1) • Denial of Service • Radio Level (microwave method) • <XlexiT> Flooding AP with packets • Disconnect messages ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 7
  • 8. Wireless security Active (2) • Replay • Listen to the traffic, get SSID, MAC • replay and associate, masquerade <XlexiT> • Message modification • Rogue Accesspoint ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 8
  • 9. Wireless security 802.11 alphabet soup • 802.11a 5 GHz WLAN • 802.11b 2.4 GHz WLAN • 802.11c Bridging between APs • 802.11d Global frequency harmonization • 802.11e MAC level enhancements for QoS • <XlexiT> 802.11f Inter Access Point Protocol for Roaming • 802.11g High Rate 2.4 GHz WLAN • 802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control • 802.11i Security Enhancements • 802.11n Super Fast WLAN (mimo) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 9
  • 10. Wireless security Wireless • RF Level ... • <XlexiT> cf. ethernet level..... ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 10
  • 11. Wireless security leaky building ... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 11
  • 12. Wireless security Antennae <XlexiT> Omnidirectional Directional ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 12
  • 13. Wireless security Shaping coverage <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 13
  • 14. Wireless security Site Survey <XlexiT> - Outside-in - Use Antennas (remember:Leaky building) - Check RF interference ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 14
  • 15. Wireless security Protocol Level • Encryption • WEP, WPA, WPA2 • Key management • Authorization - Authentication <XlexiT> • 802.1x, RADIUS • EAP Methods • Cooking it up: WPA2 with EAP-TLS ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 15
  • 16. Wireless security WEP <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 16
  • 17. Wireless security Next please ... • 802.11i • WPA • Transient Security Network (TSN) • TSN = TKIP + WPA(1) + Radius <XlexiT> • Temporal keys, Message Integrity Check • WPA2 • Robust Security Network (RSN) • RSN = CCMP + WPA(2) + Radius ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 17
  • 18. Wireless security WPA • 802.11i framework • Try to fix the flaws introduced in WEP • TKIP, MIC, tsc • Keep backwards compatible <XlexiT> • (HW level (should be firmware update)) • Add authentication layer (802.1x) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 18
  • 19. Wireless security WPA <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 19
  • 20. Wireless security WPA2 <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 20
  • 21. Wireless security Key managment • Pairwise Keys • Between EACH client and AP different pair • Computed / Distributed @association time • Unicast <XlexiT> • Group Keys • Same key between AP and every client • Broadcast (and multicast) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 21
  • 22. Wireless security Key Hierachy • Pairwise master key (PMK) • From Auth server (or pre-shared) • Generated during authentication (tls/ssl) • WPA: Radius server sends PMK to AP • From PMK AP derives Temporal keys <XlexiT> • Pairwise Transient Keys • Data Encryption ,Integrity keys ; EAPOL keys • These keys are used in encryption engines ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 22
  • 23. Wireless security Authentication • 802.1x • Not part of 802.11 suite <XlexiT> • Can also be used on wired networks. ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 23
  • 24. Wireless security Authentication: Radius • Component in 802.1x • Other Applications in Wireless • MAC Address authentication <XlexiT> • NOT SECURE ! • Captive Portal • nocat, m0n0wall (www.m0n0.ch/wall) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 24
  • 25. Wireless security 802.1x + RADIUS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 25
  • 26. Wireless security Cooking it up • EAP-TLS enterprise in time • Authentication mechanism • Key distribution mechanism • Other fun things wpa <XlexiT> • WPA @home ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 26
  • 27. Wireless security EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 27
  • 28. Wireless security EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 28
  • 29. Wireless security Fun things WPA • Key caching • Returning authenticated client • send (PM)Key name in associate request • AP start 4-way handshake <XlexiT> • AP verifies PMKey • Pre-authentication • Makes Roaming seamless and faster ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 29
  • 30. Wireless security WPA@home • No Radius server • Primary Master Key as Shared Secret • Key generation from password (rfc 2898) • good passwords: https://www.grc.com/passwords <XlexiT> • AP and Client have same PMK • 4 way handshake between AP - Client • Client / AP derive temporal keys for encryption ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 30
  • 31. Wireless security WPA-PSK Overview <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 31
  • 32. Wireless security Application Level • VPN (ipsec, OpenVPN) • Some Setup required • SSL connections • <XlexiT> You thought everything did ssl, right ?! • Captive portals • Hotspot model ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 32
  • 33. Wireless security Questions ?! <XlexiT> R.van.Drunen@competa.com ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 33