Submit Search
Upload
Wireless Security
•
2 likes
•
1,300 views
R
rudivd
Follow
Rudi van Drunen Presentation on wireless security NLUUG vj 08. Courtesy of www.competa.com
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 33
Download now
Download to read offline
Recommended
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
Sonic wall tz series
Sonic wall tz series
Shahaji Kaitke
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Yury Chemerkin
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
Banking at Ho Chi Minh city
Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
Comp tia n+_session_08
Comp tia n+_session_08
Niit Care
O Lplc01 Course Manual1
O Lplc01 Course Manual1
ersaurabh28
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
Eugene Sushchenko
Recommended
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
Sonic wall tz series
Sonic wall tz series
Shahaji Kaitke
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Yury Chemerkin
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
Banking at Ho Chi Minh city
Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
Comp tia n+_session_08
Comp tia n+_session_08
Niit Care
O Lplc01 Course Manual1
O Lplc01 Course Manual1
ersaurabh28
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
Eugene Sushchenko
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Sal Lopez
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Erol TOKALACOGLU
Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Yustinus Malawau
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Ari Zoldan
Comp tia n+_session_07
Comp tia n+_session_07
Niit Care
Comp tia a+_session_15
Comp tia a+_session_15
Niit Care
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
Matt Hancher
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
David Mittelman
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
NASA Open Government Initiative
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
JOLLUSUDARSHANREDDY
Security in wireless sensor network
Security in wireless sensor network
Adit Pathak
Wireless Networking Security
Wireless Networking Security
Anshuman Biswal
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Ashwani Srivastava
Medical Image Processing
Medical Image Processing
Pantech ProLabs India Pvt Ltd
Digital Image Processing
Digital Image Processing
Sahil Biswas
L2 Attacks.pdf
L2 Attacks.pdf
vinaykumar947680
Cours Cisco
Cours Cisco
123addou
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
More Related Content
What's hot
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Sal Lopez
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Erol TOKALACOGLU
Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Yustinus Malawau
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Ari Zoldan
Comp tia n+_session_07
Comp tia n+_session_07
Niit Care
Comp tia a+_session_15
Comp tia a+_session_15
Niit Care
What's hot
(8)
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Comp tia n+_session_02
Comp tia n+_session_02
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Comp tia n+_session_07
Comp tia n+_session_07
Comp tia a+_session_15
Comp tia a+_session_15
Viewers also liked
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
Matt Hancher
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
David Mittelman
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
NASA Open Government Initiative
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
JOLLUSUDARSHANREDDY
Security in wireless sensor network
Security in wireless sensor network
Adit Pathak
Wireless Networking Security
Wireless Networking Security
Anshuman Biswal
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Ashwani Srivastava
Medical Image Processing
Medical Image Processing
Pantech ProLabs India Pvt Ltd
Digital Image Processing
Digital Image Processing
Sahil Biswas
Viewers also liked
(10)
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
Security in wireless sensor network
Security in wireless sensor network
Wireless Networking Security
Wireless Networking Security
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Medical Image Processing
Medical Image Processing
Digital Image Processing
Digital Image Processing
Similar to Wireless Security
L2 Attacks.pdf
L2 Attacks.pdf
vinaykumar947680
Cours Cisco
Cours Cisco
123addou
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
10 fn s45
10 fn s45
Scott Foster
10 fn s45
10 fn s45
Scott Foster
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
JungIn Jung
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
Jake Yoo
CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
computerlenguyen
從INTEL技術談網路卡
從INTEL技術談網路卡
zman
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Liudmila Li
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
imec.archive
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
NetX
NetX
CVA757
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
FAST-Lab. Factory Automation Systems and Technologies Laboratory, Tampere University of Technology
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Nir Cohen
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
Yaser Rahmati
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
Lema John Michael
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
Fisal Anwari
Similar to Wireless Security
(20)
L2 Attacks.pdf
L2 Attacks.pdf
Cours Cisco
Cours Cisco
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
10 fn s45
10 fn s45
10 fn s45
10 fn s45
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
從INTEL技術談網路卡
從INTEL技術談網路卡
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
NetX
NetX
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
Recently uploaded
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Recently uploaded
(20)
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Wireless Security
1.
Wireless security
The Competa Plane <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 1
2.
Wireless security
See if it Flies .... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 2
3.
Wireless security
Me • Rudi van Drunen • Senior Consultant & CTO Competa IT • Design, Deliver and Maintain Complex IT Infrastructure • CTO XlexiT Technology B.V. <XlexiT> • Wireless / Embedded / Networking • Tech Guru Wireless Leiden • Largest wireless community network in NL ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 3
4.
Wireless security
This Talk • Attacks • What to do about it, Applied to wireless • RF level • Protocol level • Encryption <XlexiT> • Authentication • Application level ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 4
5.
Wireless security
Hierarchy Attacks Passive Active <XlexiT> Eavesdropping Denial Replay of Service Traffic analysis Masquerade Message Modification ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 5
6.
Wireless security
Passive • Eavesdropping • Need signal • Decrypt if needed <XlexiT> • Traffic Analysis • Get data from signal and traffic ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 6
7.
Wireless security
Active (1) • Denial of Service • Radio Level (microwave method) • <XlexiT> Flooding AP with packets • Disconnect messages ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 7
8.
Wireless security
Active (2) • Replay • Listen to the traffic, get SSID, MAC • replay and associate, masquerade <XlexiT> • Message modification • Rogue Accesspoint ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 8
9.
Wireless security
802.11 alphabet soup • 802.11a 5 GHz WLAN • 802.11b 2.4 GHz WLAN • 802.11c Bridging between APs • 802.11d Global frequency harmonization • 802.11e MAC level enhancements for QoS • <XlexiT> 802.11f Inter Access Point Protocol for Roaming • 802.11g High Rate 2.4 GHz WLAN • 802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control • 802.11i Security Enhancements • 802.11n Super Fast WLAN (mimo) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 9
10.
Wireless security
Wireless • RF Level ... • <XlexiT> cf. ethernet level..... ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 10
11.
Wireless security
leaky building ... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 11
12.
Wireless security
Antennae <XlexiT> Omnidirectional Directional ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 12
13.
Wireless security
Shaping coverage <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 13
14.
Wireless security
Site Survey <XlexiT> - Outside-in - Use Antennas (remember:Leaky building) - Check RF interference ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 14
15.
Wireless security
Protocol Level • Encryption • WEP, WPA, WPA2 • Key management • Authorization - Authentication <XlexiT> • 802.1x, RADIUS • EAP Methods • Cooking it up: WPA2 with EAP-TLS ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 15
16.
Wireless security
WEP <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 16
17.
Wireless security
Next please ... • 802.11i • WPA • Transient Security Network (TSN) • TSN = TKIP + WPA(1) + Radius <XlexiT> • Temporal keys, Message Integrity Check • WPA2 • Robust Security Network (RSN) • RSN = CCMP + WPA(2) + Radius ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 17
18.
Wireless security
WPA • 802.11i framework • Try to fix the flaws introduced in WEP • TKIP, MIC, tsc • Keep backwards compatible <XlexiT> • (HW level (should be firmware update)) • Add authentication layer (802.1x) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 18
19.
Wireless security
WPA <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 19
20.
Wireless security
WPA2 <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 20
21.
Wireless security
Key managment • Pairwise Keys • Between EACH client and AP different pair • Computed / Distributed @association time • Unicast <XlexiT> • Group Keys • Same key between AP and every client • Broadcast (and multicast) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 21
22.
Wireless security
Key Hierachy • Pairwise master key (PMK) • From Auth server (or pre-shared) • Generated during authentication (tls/ssl) • WPA: Radius server sends PMK to AP • From PMK AP derives Temporal keys <XlexiT> • Pairwise Transient Keys • Data Encryption ,Integrity keys ; EAPOL keys • These keys are used in encryption engines ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 22
23.
Wireless security
Authentication • 802.1x • Not part of 802.11 suite <XlexiT> • Can also be used on wired networks. ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 23
24.
Wireless security
Authentication: Radius • Component in 802.1x • Other Applications in Wireless • MAC Address authentication <XlexiT> • NOT SECURE ! • Captive Portal • nocat, m0n0wall (www.m0n0.ch/wall) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 24
25.
Wireless security
802.1x + RADIUS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 25
26.
Wireless security
Cooking it up • EAP-TLS enterprise in time • Authentication mechanism • Key distribution mechanism • Other fun things wpa <XlexiT> • WPA @home ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 26
27.
Wireless security
EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 27
28.
Wireless security
EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 28
29.
Wireless security
Fun things WPA • Key caching • Returning authenticated client • send (PM)Key name in associate request • AP start 4-way handshake <XlexiT> • AP verifies PMKey • Pre-authentication • Makes Roaming seamless and faster ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 29
30.
Wireless security
WPA@home • No Radius server • Primary Master Key as Shared Secret • Key generation from password (rfc 2898) • good passwords: https://www.grc.com/passwords <XlexiT> • AP and Client have same PMK • 4 way handshake between AP - Client • Client / AP derive temporal keys for encryption ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 30
31.
Wireless security
WPA-PSK Overview <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 31
32.
Wireless security
Application Level • VPN (ipsec, OpenVPN) • Some Setup required • SSL connections • <XlexiT> You thought everything did ssl, right ?! • Captive portals • Hotspot model ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 32
33.
Wireless security
Questions ?! <XlexiT> R.van.Drunen@competa.com ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 33
Download now