1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.

30
1 C-DAC/Kolkata C-DAC All Rights Reserved www.cdackolkata.i n Computer Security

Transcript of 1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.

Page 1: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

1C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Computer Security

Page 2: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

2C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

• This presentation is intended to inform the audience about the dangers associated with a computer network devices and it is not a demonstration of any Hacking .

Page 3: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

3C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Demos

• Wireless Security

• Web Security

Page 4: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

4C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

INDEX

• Introduction

• A Step-by-Step process of Wireless Communications

• Prevent Your Network from Getting Hacked

Page 5: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

5C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

INTRODUCTION

Page 6: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

6C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Wireless Internet• It is internet access without the use of wires.

• Instead it uses radio frequency bands to exchange information between your computer and the Internet within a range .

Page 7: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

7C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Types of Wireless Security

Page 8: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

8C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Types of Security• OPEN : No security configured

– Obviously not advised

– Data is in the air in plain text and anyone can read it

• WEP : Wired Equivalent privacy – Very week and not recommended

– Used in Open and Shared-Key Authentication

Page 9: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

9C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Types of Security…

• WPA: Wi-Fi Protected Access – Much better than WEP– Pre shared Key concept used– Encryption Algorithm used TKIP– Easy to setup, as easy as WEP– Available in all the common wi-fi routers– A must for all home users– Will take a long time to break in

Page 10: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

10C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Types of Security…

• WPA2: Advance Wi-Fi Protected Access – Better than WPA– Used AES as Encryption System– Takes little more pain to setup– Advised in corporate environments– Strong encryption and authentication support

Page 11: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

11C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Wireless Security Standards

Page 12: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

12C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Description of WEP ProtocolWEP relies on a shared secret key (40 bit/128 bit) which is shared between the sender (client) and the receiver (Access Point).

Secret Key - to encrypt packets before they are transmitted

Integrity Check - to ensure packets are not modified in transit.

The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points.

12

Page 13: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

13C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

How to configure WPA• Open the configuration of your wi-fi device• Go to wireless setting• Under security option, select any one

– WPA– WPA-PSK– WPA-Personal– WPA2-Personal

• Set a complex password• Change the login password of the wireless router.• Done

Page 14: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

14C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Look for this

Page 15: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

15C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

A Step-by-Step process of Wireless Communication

Page 16: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

16C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

A little info…

• For Connecting with a AP user render data segment called Beacon frames.

• After connected with AP the data segment is called Packet.

Page 17: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

17C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

More info…

• Depending on how long the computer is connected, it can generate a certain number of packets per day.

• The more users that are connected to one access point, the more packets are generated.

Page 18: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

18C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

First…• You must locate the wireless signal

• This can be done by using your default Windows tool “View Available Wireless Network”

Page 19: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

19C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Second…

• Once you located a wireless network you can connect to it unless it is using authentication or encryption.

• If it is using authentication or encryption then for the next step a Cracking tool can be use for WEP keys.

Page 20: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

20C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

• Once enough packets recovered it will then captured information gathered from the packets and crack the key giving you access.

Third….

Page 21: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

21C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Prevent Your Network from Getting Hacked

Page 22: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

22C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Prevent Your Network from Getting Hacked

• Don’t broadcast your SSID . This is usually done during the setup of your wireless router.

• Change the default router login to something else. • If your equipment supports it, use WPA or WPA 2

because it offers better encryption which is still able to be broken but much harder.

• Always check for updates to your router.• Turn off your router or access point when not using it.

Page 23: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

23C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Security Advised

• Change the router login password frequently– At least once a month

• Change the wireless WPA password also– At least once a month

• Avoid temptation to connect to open wireless just looking for free internet.

Page 24: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

24C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Security Advised..

• We can configure DHCP more tightly.– Lets not keep an open pool where any one can

connect– Example

– I have 3 machines in my home (desktop/laptop/phone)

– I’ll create a IP pool of 3 IPs only

– I’ll do DHCP reservation using the MAC of these 3 IP

– Effectively I’m not allowing any outsider machine to connect

Page 25: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

25C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Security Advised..

• We can configure MAC binding.– Allow only MY machines to connect– Many access points support MAC binding– Any other machine will not be able to connect to

my Wi-Fi

Page 26: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

26C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Web Security

Page 27: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

27C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

MethodsMan-in-the-Middle Attacks

Stealing Passwords

Trojan Horses

Exploiting Defaults

Wireless Attacks

Page 28: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

28C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Man-in-the-middle(MITM) Attack

MAC(Media Access Control) duplication ARP (Address Resolution Protocol) poisoning Router table poisoning Fake routing tables

Page 29: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

29C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Conclusion

• There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.

Page 30: 1 C-DAC/Kolkata C-DAC All Rights Reserved  Computer Security.

30C-DAC/Kolkata C-DAC All Rights Reserved

ww

w.cdackolkata.in

Thank You