Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information...
Transcript of Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information...
Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor
Securing Wireless NetworksSecuring Wireless NetworksDebunking the MythsDebunking the Myths
22Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What is a Wireless Network?What is a Wireless Network?
The wireless telegraph is not difficult to understand. The ordinThe wireless telegraph is not difficult to understand. The ordinary ary telegraph is like a very long cat. You pull the tail in New Yorktelegraph is like a very long cat. You pull the tail in New York, and it , and it meows in Los Angeles. The wireless is the same way, only withoutmeows in Los Angeles. The wireless is the same way, only without the the cat.cat.
-- Attributed to Albert EinsteinAttributed to Albert Einstein
33Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What is a Wireless Network? What is a Wireless Network? (really)(really)
•• It is a LANIt is a LAN•• Extension of Wired LANExtension of Wired LAN•• Uses High Frequency Radio Waves (RF)Uses High Frequency Radio Waves (RF)•• Speed : 2Mbps to 54MbpsSpeed : 2Mbps to 54Mbps•• Distance 100 feet to 15 miles Distance 100 feet to 15 miles (with fancy antennas)(with fancy antennas)
•• Most importantly, It lets you sit on your deck and use Most importantly, It lets you sit on your deck and use your computer while sipping a cocktail of your choiceyour computer while sipping a cocktail of your choice
44Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Is Wireless Secure?Is Wireless Secure?
•• Not Not ‘‘Out of the BoxOut of the Box’’•• There are steps you can takeThere are steps you can take
–– None are a total solutionNone are a total solution–– In combination they may be sufficientIn combination they may be sufficient
•• Defense in depthDefense in depth•• Making the hackers Making the hackers ‘‘go next doorgo next door’’
55Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What Is This Phenomenon of DriveWhat Is This Phenomenon of Drive--by Hacking?by Hacking?
•• Hacker taps into a network using a wireless rig Hacker taps into a network using a wireless rig that allows him to park in front of a building and that allows him to park in front of a building and gain access to your network while sitting in the gain access to your network while sitting in the car. car.
•• Unsecured wireless can be likened to installing a Unsecured wireless can be likened to installing a wired LAN jack in your front yard.wired LAN jack in your front yard.
•• Often referred to as Often referred to as ““WarDrivingWarDriving””
66Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
WarDrivingWarDriving
•• Term derived from War dialing, made popular in Term derived from War dialing, made popular in the movie War Gamesthe movie War Games
•• All that is required are a few readily available All that is required are a few readily available hardware and software componentshardware and software components–– A PC or PDA with a wireless network cardA PC or PDA with a wireless network card–– Optionally, a GPS and external antennaOptionally, a GPS and external antenna–– Software such as Software such as NetstumblerNetstumbler, Kismet, etc., Kismet, etc.
•• Freely downloadable on the InternetFreely downloadable on the Internet•• Easy for the average computer user to installEasy for the average computer user to install
77Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
WarDrivingWarDriving
88Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
WarDrivingWarDriving (continued)(continued)
•• The software logs configuration of detected The software logs configuration of detected WiFiWiFidevices, optionally including the map locationdevices, optionally including the map location
•• Moving the Moving the WarDrivingWarDriving rig from place to place rig from place to place will eventually develop a large database of will eventually develop a large database of wireless networks and their locations wireless networks and their locations
99Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
WarDrivingWarDriving
1010Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
WarDrivingWarDriving (continued)(continued)
•• IS THIS LEGAL?IS THIS LEGAL?–– Probably, if that is all the farther it goesProbably, if that is all the farther it goes–– Accessing a network is another matter entirelyAccessing a network is another matter entirely
•• Definitely NOT legal if you do not have the ownerDefinitely NOT legal if you do not have the owner’’s s permissionpermission
•• Even if you ONLY use it to access the InternetEven if you ONLY use it to access the Internet•• Most Most WardriversWardrivers do NOT access the networks that they do NOT access the networks that they
detectdetect–– Surprised?Surprised?
1111Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Why Is It Easy to Get Into a Wireless Network?Why Is It Easy to Get Into a Wireless Network?
•• The most common wireless local area networks The most common wireless local area networks are built based on a standard known as 802.11are built based on a standard known as 802.11
•• The security of this technology has been The security of this technology has been demonstrated to be inadequate when demonstrated to be inadequate when challenged by simple hacking attemptschallenged by simple hacking attempts
•• In addition, products sold with this technology In addition, products sold with this technology are usually delivered with security functionality are usually delivered with security functionality disabled.disabled.
1212Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What if I Change My NetworkWhat if I Change My Network’’s Name?s Name?
•• That is more than most do, but it doesnThat is more than most do, but it doesn’’t make t make you much more secureyou much more secure–– Your SSID (Service Set ID) is beaconed by your APYour SSID (Service Set ID) is beaconed by your AP–– You can turn off beaconing, but your SSID is still sent You can turn off beaconing, but your SSID is still sent
each time a computer connects and is easily capturedeach time a computer connects and is easily captured•• At least your neighbor will not accidentally connect!At least your neighbor will not accidentally connect!
beacon
beacon
beacon
1313Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
I Also Changed My ChannelI Also Changed My Channel
•• Once again, that is more than most do, but it Once again, that is more than most do, but it does nothing for securitydoes nothing for security–– Windows Windows xpxp will automatically scan all the available will automatically scan all the available
channels for an active access pointchannels for an active access point
•• It is helpful to select a channel that does not It is helpful to select a channel that does not overlap your neighbor!overlap your neighbor!–– This will improve the function of your WLANThis will improve the function of your WLAN–– Most Access Points are set to channel 6 by defaultMost Access Points are set to channel 6 by default
•• Pick 1 or 11 for your APPick 1 or 11 for your AP
1414Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me Secure?Secure?
•• Not if you donNot if you don’’t use it!t use it!–– Less than 50% of detected Less than 50% of detected WLANsWLANs have WEP enabledhave WEP enabled–– Many that do, have 64bit rather than 128bit Many that do, have 64bit rather than 128bit
encryptionencryption
•• Even if you use itEven if you use it……–– The algorithms used are well understood and The algorithms used are well understood and
not considered weak, but the way in which not considered weak, but the way in which they are used has resulted in a number of they are used has resulted in a number of easily exploitable weaknesseseasily exploitable weaknesses
1515Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)
•• WEP weakness WEP weakness –– WEP security flaws were documented in a 2001 UC WEP security flaws were documented in a 2001 UC
Berkley studyBerkley study•• Weak encryption (never intended for repeated use)Weak encryption (never intended for repeated use)•• Short keys (64bits Short keys (64bits –– 24bit Init Vector = 40 bits)24bit Init Vector = 40 bits)•• Static KeysStatic Keys•• No distribution method (shared key)No distribution method (shared key)
1616Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)
•• There are freely distributed programs that can There are freely distributed programs that can crack WEP keys crack WEP keys (but it takes a while)(but it takes a while)
1717Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What about WPA?What about WPA?
•• WPA is MUCH more secureWPA is MUCH more secure–– Encryption keys are frequently rotatedEncryption keys are frequently rotated
•• Before they can be crackedBefore they can be cracked
–– WPA uses a WPA uses a passphrasepassphrase as the starting point for the as the starting point for the key exchangekey exchange
•• Much more secure if a complex Much more secure if a complex passphrasepassphrase is usedis used–– Several upper & lower case letters, numbers, symbolsSeveral upper & lower case letters, numbers, symbols
–– Can also be used with enterprise systems (RADIUS) Can also be used with enterprise systems (RADIUS) for more securityfor more security
•• Not practical in a home or small officeNot practical in a home or small office
1818Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
So WPA Makes Me Secure?So WPA Makes Me Secure?
•• Not if you donNot if you don’’t use it!t use it!–– Are you seeing a trend here?Are you seeing a trend here?
•• IF you donIF you don’’t use too simple a t use too simple a passphrasepassphrase–– There are tools that will crack There are tools that will crack passphrasespassphrases, but it , but it
could take many could take many yearsyears on a COMPLEX on a COMPLEX passphrasepassphrase
1919Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
What is MAC Address Filtering?What is MAC Address Filtering?
•• Every network card ever produced has a unique Every network card ever produced has a unique address that can be used to limit access to your address that can be used to limit access to your wireless networkwireless network
•• This feature is disabled by defaultThis feature is disabled by default
2020Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
SoSo……MAC Address Filtering Makes Me MAC Address Filtering Makes Me Secure?Secure?
•• Not if you donNot if you don’’t use it!t use it!–– OK, so this is getting oldOK, so this is getting old
•• Authorized computers send their MAC address Authorized computers send their MAC address when they attempt to connectwhen they attempt to connect–– This can be loggedThis can be logged
•• In spite of what some people believe, MAC In spite of what some people believe, MAC addresses can be changed on most network addresses can be changed on most network cards (at least temporarily)cards (at least temporarily)
2121Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Are You Telling Me ItAre You Telling Me It’’s Hopeless?s Hopeless?
•• NONO–– Most of the security measures we have already Most of the security measures we have already
described work well when used correctlydescribed work well when used correctly–– When several are used in conjunction, they are a When several are used in conjunction, they are a
formidable barrier to attackformidable barrier to attack–– Just being better than the status quo is often enough Just being better than the status quo is often enough
to get the hacker to to get the hacker to ‘‘go next doorgo next door’’
2222Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Why Do I Care?Why Do I Care?
•• Why do I care if somebody uses my connection Why do I care if somebody uses my connection to check their mail?to check their mail?–– If that was all they did, you probably wouldnIf that was all they did, you probably wouldn’’t caret care–– Those engaged in illegal activity on the Internet Those engaged in illegal activity on the Internet
frequently steal network connections to frequently steal network connections to ‘‘conduct conduct businessbusiness’’
•• Try explaining to the FBI or the NSA that you are Try explaining to the FBI or the NSA that you are ‘‘not a not a crookcrook’’
–– Many Viruses, Worms and Denial of Service attacks Many Viruses, Worms and Denial of Service attacks are launched using stolen network connections in are launched using stolen network connections in order to hide the true sourceorder to hide the true source
2323Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Then What Should I Do?Then What Should I Do?
•• Most modern access points support WEP or Most modern access points support WEP or WPAWPA–– Use the highest level of security that your Access Use the highest level of security that your Access
Point and computer network card supports (they must Point and computer network card supports (they must be the same).be the same).
•• MAC filtering and disabling beaconing are good MAC filtering and disabling beaconing are good added measuresadded measures–– This will make it difficult for visitors to connect to your This will make it difficult for visitors to connect to your
networknetwork
•• Change the channel, password and address of Change the channel, password and address of your APyour AP
2424Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
HOWHOW……??
•• You will need to spend a little time in the manual You will need to spend a little time in the manual or website for your access pointor website for your access point
•• Some examples follow, but every AP works Some examples follow, but every AP works slightly differentlyslightly differently
Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor
Wireless LAN Protection StrategiesWireless LAN Protection Strategies
2626Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
RecommendationsRecommendations
•• Wireless LAN related ConfigurationWireless LAN related Configuration–– Enable WEP, use 128bit keyEnable WEP, use 128bit key–– Disable SSID BroadcastsDisable SSID Broadcasts–– No SNMP access No SNMP access –– Use MAC (hardware) address to restrict accessUse MAC (hardware) address to restrict access–– NonNon--default Access Point password default Access Point password –– Change default Access Point NameChange default Access Point Name–– Use 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)
2727Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key
2828Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key
2929Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key
3030Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationDisable SSID BroadcastDisable SSID Broadcast
3131Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationNo SNMP access No SNMP access
3232Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Wireless LAN related ConfigurationWireless LAN related ConfigurationUse 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)
3333Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
General RecommendationsGeneral Recommendations
•• Always (wired or wireless)Always (wired or wireless)–– Install virus protection software plus automatic frequent patterInstall virus protection software plus automatic frequent pattern file n file
updateupdate–– Shared folders must impose passwordShared folders must impose password
•• Management IssueManagement Issue–– Prohibit installation of APProhibit installation of AP’’s without authorizations without authorization–– Discover any new Discover any new APsAPs constantly (constantly (NetStumblerNetStumbler is free, Antenna is cheap)is free, Antenna is cheap)–– Power off Access Point when not in usePower off Access Point when not in use–– Carefully select the physical location of your AP, not near windCarefully select the physical location of your AP, not near windows or ows or
front doors.front doors.
3434Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center
Thank You!Thank You!
•• Computer Network Security Resources at the Robert Pile Chaffey Computer Network Security Resources at the Robert Pile Chaffey College Chino Information Technology CenterCollege Chino Information Technology Center–– CISCIS--420420 PC Security & PrivacyPC Security & Privacy–– CISNTWKCISNTWK--440440 Fund. Of Network Security (Security+)Fund. Of Network Security (Security+)–– CISNTWKCISNTWK--441441 Firewalls & Intrusion DetectionFirewalls & Intrusion Detection–– CISNTWKCISNTWK--442442 Disaster Recovery PlanningDisaster Recovery Planning–– CISNTWKCISNTWK--445445 Windows Security AdministrationWindows Security Administration–– CISNTWKCISNTWK--447447 Linux Security AdministrationLinux Security Administration
Steve SiedschlagSteve Siedschlag [email protected]@chaffey.eduAssociate ProfessorAssociate Professor
3535Chaffey CollegeChaffey College
Chino Information Technology CenterChino Information Technology Center