Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless...

42
Wireless Networks: Basics and Auditing Ed Crowley Spring 2011

Transcript of Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless...

Page 1: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Networks

Basics and Auditing

Ed CrowleySpring 2011

Todayrsquos Topics

Wireless Networking Economic drivers and Vulnerabilities

IEEE 80211 Family

WLAN Operational Modes

Wired Equivalent Privacy (WEP)

WPA and WPA2

Authentication Protocols

WLAN Threats

Wireless Hacking (Auditing) Tools

Securing WLANs

Bluetooth Overview

Wireless Communications

Defined as the transmission of information from one place to another without cables

May be short or long distances

Can be via

bull Radio

bull Microwave

bull Infrared

bull Other

Common wireless examples include

bull Cell phoneshellip

bull Wireless networking hellip

In the future will they merge into one pervasive network

Wireless Growth Drivers

1 Convenience

2 Cost

Dynamics

Gilders Law

Total bandwidth of communication systems triples every twelve months

Metcalfes Law

Value of a network is proportional to the square of the number of nodes

As a network grows the value of being connected to it grows exponentially while the cost per user remains the same or reduces

Wireless Vulnerabilities

At home your next door neighbor with a UHF

scanner may listen to your cordless phone calls[1]

At the coffee shop the person next to you might

sniff your wireless connection

Stealing your credit card numbers passwords Facebook

credentials

Conclusion

Open broadcast infrastructures such as Wireless

LANs (WLANs) are relatively vulnerable

1 For the last decade or so it has been illegal for a nongovernmental person to purchase a scanner with

these capabilitieshellip

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 2: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Todayrsquos Topics

Wireless Networking Economic drivers and Vulnerabilities

IEEE 80211 Family

WLAN Operational Modes

Wired Equivalent Privacy (WEP)

WPA and WPA2

Authentication Protocols

WLAN Threats

Wireless Hacking (Auditing) Tools

Securing WLANs

Bluetooth Overview

Wireless Communications

Defined as the transmission of information from one place to another without cables

May be short or long distances

Can be via

bull Radio

bull Microwave

bull Infrared

bull Other

Common wireless examples include

bull Cell phoneshellip

bull Wireless networking hellip

In the future will they merge into one pervasive network

Wireless Growth Drivers

1 Convenience

2 Cost

Dynamics

Gilders Law

Total bandwidth of communication systems triples every twelve months

Metcalfes Law

Value of a network is proportional to the square of the number of nodes

As a network grows the value of being connected to it grows exponentially while the cost per user remains the same or reduces

Wireless Vulnerabilities

At home your next door neighbor with a UHF

scanner may listen to your cordless phone calls[1]

At the coffee shop the person next to you might

sniff your wireless connection

Stealing your credit card numbers passwords Facebook

credentials

Conclusion

Open broadcast infrastructures such as Wireless

LANs (WLANs) are relatively vulnerable

1 For the last decade or so it has been illegal for a nongovernmental person to purchase a scanner with

these capabilitieshellip

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 3: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Communications

Defined as the transmission of information from one place to another without cables

May be short or long distances

Can be via

bull Radio

bull Microwave

bull Infrared

bull Other

Common wireless examples include

bull Cell phoneshellip

bull Wireless networking hellip

In the future will they merge into one pervasive network

Wireless Growth Drivers

1 Convenience

2 Cost

Dynamics

Gilders Law

Total bandwidth of communication systems triples every twelve months

Metcalfes Law

Value of a network is proportional to the square of the number of nodes

As a network grows the value of being connected to it grows exponentially while the cost per user remains the same or reduces

Wireless Vulnerabilities

At home your next door neighbor with a UHF

scanner may listen to your cordless phone calls[1]

At the coffee shop the person next to you might

sniff your wireless connection

Stealing your credit card numbers passwords Facebook

credentials

Conclusion

Open broadcast infrastructures such as Wireless

LANs (WLANs) are relatively vulnerable

1 For the last decade or so it has been illegal for a nongovernmental person to purchase a scanner with

these capabilitieshellip

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 4: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Growth Drivers

1 Convenience

2 Cost

Dynamics

Gilders Law

Total bandwidth of communication systems triples every twelve months

Metcalfes Law

Value of a network is proportional to the square of the number of nodes

As a network grows the value of being connected to it grows exponentially while the cost per user remains the same or reduces

Wireless Vulnerabilities

At home your next door neighbor with a UHF

scanner may listen to your cordless phone calls[1]

At the coffee shop the person next to you might

sniff your wireless connection

Stealing your credit card numbers passwords Facebook

credentials

Conclusion

Open broadcast infrastructures such as Wireless

LANs (WLANs) are relatively vulnerable

1 For the last decade or so it has been illegal for a nongovernmental person to purchase a scanner with

these capabilitieshellip

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 5: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Vulnerabilities

At home your next door neighbor with a UHF

scanner may listen to your cordless phone calls[1]

At the coffee shop the person next to you might

sniff your wireless connection

Stealing your credit card numbers passwords Facebook

credentials

Conclusion

Open broadcast infrastructures such as Wireless

LANs (WLANs) are relatively vulnerable

1 For the last decade or so it has been illegal for a nongovernmental person to purchase a scanner with

these capabilitieshellip

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 6: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Governmental Regulations

In US electromagnetic frequencies used for

communications are treated as a public

resource and are regulated by the FCChttpwirelessfccgovindexhtmjob=rules_and_regulations

Governmental regulation means that

Wireless systems that in different countries

may operate on different frequencies

Allocated wireless frequencies often donrsquot

match the frequencies allocated in other

countries

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 7: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Industrial Scientific and Medical Bands

In US WLANs can operate in three radio spectrum

areas aka the ISM bands

1 Industrial

2 Scientific

3 Medical

In general communications equipment must accept

any interference generated by ISM equipment

80211b operation falls under the ISM mandate

while 80211a operation falls under the National

Information Infrastructure (U-NII) mandate

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 8: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Cellular Network Elements Cell Tower

Base Station Controller (BSC)

Mobile Switching Center (MSC)

Visiton Location Register (VLR)

Home location Register (HLR)

Mobile Identity Number (MIN)

Equipment Identity Register (EIR)

Authentication Center (AuC)

Operations and (OMC) Maintenance Center

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 9: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Networking

Spread Spectrum the de facto wireless LAN

communication standard

Broadcasts signals over a range of frequencies

Originally developed for military use to provide

secure mission-critical communications

Provides some immunity to interference associated

with narrowband systems

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 10: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Spread Spectrum RF Technologies

Different spread spectrum RF technologies for

Wireless LANs

1 Direct Sequence Spread Spectrum (DSSS)

2 Frequency Hopping Spread Spectrum (FHSS)

3 Orthogonal Frequency Division Multiplexing (OFDM) a multi-

carrier modulation scheme where data is split up among

several closely spaced subcarriers

4 MIMO--multiple-input multiple-output

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 11: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

IEEE 80211 Family

Most popular wireless LAN standards

1997 IEEE accepts 80211 Specification

Specifies an over-the-air interface between

A mobile device wireless client and a base station or

Between two mobile device wireless clients

Wireless uses ISM Band

ISM Bands are

902-908 MHz

24-24835 GHz

5725-5825 GHz

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 12: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

80211 Standard Family

Protocol ReleaseFrequen

cyThroughput

Mod-ulation

Indoor Range

Outdoor Range

80211 1997 24GHz 2Mbps 20m 100m

80211a 1999 5GHz 54Mbps OFDM 35m 120m

80211b 1999 24GHz 11Mbps DFSS 38m 140m

80211g 2003 24GHz 54Mbps OFDM 38m 140m

80211n

Est 2009

245GHz

248Mbps MIMO 70m 250m

DRAFT STANDARD

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 13: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

80211 Channels and Throughputs

Channels

Available Throughputs

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 14: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

80211 Standard

Specifies physical and medium access control

(MAC) network layer attributes

Physical layer responsible for transmission of data

among nodes

Can use direct sequence spread spectrum frequency

hopping spread spectrum or infrared pulse position

remodulation

MAC Layer consists of a set of protocols responsible

for maintaining order on the shared medium

IETF specifies upper two levels

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 15: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

MAC Layer Services

Data transfer

CSMACA Carrier Sense Multiple AccessCollision Avoidance

Association

In Infrastructure mode establishes wireless links between wireless clients and access points

Re-association

Takes place when a wireless client moves from one Basic Service Set (BSS) to another

Authentication

Proves a clientrsquos identity with 80211 Wired Equivalent Privacy (WEP)

Shared key configured into the access point and each client

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 16: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

80211 MAC Layer Services (cont)

Privacy

By default data transfers in the clear

Optional WEP encryption

RC-4 in output feedback mode

Secret key shared between mobile and base stations hellip

Flawed implementation hellip

Using CRC-32 checksum another vulnerability

No protection against replay attacks

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 17: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Ad Hoc Mode

Denotes a mesh wireless network where the computers are connected in a peer to peer topology

Infrastructure Mode

Centered around a wireless access point (WAP) A WAP is a centralized wireless device that controls the traffic in the wireless medium

80211 WLAN Operational Modes

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 18: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Association Frames

Before communicating data mobile wireless

clients and access points must establish a

relationship or an association

Three Possible States

1 Unauthenticated and unassociated

2 Authenticated and unassociated

3 Authenticated and associated

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 19: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Service Set Identifier (SSID) and Basic

Service Set

Channel and service set identifier must be configured for a

WLAN to function

SSID is an alphanumeric string that differentiates networks

operating on the same channel and functions as a unique

identifier

In infrastructure mode one access point (AP) together with

all associated stations (STAs) is called a Basic Service Set

(BSS)

Each BSS is identified by an BSSID

In infrastructure mode a basic BSS consists of at least one AP

and one STA

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 20: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wired Equivalent Privacy (WEP)

Mechanism for securing wireless LAN data

streams

Part of original 80211 standard

Utilized RC 4 stream cipher

Symmetric scheme same key encrypts and

decrypts

To encrypt keystream is X0Red with plaintext

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 21: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

RC-4WEP Encryption Process

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 22: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

WEP Goals

Access control

Prevent users lacking WEP key from gaining

network access

Privacy (Confidentiality)

Protect wireless LAN data streams by

encrypting them

Allowing decryption only by users with

correct WEP keys

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 23: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

WEP Authentication Methods

Client cannot participate in a wireless LAN

until after client is authenticated

Two types

1 Open

Open the default authentication protocol

authenticates any request

2 Shared Key

Considered a null authentication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 24: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Shared Key Authentication

Utilizes a shared secret key to authenticate station to APbull Uses

Challenge and response

Anyone without assigned key is denied access

Same shared key encrypts and decrypts

Note this vulnerability

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 25: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

WEP Key Management

Shared key resides in each stationrsquos

Management Information Database (mib)

Two schemes

1 A set of four default keys are shared by all

stations including the wireless clients and

their access points

2 Each client establishes a key mapping

relationship with another station

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 26: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Popular WEP Cracks

Passive attacks that decrypt traffic based on

statistical analysis

Active attacks that inject new traffic from

unauthorized mobile stations

Based on known plaintext (ARPs)

Active attacks that decrypt traffic based on tricking

the access point

Dictionary-building attacks that after an analysis of

an appropriate volume of traffic allow real-time

automated decryption of all traffic

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 27: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

WPA and WPA2

WPA instant response to WEP flaws

WPA2 part of 80211i standard

Attempts to address WEPrsquos security flaws

Consists of two encryption approaches

1 TKIPMIC

2 AES-CCMP

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 28: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

80211 Supports RADIUS

Remote Authentication Dial In User Services (RADIUS) and Kerberos

Until the client is authenticated 8021x access control allows only Extensible Authentication Protocol over LAN (EAPOL) traffic through the port to which the client is connected

After successful authentication normal traffic can pass through the port

Also supports EAP EAP-TLS and LEAP

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 29: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

EAP and LEAP

bull Rather than a specific authentication

mechanism Extensible Authentication Protocol

(EAP) is an authentication framework that

provides some common functions and

negotiation of authentication methods (called

EAP methods)

bull LEAP is a proprietary EAP method that uses a

modified version of MS-CHAP

bull Lightweight Extensible Authentication Protocol

(LEAP) developed by Cisco Systems

bull Cracked in early 2004 when Joshua Wright released

ASLEAP

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 30: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

PEAP

Designed to correct deficiencies in EAP

Protected Extensible Authentication Protocol

(PEAP) a protocol that encapsulates EAP

within a potentially encrypted and

authenticated Transport Layer Security (TLS)

tunnel

bull Jointly developed by Cisco Systems Microsoft

and RSA Security

bull aka Protected EAP or PEAP

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 31: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

WLAN Threats

Denial of Service Attacks

Many potential vectors

For example Microwave ovens operate in the 24 GHz range

SSID Problems

Default

The Broadcast Bubble

Extends past your building

War Driving

Rogue Access Points

MAC Spoofing defeats MAC filtering

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 32: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Hacking Tools

Kismet

Layer 2 wireless network detector sniffer and intrusion detection system

Sniffs 80211 a b and g traffic

NetStumbler

Functions as a high level WLAN scanner

WEPCrack

Open source tool for breaking 80211 WEP secret Keys

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 33: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Wireless Hacking Tools

AirCrack

WLAN and WEP auditing tool

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 34: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Securing WLANs

Includes strategies for MAC address filtering

firewalls or a combination of protocol based

or standards based measures

Standards and Policy Based Solutions

Address ownership and control of wireless

MAC Address Filtering

Time consuming limited effectiveness

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 35: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Securing WLANs

SSID Solutions

If the SSID is set to manufacturers default settings it often means that the other measures are also at default

SSID should not reflect companyrsquos name division or products

Antenna Placement

Should be incorporated into site survey and site updates

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 36: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Other Measures

VLANS

VPNs

Wireless RADIUS

Dynamic WEP Keys

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 37: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Want Security Donrsquot use WEP

Enable WPA2

Employ regular scans to find rogue access

points

Consider network based Intrusion detection

on the wireless LAN

Employ Logging

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 38: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

TKIP

bull Temporal Key Integrity Protocol (TKIP) was

designed by the IEEE 80211i task group and

the Wi-Fi Alliance as a solution to replace

WEP without requiring the replacement of

legacy hardware

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 39: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

CCMP

bull Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol

(CCMP) was created to replace TKIP and

WEP

bull CCMP uses Advanced Encryption Standard

(AES) algorithm with a 128-bit key and a 128-

bit block

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 40: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Bluetooth

A simple peer to peer protocol created to

connect multiple consumer mobile

information devices (cell phones laptops

printers camerashellip)

Whenever any Bluetooth enabled devices

come within range of each other they

instantly transfer address information and

establish small networks between each other

without the user being involved

Questions

Page 41: Wireless Networks: Basics and Auditingcybersd.com/secplus11/lectures2/Wireless.pdf · Wireless Growth Drivers 1. Convenience 2. Cost Dynamics Gilder's Law Total bandwidth of communication

Questions