1 / 55

Wireless Threats and Vulnerabilities

Agenda. The Changing Face of Wireless802.11 a/b/g/n/i802.11 basics802.11 vulnerabilitiesProtecting 802.11802.11 Policy, Audit, EnforcementHome grown vs. EnterpriseMore than Wireless SecurityBluetoothBluetooth basicsBluetooth vulnerabilitiesToolsPolicy, Audit, EnforcementMore than Just a Headset.

kiet
Download Presentation

Wireless Threats and Vulnerabilities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Wireless Threats and Vulnerabilities

    2. Agenda The Changing Face of Wireless 802.11 a/b/g/n/i 802.11 basics 802.11 vulnerabilities Protecting 802.11 802.11 Policy, Audit, Enforcement Home grown vs. Enterprise More than Wireless Security Bluetooth Bluetooth basics Bluetooth vulnerabilities Tools Policy, Audit, Enforcement More than Just a Headset Other Wireless IrDA RFID Wi-Max On the Road Protection Blackberry, PDA, Smart phone Laptops New and Interesting Technology This page lists the “changing face” of wireless technologies. This page lists the “changing face” of wireless technologies.

    3. Wireless This page shows images of various kinds of wireless devices including, blue tooth headsets, cell phones, wireless mouses, satellite dishes, traffic signals. It also shows an image of a subscriber station (SS) and a base station (BS) and shows how information flows through an ISP (internet service provider). This page shows images of various kinds of wireless devices including, blue tooth headsets, cell phones, wireless mouses, satellite dishes, traffic signals. It also shows an image of a subscriber station (SS) and a base station (BS) and shows how information flows through an ISP (internet service provider).

    4. Today’s Wireless Landscape This page is an accessible graph that shows the standards, speed, range and applications for various networks in today’s wireless landscape.This page is an accessible graph that shows the standards, speed, range and applications for various networks in today’s wireless landscape.

    5. 802.11 802.11 basics 802.11 vulnerabilities Protecting 802.11 802.11 Policy, Audit, Enforcement Home grown vs. Enterprise More than Wireless

    6. Wireless Comparisons 802.11 Chart This accessible chart (which is not showing border lines) shows speed, range, compatibility between standards, frequency, general popularity and costs for 802.11A, 802.11B and 802.11C.This accessible chart (which is not showing border lines) shows speed, range, compatibility between standards, frequency, general popularity and costs for 802.11A, 802.11B and 802.11C.

    7. 802.11 Encryption WEP RC4 (Wired Equivalent Privacy). WEP's encryption is broken, meaning that with a sufficient amount of network traffic, the WEP key may be extracted and used to connect to the network or sniff traffic. Using WEP doesn't assure security even for a single user on a home network WPA RC4 (Wi-Fi Protected Access). WPA revised WEP's weakness, and is widely supported. WPA includes the TKIP (Temporal Key Integrity Protocol) key. A properly chosen TKIP provides perfectly adequate security for a home user. WPA2 AES This newer version of WPA adds a stronger encryption key format known as CCMP (Counter-mode CBC MAC Protocol) that is a form of AES (Advanced Encryption System). CCMP is considered one of the most secure methods.

    8. 802.11 Basics 802.11n Multiple antennas to gain speeds at a minimum of 108 Mbps 802.11i Robust Secure Network WPA TKIP RC4 WPA2 AES SWLAN NSA Type-1 Encryption + 802.11b up to DoD Secret

    9. 802.11 Vulnerabilities Native in the clear Associate with any WAP Easy to scan Windows Wireless Zero Configuration vulnerabilities in XP Home use WAP Security weak MAC filtering Static IP WEP WPA Pass Phrase

    10. Did You Pay to Connect to an Evil Twin? This page shows a picture of a Starbucks coffee shop (where there is often wireless available) a detour sign and a photo of a person getting out of a car with a wireless laptop.This page shows a picture of a Starbucks coffee shop (where there is often wireless available) a detour sign and a photo of a person getting out of a car with a wireless laptop.

    11. War Driving Equipment (the rig) Laptop --- $1399 Wireless card --- $67 Antenna --- $10 (homebrew) Scanning Software ---Free GPS (optional) This page has a photo of a group of college students walking through the streets of downtown Washington DC where with their laptops they are able to identify and intercept wireless transmissions. This page has a photo of a group of college students walking through the streets of downtown Washington DC where with their laptops they are able to identify and intercept wireless transmissions.

    12. Equipment Antennas Omni-directional Mast mount Semi-directional Yagi Highly-Directional Grid Parabolic Home Brew Antennas This page has a photo of 3 people taking a large solar blanket type item out of a box in a dry dessert like environmen.tThis page has a photo of 3 people taking a large solar blanket type item out of a box in a dry dessert like environmen.t

    13. Equipment Laptops Windows Linux Mac OS X Handhelds HP iPaq Sharp Zaurus This page shows 3 pictures all of wireless phones, laptops in cars and handheld devices. This page shows 3 pictures all of wireless phones, laptops in cars and handheld devices.

    14. Equipment Scanning Software Net Stumbler www.netstumber.com Airopeek www.wildpackets.com Wellenreiter www.remote-exploit.org KISMET www.kismetwireless.net AirSnort airsnort.shmoo.org This page shows a screen shot of a computer file that shows scanning software and how the data shows up.This page shows a screen shot of a computer file that shows scanning software and how the data shows up.

    15. Wi-Finders This page shows 9 photos of Wi-finders that can be purchased and a web link to http://www.kensington.com/html/3720.html# to get more informationThis page shows 9 photos of Wi-finders that can be purchased and a web link to http://www.kensington.com/html/3720.html# to get more information

    16. Security Policy Enterprise Equipment WPA2 WIDS/IPS IDS DMZ Configuration Control Authentication Certificate Exchange Event monitoring

    17. Home 802.11 Security Security WEP WPA Pass Phrase Encryption Mac Filtering SSID VPN Don’t auto connect Best Practices…what not to do on your wireless segment DMZ Firewalls Safe system…turn off file sharing

    18. WIDS Different flavors Detect anomalies on wired segments Rogue Access Point detection Policy Enforcement Limited NAC like evaluation WAP based IDS Server Based IDS

    19. Sensor Based WIDS This page shows a graphic of people using laptops from offices and vehicles. It shows how unauthorized clients can easily gain access to the Enterprise Network. This page shows a graphic of people using laptops from offices and vehicles. It shows how unauthorized clients can easily gain access to the Enterprise Network.

    20. Securing Enterprise Wireless The Security Policy Authentication Authorization VPN DMZ Wireless on their own VLAN Hardened wireless gateway Device policy enforcement Configuration Control Passwords on devices Auto erase on devices when password authentication fails a set number of times Physical examination of site regularly Wireless Audits WIDS/IPS IDS

    21. Things Not to Do on a Wireless Network Passwords Banking Credit Cards PII exchange File Sharing Bridging

    22. It’s More Than Wireless Security Configuration Control Bridging Patching Anti-virus VPN File Encryption Ports, Services DMZ WAPs outside the network Hidden wireless

    23. Demonstrations This page shows 3 photos that were used during a demonstration. One shows a dish of food, one shows a cartoon of people with square heads talking and the third shows two characters who look like M&Ms.This page shows 3 photos that were used during a demonstration. One shows a dish of food, one shows a cartoon of people with square heads talking and the third shows two characters who look like M&Ms.

    24. Bluetooth Bluetooth basics Bluetooth vulnerabilities Tools Policy, Audit, Enforcement More than Just a Headset

    25. Bluetooth Short-range communications 3-300ft 2.4 to 2.485 GHz range Spread spectrum Adaptive frequency hopping (reduce interference) Full duplex signal 79 Channels Algorithm based on Master ID and previous channel Interference with WiFi (device range <10M) Voice Synchronous Connection Oriented (SCO) Data Asynchronous Connection Less (ACL)

    26. The Bluetooth Connection Media Access Control (MAC) Wireless Personal Area Network (WPAN) Point-to-Point Point-to-Multipoint Pairing (Agreement) Service Discovery Protocol This page shows a screen on blue tooth set up where one can choose SerialPortThis page shows a screen on blue tooth set up where one can choose SerialPort

    27. The Bluetooth Stack This page shows an image of Host controller interfaces and how the Bluetooth Radio interfaces with it. This page shows an image of Host controller interfaces and how the Bluetooth Radio interfaces with it.

    28. Bluetooth Networking Piconet (PAN) Master Slave 8 Devices Scatternet Two or More Piconets Master/Slave between Piconets Bandwidth reduced if > 10 PANs in 10 Meter radius This slide shows a graphic where one laptop is considered the “master” and other devices connected t it are “slaves” such as other laptops and wireless phones. This slide shows a graphic where one laptop is considered the “master” and other devices connected t it are “slaves” such as other laptops and wireless phones.

    29. Making the Bluetooth Connection Pairing During pairing there is a key exchange Part of initial key exchange occurs in the clear Once paired a trust relationship is built using the link key Identification based on BD_addr (MAC Address)

    30. Closer look at the paring Needs 128bit Random Number, PIN, Bluetooth Hardware Address (BD_ADDR) 128Bit Random number transmits in the clear between devices Random Number, PIN, and BD_Addr go through magic “E22” which is a function creating the initial key Initial key is used to create 128bit random numbers which will serve as the asynchronous “Link” key

    31. Bluetooth Uses Cars Phones PDAs Not on my laptop Printers Earpieces Keyboard, mice Coke Machines EKG

    32. Why a Blue Attack? Listening Hooking up? Open Microphone Dialing for dollars Contacts, Notes, Email

    33. Blue Methods of Attack MAC spoofing Break link encryption Crack link encryption Individual implementation vulnerabilities

    34. The Blue Hacks BlueJacking- Sending messages to unsuspecting recipients Toothing- Engaging in chance ‘encounters’ using Bluetooth messages Bluebug- access to ATtention (AT) command set Audio Interception This picture shows a man with his head down on his desk in front of a laptop computer. This picture shows a man with his head down on his desk in front of a laptop computer.

    35. Blue Attacks Snarfing - Device manipulation Chaos - Call, SMS, Phonebook Denial of Service (BlueSmack) Viruses (Cabir) Cabir hit Europe and Asia in June 2004 Cabir.H and Cabir.I discovered in Santa Monica California Cabir blocks Bluetooth connectivity and drains the device battery Affects Symbian OS devices This slide shows a blown up small item that looks like a pollen spore. This slide shows a blown up small item that looks like a pollen spore.

    36. Vulnerable Phones This screen shot shows a vulnerability matrix. It is found in accessible format at http://www.thebunker.net/resources/bluetoothThis screen shot shows a vulnerability matrix. It is found in accessible format at http://www.thebunker.net/resources/bluetooth

    37. The Blue Bad News BAD - Bluetooth headsets Default PINs generally 0000, or 1234 are hard coded into the Bluetooth headsets WORSE – Bluetooth cars, are generally left in discoverable mode and subject to surveillance/interception

    38. Your Bluetooth Not Discoverable Not a problem ? Bluetooth Hardware Space is limited to 00:00:00:00:00:00 -> FF:FF:FF:FF:FF:FF Isn’t that 281,474,976,710,655 possible addresses? Manufacturer codes eg: Motorola = C6:F7:4A:XX:XX:XX now we have 16,777,215 possible devices to look for Redfang/Green Plague

    39. Blue Toys…Blue Sniper Rifle Uses “gumstix” computer with onboard Bluetooth (no laptop necessary) Yagi type antenna increases range up to 2 miles!!! Parts are cheap and readily available Extends range for attack This page shows a person with a gun with a scope aiming at something. This page shows a person with a gun with a scope aiming at something.

    40. Blue Sniffing and… Smurf MeetingPoint BTScanner BlueSweep BlueWatch (not free) Blue Jack This slide shows a picture of a little blue SMURF.This slide shows a picture of a little blue SMURF.

    41. Securing Bluetooth Disable and uninstall Bluetooth Do not allow device to be “found” Update firmware (ROM) Do not allow paired devices unverified connectivity Storing sensitive corporate information should NEVER be allowed Use encryption technology PED must have the latest security patches installed on their operating system Uninstall unused drivers This page shows a chain with a lock on it. This page shows a chain with a lock on it.

    42. Demonstrations This page shows 3 photos that were used during a demonstration. One shows a dish of food, one shows a cartoon of people with square heads talking and the third shows two characters who look like M&Ms. This page shows 3 photos that were used during a demonstration. One shows a dish of food, one shows a cartoon of people with square heads talking and the third shows two characters who look like M&Ms.

    43. IrDA Laptop Phone Blackberry PDA Keyboards/Mice Is yours enabled? Easy transfer Banana sticker EEKKKK File Sharing is on……

    44. RFID This page shows pictures of several different uses for Radio Frequency Identification including passports, smart cards, and vending machines.This page shows pictures of several different uses for Radio Frequency Identification including passports, smart cards, and vending machines.

    45. EvDO Evolution Data Only, Evolution Data Optimized High speed Always on 2.4 mbps bandwidth Supported by some cell phones PCMCIA cards

    46. WiMAX This page shows a graphic where: Residential & SoHo DSL Level Service Fractional E1 for small business Mobile backhaul WMAN nomadic coverage handoffs from HOT SPOTS Wide area coverage outside of hotspots. The rest of the graphic shows the internet backbone, the BWA Operator Backbone and the T1+level service enterprises. It shows 802.16d an d802.16cThis page shows a graphic where: Residential & SoHo DSL Level Service Fractional E1 for small business Mobile backhaul WMAN nomadic coverage handoffs from HOT SPOTS Wide area coverage outside of hotspots. The rest of the graphic shows the internet backbone, the BWA Operator Backbone and the T1+level service enterprises. It shows 802.16d an d802.16c

    47. 802.16 Wi-MAX Basics This accessible graphic shows the 802.16 Wi-fi Max Basics. This accessible graphic shows the 802.16 Wi-fi Max Basics.

    48. How It Works This graphic shows how WiMax Works. IEEE 802/16 standards define how wireless traffic will move between subscribers and core networks. A subscriber sends wireless traffic at speeds rangin grom 2M to 155M bit/sec from a fixed antenna on a building. The base station receives transmissions from multiple sites and sends traffic over wireless or wired links to a switching center using 802.16 protocol. The switching center sends traffic to an ISP or the public switched telephone network. http://www.networkworld.com/news/tech/2001/0903tech.html This graphic shows how WiMax Works. IEEE 802/16 standards define how wireless traffic will move between subscribers and core networks. A subscriber sends wireless traffic at speeds rangin grom 2M to 155M bit/sec from a fixed antenna on a building. The base station receives transmissions from multiple sites and sends traffic over wireless or wired links to a switching center using 802.16 protocol. The switching center sends traffic to an ISP or the public switched telephone network. http://www.networkworld.com/news/tech/2001/0903tech.html

    49. Wi-MAX Security Issues and Mitigations Security Issues Use of poorly implemented DES Poor authentication scheme Mitigations Use AES-CCM as encryption primitive Use flexible EAP authentication scheme

    50. Ohhhh yeah…I have a cell phone…. No radio transmission is totally secure Several Secure NSA Type-1 certified GSM cellular phones New Smart Card VPN mini SD

    51. On the Road Protection Blackberry PDA Smart phone Laptops Who are you connecting to? How are you protecting your data? VPN? What is the health of your device? Are you really on a wired segment?

    52. Interesting Wireless Issues Laptop Configuration Management Laptop Patch Management Data Protection/Encryption Hotel/Hot Spot WAPs (Evil Twin) VPN Cell phone encryption PDA encryption 2 Form Factor Authentication

    53. New and Interesting Technology/Tools WIDS/IPS Wireless Mess Smart Card VPN NAC PCI Management System Smart Encryption DAR/DARTT GSA SmartBuy

    54. Recommended References Trifinite.org NIST 800-48 Wireless Security Implementation Guide, Defense Information Systems Agency Wireless Security Checklist, Defense Information Systems Agency Open-Source Security Testing Methodology Manual, Institute for Security and Open Methodologies Wi-Foo The Secrets of Wireless Hacking Real 802.11 Security Wi-Fi Protected Access and 802.11i Wireless Security: Ensuring Compliance with HIPAA, GLBA, SOX, DoD 8100.2 and Enterprise Policy, AirDefense, www.airdefense.com Weaknesses in the Temporal Key Hash of WPA, Vebjorn Moen, Havard Raddum, Kjell Hole, University of Bergen, Norway Security Flaws in 802.11 Data Link Protocols, Nancy Cam-Winget, Russ Housley, David Wagner, Jesse Walker Securing a Wireless Network, Jon Allen, Jeff Wilson Securing Wireless Data: System Architecture Challenges, Ravi, Raghunathan, Potlapally, Computer and Communications Research Labs NEC USA Solving the Puzzling Layers of 802.11 Security, Mischel Kwon 802.11 Security, Praphul Chandra NIST Wireless Network Security 802.11, Bluetooth and Handheld Devices, Tom Karygiannis, Les Owens Cisco SAFE: Wireless LAN Security in Depth http://www.iwwst.org.uk/Files/2003/FinalPN.pdf http://video.interop.com/presentations/unified-wired-s-sundaralingam.pdf

    55. Questions

More Related