1 / 9

Wireless Security on the Philippine Setting

Wireless Security on the Philippine Setting. Introduction:. WHOAMI. What’s this all about?. The Philippine Wee-fee setting. 2004 German hacker finds open Wi-Fi networks in Manila

lida
Download Presentation

Wireless Security on the Philippine Setting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security on the Philippine Setting

  2. Introduction: • WHOAMI • What’s this all about?

  3. The Philippine Wee-fee setting • 2004 German hacker finds open Wi-Fi networks in Manila • Sept 2004: Van Hauser discovered that only 15 out of the 66 wireless APs were encrypted • More Wifi networks on Homes and small businesses • Unaware and indifferent • Low or no security (due to cost and convenience) • More direct targets

  4. Wireless Security History • Open Wireless • WEP • - Use of Streaming Algorithm • - Per packet master key re-use • - Group use and sharing of the same PSK • - Lack of Authentication from network to client • - Confidentiality vulnerabilities with header • - Integrity vulnerability and replay attacks • WPA • WPA2

  5. Top Wireless Tools • Kismet • NetStumbler • Aircrack • Airsnort • Kismac • * Pyrit

  6. DEMO Click Me!

  7. How to Secure? • Change the defaults • Long key with wide characters set • MAC Address filtering • Limit connections • Disable DHCP • Hide SSID or a creative SSID • Change your key • Tools • Active security

  8. “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”- Gene Spafford

  9. Credits: • SecurityUncorcked.com • InfosecPhils.wordpress.com • PGHO (Nogie and Aphro)

More Related