240 likes | 359 Views
Explore the evolution of WiFi security and uncover its weaknesses and attack scenarios. This comprehensive guide by Senior Security Advisor Hasain Alshakarti outlines best practices for protecting your enterprise and mobile clients. Learn about security management tools like WEP, WPA, and WPA2, along with techniques for strong authentication and encryption. Discover the importance of managed configurations, network segmentation, and identity management to safeguard against threats. Gain insights into user awareness and network access protection to ensure a secure wireless environment.
E N D
SIM313 The Ultimate Guide to Wireless Network Security HasainAlshakarti Senior Security Advisor TrueSec
Agenda • The Evolution of WiFi Security • Weaknesses & Attack Scenarios • Best Practice Protecting the Enterprise • Best Practice Protecting the Mobile Client
The Evolution of WiFiSecurity Security Management Compatibility • Proprietary • WEP • WPA • WPA2
The Evolution of WiFi Authentication Security Management Compatibility • Proprietary • Open • Shared • PSK • 802.1x
WiFi Security – The Wrong Way • MAC address filtering • Disable SSID broadcast • Static IP Addressing • Rogue AP Detection & Wireless IPS
Weaknesses & Attack Scenarios • Attacking the client • Open Networks • Fake AP / EvilTwin • Weak Authentication • Attacking the Infrastructure • Crackthe secret • Brute force • Weak Encryption
Free WIFI anybody? demo
Best Practice Protecting the Enterprise • Managed Configuration • Security misconfigurations are common! • 802.1x & WPA2 • Sufficient Authentication • Sufficient Encryption • Network Access Protection • Added Benefits!
Best Practice Protecting the Enterprise • Managed Configuration • Group Policy • No Client/Local Override! • Identity Management • Active Directory & Certificate Services • Server Validation • Server Certificates • Network Segmentation • Guest Access, Corp Access, Quarantine etc.
Best Practice Protecting the Enterprise • 802.1x & WPA2 • EAP-types • PEAP [Extensibility] • EAP-TLS [Compatibility] • Mutual Authentication • Strong Encryption [AES] • Redundant Radius(NPS) servers • Availability
Best Practice Protecting the Enterprise • Network Access Protection • Computer AND User Authentication • Health Validation • Auto Remediation • Quarantine Non-Healthy Clients
Best Practice Protecting the Mobile Client • User Awareness • Is this my network? • Strong Mutual Authentication • Do not forget the Server! • Combine with “VPN” on Open Networks • Disable AD-Hoc • Host Firewall • WLAN interface = Public Profile • LAN/WLAN Switching • Disable Windows 7 Wireless Hosted Network
Trustworthy Computing Safety and Security Center http://www.microsoft.com/security Security Development Lifecycle http://www.microsoft.com/sdl Security Intelligence Report http://www.microsoft.com/sir End to End Trust http://www.microsoft.com/endtoendtrust
Resources • Connect. Share. Discuss. http://northamerica.msteched.com Learning • Sessions On-Demand & Community • Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning • Resources for IT Professionals • Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn