securing wireless networks the myth.pdf · debunking the myths. 2 chaffey college chino information...

35
Chaffey College Chaffey College Chino Information Technology Center Chino Information Technology Center Steve Siedschlag, Associate Professor Steve Siedschlag, Associate Professor Securing Wireless Networks Securing Wireless Networks Debunking the Myths Debunking the Myths

Upload: others

Post on 15-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor

Securing Wireless NetworksSecuring Wireless NetworksDebunking the MythsDebunking the Myths

Page 2: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

22Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is a Wireless Network?What is a Wireless Network?

The wireless telegraph is not difficult to understand. The ordinThe wireless telegraph is not difficult to understand. The ordinary ary telegraph is like a very long cat. You pull the tail in New Yorktelegraph is like a very long cat. You pull the tail in New York, and it , and it meows in Los Angeles. The wireless is the same way, only withoutmeows in Los Angeles. The wireless is the same way, only without the the cat.cat.

-- Attributed to Albert EinsteinAttributed to Albert Einstein

Page 3: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

33Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is a Wireless Network? What is a Wireless Network? (really)(really)

•• It is a LANIt is a LAN•• Extension of Wired LANExtension of Wired LAN•• Uses High Frequency Radio Waves (RF)Uses High Frequency Radio Waves (RF)•• Speed : 2Mbps to 54MbpsSpeed : 2Mbps to 54Mbps•• Distance 100 feet to 15 miles Distance 100 feet to 15 miles (with fancy antennas)(with fancy antennas)

•• Most importantly, It lets you sit on your deck and use Most importantly, It lets you sit on your deck and use your computer while sipping a cocktail of your choiceyour computer while sipping a cocktail of your choice

Page 4: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

44Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Is Wireless Secure?Is Wireless Secure?

•• Not Not ‘‘Out of the BoxOut of the Box’’•• There are steps you can takeThere are steps you can take

–– None are a total solutionNone are a total solution–– In combination they may be sufficientIn combination they may be sufficient

•• Defense in depthDefense in depth•• Making the hackers Making the hackers ‘‘go next doorgo next door’’

Page 5: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

55Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What Is This Phenomenon of DriveWhat Is This Phenomenon of Drive--by Hacking?by Hacking?

•• Hacker taps into a network using a wireless rig Hacker taps into a network using a wireless rig that allows him to park in front of a building and that allows him to park in front of a building and gain access to your network while sitting in the gain access to your network while sitting in the car. car.

•• Unsecured wireless can be likened to installing a Unsecured wireless can be likened to installing a wired LAN jack in your front yard.wired LAN jack in your front yard.

•• Often referred to as Often referred to as ““WarDrivingWarDriving””

Page 6: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

66Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

•• Term derived from War dialing, made popular in Term derived from War dialing, made popular in the movie War Gamesthe movie War Games

•• All that is required are a few readily available All that is required are a few readily available hardware and software componentshardware and software components–– A PC or PDA with a wireless network cardA PC or PDA with a wireless network card–– Optionally, a GPS and external antennaOptionally, a GPS and external antenna–– Software such as Software such as NetstumblerNetstumbler, Kismet, etc., Kismet, etc.

•• Freely downloadable on the InternetFreely downloadable on the Internet•• Easy for the average computer user to installEasy for the average computer user to install

Page 7: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

77Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

Page 8: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

88Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving (continued)(continued)

•• The software logs configuration of detected The software logs configuration of detected WiFiWiFidevices, optionally including the map locationdevices, optionally including the map location

•• Moving the Moving the WarDrivingWarDriving rig from place to place rig from place to place will eventually develop a large database of will eventually develop a large database of wireless networks and their locations wireless networks and their locations

Page 9: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

99Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving

Page 10: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1010Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

WarDrivingWarDriving (continued)(continued)

•• IS THIS LEGAL?IS THIS LEGAL?–– Probably, if that is all the farther it goesProbably, if that is all the farther it goes–– Accessing a network is another matter entirelyAccessing a network is another matter entirely

•• Definitely NOT legal if you do not have the ownerDefinitely NOT legal if you do not have the owner’’s s permissionpermission

•• Even if you ONLY use it to access the InternetEven if you ONLY use it to access the Internet•• Most Most WardriversWardrivers do NOT access the networks that they do NOT access the networks that they

detectdetect–– Surprised?Surprised?

Page 11: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1111Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Why Is It Easy to Get Into a Wireless Network?Why Is It Easy to Get Into a Wireless Network?

•• The most common wireless local area networks The most common wireless local area networks are built based on a standard known as 802.11are built based on a standard known as 802.11

•• The security of this technology has been The security of this technology has been demonstrated to be inadequate when demonstrated to be inadequate when challenged by simple hacking attemptschallenged by simple hacking attempts

•• In addition, products sold with this technology In addition, products sold with this technology are usually delivered with security functionality are usually delivered with security functionality disabled.disabled.

Page 12: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1212Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What if I Change My NetworkWhat if I Change My Network’’s Name?s Name?

•• That is more than most do, but it doesnThat is more than most do, but it doesn’’t make t make you much more secureyou much more secure–– Your SSID (Service Set ID) is beaconed by your APYour SSID (Service Set ID) is beaconed by your AP–– You can turn off beaconing, but your SSID is still sent You can turn off beaconing, but your SSID is still sent

each time a computer connects and is easily capturedeach time a computer connects and is easily captured•• At least your neighbor will not accidentally connect!At least your neighbor will not accidentally connect!

beacon

beacon

beacon

Page 13: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1313Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

I Also Changed My ChannelI Also Changed My Channel

•• Once again, that is more than most do, but it Once again, that is more than most do, but it does nothing for securitydoes nothing for security–– Windows Windows xpxp will automatically scan all the available will automatically scan all the available

channels for an active access pointchannels for an active access point

•• It is helpful to select a channel that does not It is helpful to select a channel that does not overlap your neighbor!overlap your neighbor!–– This will improve the function of your WLANThis will improve the function of your WLAN–– Most Access Points are set to channel 6 by defaultMost Access Points are set to channel 6 by default

•• Pick 1 or 11 for your APPick 1 or 11 for your AP

Page 14: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1414Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me Secure?Secure?

•• Not if you donNot if you don’’t use it!t use it!–– Less than 50% of detected Less than 50% of detected WLANsWLANs have WEP enabledhave WEP enabled–– Many that do, have 64bit rather than 128bit Many that do, have 64bit rather than 128bit

encryptionencryption

•• Even if you use itEven if you use it……–– The algorithms used are well understood and The algorithms used are well understood and

not considered weak, but the way in which not considered weak, but the way in which they are used has resulted in a number of they are used has resulted in a number of easily exploitable weaknesseseasily exploitable weaknesses

Page 15: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1515Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)

•• WEP weakness WEP weakness –– WEP security flaws were documented in a 2001 UC WEP security flaws were documented in a 2001 UC

Berkley studyBerkley study•• Weak encryption (never intended for repeated use)Weak encryption (never intended for repeated use)•• Short keys (64bits Short keys (64bits –– 24bit Init Vector = 40 bits)24bit Init Vector = 40 bits)•• Static KeysStatic Keys•• No distribution method (shared key)No distribution method (shared key)

Page 16: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1616Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Does the BuiltDoes the Built--in WEP Encryption Option Make Me in WEP Encryption Option Make Me SecureSecure? ? (continued)(continued)

•• There are freely distributed programs that can There are freely distributed programs that can crack WEP keys crack WEP keys (but it takes a while)(but it takes a while)

Page 17: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1717Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What about WPA?What about WPA?

•• WPA is MUCH more secureWPA is MUCH more secure–– Encryption keys are frequently rotatedEncryption keys are frequently rotated

•• Before they can be crackedBefore they can be cracked

–– WPA uses a WPA uses a passphrasepassphrase as the starting point for the as the starting point for the key exchangekey exchange

•• Much more secure if a complex Much more secure if a complex passphrasepassphrase is usedis used–– Several upper & lower case letters, numbers, symbolsSeveral upper & lower case letters, numbers, symbols

–– Can also be used with enterprise systems (RADIUS) Can also be used with enterprise systems (RADIUS) for more securityfor more security

•• Not practical in a home or small officeNot practical in a home or small office

Page 18: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1818Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

So WPA Makes Me Secure?So WPA Makes Me Secure?

•• Not if you donNot if you don’’t use it!t use it!–– Are you seeing a trend here?Are you seeing a trend here?

•• IF you donIF you don’’t use too simple a t use too simple a passphrasepassphrase–– There are tools that will crack There are tools that will crack passphrasespassphrases, but it , but it

could take many could take many yearsyears on a COMPLEX on a COMPLEX passphrasepassphrase

Page 19: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

1919Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

What is MAC Address Filtering?What is MAC Address Filtering?

•• Every network card ever produced has a unique Every network card ever produced has a unique address that can be used to limit access to your address that can be used to limit access to your wireless networkwireless network

•• This feature is disabled by defaultThis feature is disabled by default

Page 20: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2020Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

SoSo……MAC Address Filtering Makes Me MAC Address Filtering Makes Me Secure?Secure?

•• Not if you donNot if you don’’t use it!t use it!–– OK, so this is getting oldOK, so this is getting old

•• Authorized computers send their MAC address Authorized computers send their MAC address when they attempt to connectwhen they attempt to connect–– This can be loggedThis can be logged

•• In spite of what some people believe, MAC In spite of what some people believe, MAC addresses can be changed on most network addresses can be changed on most network cards (at least temporarily)cards (at least temporarily)

Page 21: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2121Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Are You Telling Me ItAre You Telling Me It’’s Hopeless?s Hopeless?

•• NONO–– Most of the security measures we have already Most of the security measures we have already

described work well when used correctlydescribed work well when used correctly–– When several are used in conjunction, they are a When several are used in conjunction, they are a

formidable barrier to attackformidable barrier to attack–– Just being better than the status quo is often enough Just being better than the status quo is often enough

to get the hacker to to get the hacker to ‘‘go next doorgo next door’’

Page 22: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2222Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Why Do I Care?Why Do I Care?

•• Why do I care if somebody uses my connection Why do I care if somebody uses my connection to check their mail?to check their mail?–– If that was all they did, you probably wouldnIf that was all they did, you probably wouldn’’t caret care–– Those engaged in illegal activity on the Internet Those engaged in illegal activity on the Internet

frequently steal network connections to frequently steal network connections to ‘‘conduct conduct businessbusiness’’

•• Try explaining to the FBI or the NSA that you are Try explaining to the FBI or the NSA that you are ‘‘not a not a crookcrook’’

–– Many Viruses, Worms and Denial of Service attacks Many Viruses, Worms and Denial of Service attacks are launched using stolen network connections in are launched using stolen network connections in order to hide the true sourceorder to hide the true source

Page 23: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2323Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Then What Should I Do?Then What Should I Do?

•• Most modern access points support WEP or Most modern access points support WEP or WPAWPA–– Use the highest level of security that your Access Use the highest level of security that your Access

Point and computer network card supports (they must Point and computer network card supports (they must be the same).be the same).

•• MAC filtering and disabling beaconing are good MAC filtering and disabling beaconing are good added measuresadded measures–– This will make it difficult for visitors to connect to your This will make it difficult for visitors to connect to your

networknetwork

•• Change the channel, password and address of Change the channel, password and address of your APyour AP

Page 24: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2424Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

HOWHOW……??

•• You will need to spend a little time in the manual You will need to spend a little time in the manual or website for your access pointor website for your access point

•• Some examples follow, but every AP works Some examples follow, but every AP works slightly differentlyslightly differently

Page 25: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

Chaffey CollegeChaffey CollegeChino Information Technology CenterChino Information Technology CenterSteve Siedschlag, Associate ProfessorSteve Siedschlag, Associate Professor

Wireless LAN Protection StrategiesWireless LAN Protection Strategies

Page 26: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2626Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

RecommendationsRecommendations

•• Wireless LAN related ConfigurationWireless LAN related Configuration–– Enable WEP, use 128bit keyEnable WEP, use 128bit key–– Disable SSID BroadcastsDisable SSID Broadcasts–– No SNMP access No SNMP access –– Use MAC (hardware) address to restrict accessUse MAC (hardware) address to restrict access–– NonNon--default Access Point password default Access Point password –– Change default Access Point NameChange default Access Point Name–– Use 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)

Page 27: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2727Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

Page 28: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2828Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

Page 29: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

2929Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationEnable WEP, use 128bit keyEnable WEP, use 128bit key

Page 30: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3030Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationDisable SSID BroadcastDisable SSID Broadcast

Page 31: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3131Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationNo SNMP access No SNMP access

Page 32: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3232Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Wireless LAN related ConfigurationWireless LAN related ConfigurationUse 802.1x / WPA / 802.11i (when available)Use 802.1x / WPA / 802.11i (when available)

Page 33: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3333Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

General RecommendationsGeneral Recommendations

•• Always (wired or wireless)Always (wired or wireless)–– Install virus protection software plus automatic frequent patterInstall virus protection software plus automatic frequent pattern file n file

updateupdate–– Shared folders must impose passwordShared folders must impose password

•• Management IssueManagement Issue–– Prohibit installation of APProhibit installation of AP’’s without authorizations without authorization–– Discover any new Discover any new APsAPs constantly (constantly (NetStumblerNetStumbler is free, Antenna is cheap)is free, Antenna is cheap)–– Power off Access Point when not in usePower off Access Point when not in use–– Carefully select the physical location of your AP, not near windCarefully select the physical location of your AP, not near windows or ows or

front doors.front doors.

Page 34: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3434Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center

Thank You!Thank You!

•• Computer Network Security Resources at the Robert Pile Chaffey Computer Network Security Resources at the Robert Pile Chaffey College Chino Information Technology CenterCollege Chino Information Technology Center–– CISCIS--420420 PC Security & PrivacyPC Security & Privacy–– CISNTWKCISNTWK--440440 Fund. Of Network Security (Security+)Fund. Of Network Security (Security+)–– CISNTWKCISNTWK--441441 Firewalls & Intrusion DetectionFirewalls & Intrusion Detection–– CISNTWKCISNTWK--442442 Disaster Recovery PlanningDisaster Recovery Planning–– CISNTWKCISNTWK--445445 Windows Security AdministrationWindows Security Administration–– CISNTWKCISNTWK--447447 Linux Security AdministrationLinux Security Administration

Steve SiedschlagSteve Siedschlag [email protected]@chaffey.eduAssociate ProfessorAssociate Professor

Page 35: Securing Wireless Networks the Myth.pdf · Debunking the Myths. 2 Chaffey College Chino Information Technology Center ... • The security of this technology has been demonstrated

3535Chaffey CollegeChaffey College

Chino Information Technology CenterChino Information Technology Center