SlideShare une entreprise Scribd logo
1  sur  43
Copyright © 2014 CyberSecurity Malaysia
Internet and Computer Security Awareness
Wireless Network Security
Introduction
Copyright © 2014 CyberSecurity Malaysia
The popularity of wireless networks are due to the
cost effectives in deployment, no cabling required
compared to wired network and easy to use as well
as flexible deployment.
WiFi networks are everywhere!
Goals
3
After completion of this lesson, our wireless
communication will never be the same as we
will the potential threats associated to the
wireless network.
Beware of invisible wireless hacker!
Copyright © 2014 CyberSecurity Malaysia
Objectives
4
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
The Invisible Hacker: WiFi Hackers
5
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
WiFi Network Architecture & Principle
6
Station
(STA)
Access Point
(AP)
SSID
Vendor OUI
Cisco (Aironet) 00-04-96
Agere (Orinoco) 00-02-2D
Nokia 00-e0-03
Linksys 00-04-5a
00-04-5a-03-3c-0f
OUI
(Organizationally Unique Identifier)
1
Station
(STA)
Station
(STA)
2
Station
(STA)
Access Point
(AP)
ESSID
3
BSSID = AP MAC AddressMAC Address
4
5
6
Station
(STA)
Access Point
(AP)
SSID
MAC Address
Attacker/ Auditor
Access Point
(AP)
Access Point
(AP)
Managed Mode
Monitor Mode
Master Mode
Ad Hoc Mode
http://standards.ieee.org/regauth/oui/index.shtml
Infrastructure
Ad-hoc
Copyright © 2014 CyberSecurity Malaysia
WiFi Operation Modes
7
Station
(STA)
Access Point
(AP)
SSID
1
Station
(STA)
Station
(STA)
3
Managed Mode Master Mode
Ad Hoc Mode Ad Hoc Mode
Monitor Mode
2
4
Copyright © 2014 CyberSecurity Malaysia
WiFi Networking
8
Probes
Station
Access Point
Beacons
Probes
RequestStation
Access Point
Probes
Response
1
2
3
4 Station Access PointProbe Request
Probe Response
AUTH Request
AUTH Response
Assoc Request
Assoc Response
Copyright © 2014 CyberSecurity Malaysia
The Invisible Hacker: WiFi Hackers
9
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
Wired Network: Possible Attacks
10
Virus & Malware
Attackers
Data Theft
INTERNET
INTRANET
SECURE ENTERPRISE PERIMETER
Desktop
Server
Inside
Threat
Copyright © 2014 CyberSecurity Malaysia
Wireless Network: Possible Attacks
11
Hacker
INTRANET
INTERNET
Desktop
1 Rogue AP Connected
to Network
3 Non-Compliant AP
5 Users Bypassing Network
Security Controls
Public
Wi-Fi AP
2 Leaked Wired Traffic
& Insertion
6 Wi-Fi Phishing
Legitimate Wi-Fi AP Evil Twin
Laptop
AP
Mobile User
Server
4 Neighboring AP
Wi-Fi Network aggravates
Threats to Enterprise Networks
The Invisible Hacker: WiFi Hackers
12
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
WiFi Hacking Highlights
13
A North Carolina Medical
Consulting Firm
Broke into the computer system of a local medical
consulting firm & illegally accessed information of
hundreds of patients, including checks and insurance
forms
Wireless hacking
bust in Michigan
 Two Michigan men repeatedly cracked Lowe’s nationwide
network from a 1995 Pontiac Grand Prix parked outside a
suburban Detroit store.
 Charged with penetrating and intentionally damaging a Lowe’s
system.
 First hopped onto the Wi-Fi network at the store to access the
company’s central data center at Lowe’s headquarters.
 Deployed hacking software, in one case crashing the point of
sale terminals.
A California Public School
District
Unprotected WLAN allowed full unauthorized access to
sensitive files & enabled hackers to upload their own files into
servers
A Texas County Court
Hackers accessed information filed by the clerk of courts by
using only a laptop & wireless card
A Wholesale club
Hacked via wireless network at a store location, credit card data
was stolen AND used to the tune of $20M. The lax security found
by the FTC to be an “unfair trade practice”; now under 9 years of
probation and have to institute security measures and hire 3rd
party auditor
Security causes electronics
giant register ban
Best Buy banned the use of wireless
cash registers at its 492 stores after
learning a hacker may have intercepted
a customer’s credit card number.
Home
Improvement
Store
Electronics
Retailer
Major
Wholesale
Store
Copyright © 2014 CyberSecurity Malaysia
WiFi Problem: Uncontrolled Medium
14
t r
2
The walls of the facility provide a solid line of defense against
intruders
Attacker
RF in the AIR is uncontrolled…
The walls of the facility provide a solid line of defense against
intruders
 With a single access point, walls come tumbling down
 Ethernet now extends to the parking lot!
Attacker
Server Server Server Computer
Copyright © 2014 CyberSecurity Malaysia
WiFi Problem: RF Signal Propagation
15
THIS IS THE ATTACK SURFACE
Copyright © 2014 CyberSecurity Malaysia
WiFi Problem: Extending Antenna
16
A Dual-Use Homebrew
Product – Pringles Cans
http://www.oreillynet.com/lpt/wlg/448
Yagi Antenna Omni Antenna
Copyright © 2014 CyberSecurity Malaysia
WiFi Problem: Free WiFi Hacking Tools
Copyright © 2014 CyberSecurity Malaysia
WiFi Problem: WiFi Communication
Evolving to…
Workstation
Access Point
Rogue Access Point Ad Hoc
Network
Legit
Association
Malicious
Association
Hacker / Soft AP
Employee Station Company Access
Point
Rogue Access Point
Employee AP
Neighbor AP
Neighbor Station
Copyright © 2014 CyberSecurity Malaysia
WiFi Threat: Soft Access Points
WiFi Threat: Weak Configuration
Common Mistakes in Wireless Implementations
Descriptive SSID
e.g. BANK_NAME SSID
Vulnerable Encryption Setting
e.g. WEP Encryption
Access Point’s Coverage Areas
e.g. A very good quality of access point signal
from across the road
Copyright © 2014 CyberSecurity Malaysia
WiFi Threat: Factory Configuration
Copyright © 2014 CyberSecurity Malaysia
WiFi Threat: Connecting to WiFi Network
22
 accidental association
 malicious association
 malicious access points
 vulnerable access points
Don’t You Know?
Copyright © 2014 CyberSecurity Malaysia
WiFi Threat: WiFi DoS
23
Hacker Station
(CommView, Aircrack-ng)
Access Point Client Station
(User)
Access Point Client Station
(User)
Signal Generator
(YDI PSG-1)
Physical Layer DoS
MAC Layer DoS
DoS Against a AP: shutdown the target AP from communicating with any device
DoS Against a Station: shutdown the Station from communicating with any device.
Broadcast: shutdown any network devices
Data flooding
Jamming signal
Copyright © 2014 CyberSecurity Malaysia
The Invisible Hacker: WiFi Hackers
24
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
WiFi Protocol Attack
25
BSSID = 00:1A:70:E5:E1:91
ESSID = linksys
WEP = aa:bb:cc:dd:ee
Attacker MAC STA = 06:14:A4:27:FB:12
Fake Authentication Attack
ARP Request Replay Attack
Copyright © 2014 CyberSecurity Malaysia
WiFi Protocol Attack (cont’d)
26Copyright © 2014 CyberSecurity Malaysia
27
WiFi Protocol Attack (cont’d)
Copyright © 2014 CyberSecurity Malaysia
28
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
The Invisible Hacker: WiFi Hackers
Copyright © 2014 CyberSecurity Malaysia
Wireless Man-in-the-Middle Attack
Copyright © 2014 CyberSecurity Malaysia
Wireless DoS Against WiFi Client
• Against a AP: Keeps all traffic from communicating with the rest of the network
• Against a Station: Keeps the Station from Communicating with any device.
• Broadcast: All network devices including some Internal networks shutdown
• Injected Traffic: Spanning Tree, Routing Information, Typical DoS
Target
(User) AP1
2
ORIGINAL MAC: 00 12 2D 50 43 1E
NEW MAC: 00 02 2D 50 D1 4E
MAC: 00 02 2D 50 D1 4E
3
3. Send Disassoc & Deauth frames
2. Impersonate AP by spoofing the
MAC
1. User enjoying good connection
Copyright © 2014 CyberSecurity Malaysia
Windows Preferred Network List
 Attack against personal anonymity
 Wireless technology is inherently
chatty and often uniquely tied to
the user
 Wireless cards will periodically
search for their preferred networks
by name
 Attacker can eavesdrop on this
conversation to identify unique
names
 Can associate location to network
name
Copyright © 2014 CyberSecurity Malaysia
The Invisible Hacker: WiFi Hackers
32
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
Choose Right Hardware
33Copyright © 2014 CyberSecurity Malaysia
Detected WiFi Network @ Putrajaya
Copyright © 2014 CyberSecurity Malaysia
WiFi Traffic Decryption Method
35
BSSID = 00:1A:70:E5:E1:91
ESSID = linksys
WEP = f0:00:f0:D0:f0
Attacker MAC STA = 06:14:A4:27:FB:12
Victim MAC STA = 00:13:E8:27:EF:C1
Copyright © 2014 CyberSecurity Malaysia
WiFi Traffic Decryption Method
36Copyright © 2014 CyberSecurity Malaysia
WiFi Hackers Can See Your Password
37
WiFi Hackers Can See Your Email
38Copyright © 2014 CyberSecurity Malaysia
WiFi Hackers Can See Your IM Chat
39Copyright © 2014 CyberSecurity Malaysia
The Invisible Hacker: WiFi Hackers
40
WiFi Network Fundamentals
Wired Network vs. WiFi Network
Common Problem and WiFi Threats
WiFi Protocol Attacks
WiFi Client Attacks
WiFi Data Disclosure
End Words
Copyright © 2014 CyberSecurity Malaysia
Best Practices
Client Station
Keep systems’ software
up to date
Must have personal
firewall installed
Must have antivirus
installed
Educate the
wireless user on
the proper usage
and security issues
Copyright © 2014 CyberSecurity Malaysia
Summary
• WiFi hacking tools are available freely and
…..anyone can run them.
• WiFi attacks are getting more dangerous, in what they can do!
• We must change the way we think about WiFi security
Copyright © 2014 CyberSecurity Malaysia
Copyright © 2013 CyberSecurity Malaysia 43

Contenu connexe

Tendances

Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and securityAdel Zalok
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Wireless Security
Wireless SecurityWireless Security
Wireless SecuritysiDz
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular networkAwais Mansoor Chohan
 

Tendances (20)

Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular network
 

En vedette

Ddos attack with_tcp_syn_flooding
Ddos attack with_tcp_syn_floodingDdos attack with_tcp_syn_flooding
Ddos attack with_tcp_syn_floodingGió Lào
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applicationsSaad Mazhar
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSapplephye
 
Digital awareness tutor day
Digital awareness tutor dayDigital awareness tutor day
Digital awareness tutor daySimon Conlin
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheepantitree
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardwarevanhoefm
 
Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Precedent
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless HackingDon Anto
 
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup0xcite
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 

En vedette (19)

Ddos attack with_tcp_syn_flooding
Ddos attack with_tcp_syn_floodingDdos attack with_tcp_syn_flooding
Ddos attack with_tcp_syn_flooding
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESS
 
Digital awareness tutor day
Digital awareness tutor dayDigital awareness tutor day
Digital awareness tutor day
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheep
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013Building Brand Awareness in a digital world - 18th March 2013
Building Brand Awareness in a digital world - 18th March 2013
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
IT Security Awareness
IT Security AwarenessIT Security Awareness
IT Security Awareness
 
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 

Similaire à 05 wi fi network security

chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Ryan Orsi
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Securityijtsrd
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problemPositiveTechnologies
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogythasnim1304
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 

Similaire à 05 wi fi network security (20)

chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 

Plus de Ministry of Education Malaysia

Plus de Ministry of Education Malaysia (20)

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Panduan Fail Meja
 
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
Modul 1 Scratch
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
07 end
07 end07 end
07 end
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
 
01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals 01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
Manual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLEManual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLE
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Pembentangan TMK
 
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
 

Dernier

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 

Dernier (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

05 wi fi network security

  • 1. Copyright © 2014 CyberSecurity Malaysia Internet and Computer Security Awareness Wireless Network Security
  • 2. Introduction Copyright © 2014 CyberSecurity Malaysia The popularity of wireless networks are due to the cost effectives in deployment, no cabling required compared to wired network and easy to use as well as flexible deployment. WiFi networks are everywhere!
  • 3. Goals 3 After completion of this lesson, our wireless communication will never be the same as we will the potential threats associated to the wireless network. Beware of invisible wireless hacker! Copyright © 2014 CyberSecurity Malaysia
  • 4. Objectives 4 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 5. The Invisible Hacker: WiFi Hackers 5 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 6. WiFi Network Architecture & Principle 6 Station (STA) Access Point (AP) SSID Vendor OUI Cisco (Aironet) 00-04-96 Agere (Orinoco) 00-02-2D Nokia 00-e0-03 Linksys 00-04-5a 00-04-5a-03-3c-0f OUI (Organizationally Unique Identifier) 1 Station (STA) Station (STA) 2 Station (STA) Access Point (AP) ESSID 3 BSSID = AP MAC AddressMAC Address 4 5 6 Station (STA) Access Point (AP) SSID MAC Address Attacker/ Auditor Access Point (AP) Access Point (AP) Managed Mode Monitor Mode Master Mode Ad Hoc Mode http://standards.ieee.org/regauth/oui/index.shtml Infrastructure Ad-hoc Copyright © 2014 CyberSecurity Malaysia
  • 7. WiFi Operation Modes 7 Station (STA) Access Point (AP) SSID 1 Station (STA) Station (STA) 3 Managed Mode Master Mode Ad Hoc Mode Ad Hoc Mode Monitor Mode 2 4 Copyright © 2014 CyberSecurity Malaysia
  • 8. WiFi Networking 8 Probes Station Access Point Beacons Probes RequestStation Access Point Probes Response 1 2 3 4 Station Access PointProbe Request Probe Response AUTH Request AUTH Response Assoc Request Assoc Response Copyright © 2014 CyberSecurity Malaysia
  • 9. The Invisible Hacker: WiFi Hackers 9 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 10. Wired Network: Possible Attacks 10 Virus & Malware Attackers Data Theft INTERNET INTRANET SECURE ENTERPRISE PERIMETER Desktop Server Inside Threat Copyright © 2014 CyberSecurity Malaysia
  • 11. Wireless Network: Possible Attacks 11 Hacker INTRANET INTERNET Desktop 1 Rogue AP Connected to Network 3 Non-Compliant AP 5 Users Bypassing Network Security Controls Public Wi-Fi AP 2 Leaked Wired Traffic & Insertion 6 Wi-Fi Phishing Legitimate Wi-Fi AP Evil Twin Laptop AP Mobile User Server 4 Neighboring AP Wi-Fi Network aggravates Threats to Enterprise Networks
  • 12. The Invisible Hacker: WiFi Hackers 12 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 13. WiFi Hacking Highlights 13 A North Carolina Medical Consulting Firm Broke into the computer system of a local medical consulting firm & illegally accessed information of hundreds of patients, including checks and insurance forms Wireless hacking bust in Michigan  Two Michigan men repeatedly cracked Lowe’s nationwide network from a 1995 Pontiac Grand Prix parked outside a suburban Detroit store.  Charged with penetrating and intentionally damaging a Lowe’s system.  First hopped onto the Wi-Fi network at the store to access the company’s central data center at Lowe’s headquarters.  Deployed hacking software, in one case crashing the point of sale terminals. A California Public School District Unprotected WLAN allowed full unauthorized access to sensitive files & enabled hackers to upload their own files into servers A Texas County Court Hackers accessed information filed by the clerk of courts by using only a laptop & wireless card A Wholesale club Hacked via wireless network at a store location, credit card data was stolen AND used to the tune of $20M. The lax security found by the FTC to be an “unfair trade practice”; now under 9 years of probation and have to institute security measures and hire 3rd party auditor Security causes electronics giant register ban Best Buy banned the use of wireless cash registers at its 492 stores after learning a hacker may have intercepted a customer’s credit card number. Home Improvement Store Electronics Retailer Major Wholesale Store Copyright © 2014 CyberSecurity Malaysia
  • 14. WiFi Problem: Uncontrolled Medium 14 t r 2 The walls of the facility provide a solid line of defense against intruders Attacker RF in the AIR is uncontrolled… The walls of the facility provide a solid line of defense against intruders  With a single access point, walls come tumbling down  Ethernet now extends to the parking lot! Attacker Server Server Server Computer Copyright © 2014 CyberSecurity Malaysia
  • 15. WiFi Problem: RF Signal Propagation 15 THIS IS THE ATTACK SURFACE Copyright © 2014 CyberSecurity Malaysia
  • 16. WiFi Problem: Extending Antenna 16 A Dual-Use Homebrew Product – Pringles Cans http://www.oreillynet.com/lpt/wlg/448 Yagi Antenna Omni Antenna Copyright © 2014 CyberSecurity Malaysia
  • 17. WiFi Problem: Free WiFi Hacking Tools Copyright © 2014 CyberSecurity Malaysia
  • 18. WiFi Problem: WiFi Communication Evolving to… Workstation Access Point Rogue Access Point Ad Hoc Network Legit Association Malicious Association Hacker / Soft AP Employee Station Company Access Point Rogue Access Point Employee AP Neighbor AP Neighbor Station Copyright © 2014 CyberSecurity Malaysia
  • 19. WiFi Threat: Soft Access Points
  • 20. WiFi Threat: Weak Configuration Common Mistakes in Wireless Implementations Descriptive SSID e.g. BANK_NAME SSID Vulnerable Encryption Setting e.g. WEP Encryption Access Point’s Coverage Areas e.g. A very good quality of access point signal from across the road Copyright © 2014 CyberSecurity Malaysia
  • 21. WiFi Threat: Factory Configuration Copyright © 2014 CyberSecurity Malaysia
  • 22. WiFi Threat: Connecting to WiFi Network 22  accidental association  malicious association  malicious access points  vulnerable access points Don’t You Know? Copyright © 2014 CyberSecurity Malaysia
  • 23. WiFi Threat: WiFi DoS 23 Hacker Station (CommView, Aircrack-ng) Access Point Client Station (User) Access Point Client Station (User) Signal Generator (YDI PSG-1) Physical Layer DoS MAC Layer DoS DoS Against a AP: shutdown the target AP from communicating with any device DoS Against a Station: shutdown the Station from communicating with any device. Broadcast: shutdown any network devices Data flooding Jamming signal Copyright © 2014 CyberSecurity Malaysia
  • 24. The Invisible Hacker: WiFi Hackers 24 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 25. WiFi Protocol Attack 25 BSSID = 00:1A:70:E5:E1:91 ESSID = linksys WEP = aa:bb:cc:dd:ee Attacker MAC STA = 06:14:A4:27:FB:12 Fake Authentication Attack ARP Request Replay Attack Copyright © 2014 CyberSecurity Malaysia
  • 26. WiFi Protocol Attack (cont’d) 26Copyright © 2014 CyberSecurity Malaysia
  • 27. 27 WiFi Protocol Attack (cont’d) Copyright © 2014 CyberSecurity Malaysia
  • 28. 28 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words The Invisible Hacker: WiFi Hackers Copyright © 2014 CyberSecurity Malaysia
  • 29. Wireless Man-in-the-Middle Attack Copyright © 2014 CyberSecurity Malaysia
  • 30. Wireless DoS Against WiFi Client • Against a AP: Keeps all traffic from communicating with the rest of the network • Against a Station: Keeps the Station from Communicating with any device. • Broadcast: All network devices including some Internal networks shutdown • Injected Traffic: Spanning Tree, Routing Information, Typical DoS Target (User) AP1 2 ORIGINAL MAC: 00 12 2D 50 43 1E NEW MAC: 00 02 2D 50 D1 4E MAC: 00 02 2D 50 D1 4E 3 3. Send Disassoc & Deauth frames 2. Impersonate AP by spoofing the MAC 1. User enjoying good connection Copyright © 2014 CyberSecurity Malaysia
  • 31. Windows Preferred Network List  Attack against personal anonymity  Wireless technology is inherently chatty and often uniquely tied to the user  Wireless cards will periodically search for their preferred networks by name  Attacker can eavesdrop on this conversation to identify unique names  Can associate location to network name Copyright © 2014 CyberSecurity Malaysia
  • 32. The Invisible Hacker: WiFi Hackers 32 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 33. Choose Right Hardware 33Copyright © 2014 CyberSecurity Malaysia
  • 34. Detected WiFi Network @ Putrajaya Copyright © 2014 CyberSecurity Malaysia
  • 35. WiFi Traffic Decryption Method 35 BSSID = 00:1A:70:E5:E1:91 ESSID = linksys WEP = f0:00:f0:D0:f0 Attacker MAC STA = 06:14:A4:27:FB:12 Victim MAC STA = 00:13:E8:27:EF:C1 Copyright © 2014 CyberSecurity Malaysia
  • 36. WiFi Traffic Decryption Method 36Copyright © 2014 CyberSecurity Malaysia
  • 37. WiFi Hackers Can See Your Password 37
  • 38. WiFi Hackers Can See Your Email 38Copyright © 2014 CyberSecurity Malaysia
  • 39. WiFi Hackers Can See Your IM Chat 39Copyright © 2014 CyberSecurity Malaysia
  • 40. The Invisible Hacker: WiFi Hackers 40 WiFi Network Fundamentals Wired Network vs. WiFi Network Common Problem and WiFi Threats WiFi Protocol Attacks WiFi Client Attacks WiFi Data Disclosure End Words Copyright © 2014 CyberSecurity Malaysia
  • 41. Best Practices Client Station Keep systems’ software up to date Must have personal firewall installed Must have antivirus installed Educate the wireless user on the proper usage and security issues Copyright © 2014 CyberSecurity Malaysia
  • 42. Summary • WiFi hacking tools are available freely and …..anyone can run them. • WiFi attacks are getting more dangerous, in what they can do! • We must change the way we think about WiFi security Copyright © 2014 CyberSecurity Malaysia
  • 43. Copyright © 2013 CyberSecurity Malaysia 43