SlideShare a Scribd company logo
Attacking WPA-Enterprise
    Wireless Networks
                  By: Matt Neely
  Presented: March 17, 2010 at NEO InfoSec Forum
Speaker Biography



•  Matt Neely, CISSP, CTGA, GCIH, and GCWN –
   Manager of the Profiling Team at SecureState
    –  Areas of expertise: wireless, penetration testing,
       physical security, security convergence, and
       incident response
    –  Formed and ran the TSCM team at a Fortune 200
       company
    –  Over 10 years of security experience
•  Outside of work:
    –  Co-host of the Security Justice podcast
    –  Licensed amateur radio operator (Technician) for
       almost 20 years
•  First radio I hacked:
    –  Fisher-Price Sky Talker walkie talkie
SecureState Overview



•  Ohio-Based Company           CISSP – Certified Information Systems Security
    –  Founded 2001             Professional
                                CISM – Certified Information Security Manager
                                CISA – Certified Information Systems Auditor
•  30+ Security Professionals   QDSP – Qualified Data Security Professional
                                GSEC – SANS GIAC Security Essentials
                                NSA INFOSEC Assessment Methodology (IAM)
•  Information Assurance &      Forensics – NTI, EnCase
   Protection                   ANSI X9/TG-3


•  Audit and business
   background (Big 10)

•  Experts in ethical hacking
   across many specialized
   areas
What You Will Learn Today



•    Short history of wireless security
•    What is 802.11 Enterprise authentication
•    How PEAP works
•    How to attack WPA Enterprise networks
•    How to defend WPA Enterprise networks
Brief History of Wireless


•  WEP died over a decade ago
•  Cisco released LEAP to make up for the deficiencies in
   WEP
    –  Proprietary and susceptible to brute force attacks
•  WPA/WPA2 was developed to provide strong encryption
   and multiple authentication mechanisms
Brief History of Wireless - WPA


•  WPA/WPA2 encryption and authentication options
   –  Encryption
       •  WPA – TKIP (RC4 based algorithm)
       •  WPA2 – CCMP (AES based algorithm)
   –  Authentication
       •  Pre-Shared Key (PSK) Authentication
            –  Designed for home and small offices
            –  Anything that uses a shared password is not secure
       •  Enterprise Authentication
            –  Uses 802.1X as the authentication framework
            –  Provides per-user or per-system authentication
802.1X In One Slide


•  Provides network access
   authentication
    –  EAP provides authentication
    –  Access point handles encryption
       (TKIP/CCMP)
•  Three components:
    –  Supplicant (Client)
    –  Authenticator (AP)
    –  Authentication Server (RADIUS
       or IAS server)
•  Supplicant and authentication server
   use an EAP type to authenticate
EAP



•  Extensible Authentication Protocol (EAP) is an authentication
   framework
•  802.1X uses various EAP types to authenticate users
     –  Common EAP types used with wireless: TLS, PEAP, TTLS, and
        EAP-FAST
     –  EAP type and configuration can greatly impact the security of the
        wireless network
•  Breakdown of EAP deployments:
     –  80% PEAP and TTLS
     –  15% EAP-FAST or LEAP
     –  5% TLS
Introduction To PEAP and TTLS



•  EAP originally was designed to work over wired networks where
   interception required physical access.
•  Interception is a larger concern on wireless networks.
•  Protected EAP (PEAP) and Tunneled Transport Layer Security
   (TTLS) use TLS to protect legacy authentication protocols from
   interception.
•  Both require a certificate on the RADIUS server for the Supplicant to
   validate server identity.
•  PEAP supports MS-CHAPv2 as the inner authentication method.
•  TTLS supports a large number of inner authentication protocols
   (MS-CHAPv2, CHAP, PAP, etc).
PEAP Using MS-CHAPv2
Importance of TLS Certificate Validation With PEAP




•  Network SSID can be spoofed easily.
•  TLS provides a method for validating the access point
   (Authenticator) and, therefore, the network.
•  Once the certificate from the Authenticator is validated,
   the client passes authentication information to the
   network (Authentication Server).
•  Authentication traffic is protected from eavesdropping by
   the TLS tunnel.
Web Browser SSL/TLS Validation
What happens when your
 wireless client trusts an
    invalid certificate?
Vulnerable PEAP Misconfiguration One



•  Many deployments
   disable all validation
•  PEAP supplicant will trust
   any RADIUS server
How An Attacker Can Exploit This



•  Attacker sets up a fake AP
    –  Mirrors target network’s SSID, encryption type (WPA/WPA2),
       and band (a/b/g/n)
    –  Configures the AP to accept Enterprise authentication
    –  Sets AP to visible
•  Attacker connects the fake AP to the special FreeRADIUS-WPE
   server that captures and records all authentication requests
•  Attacker waits for users to attach to the fake network and captures
   their credentials
    –  Impatient attackers can de-auth clients from the legitimate
       network
•  Attacker cracks the challenge/response pair to recover the password
FreeRADIUS-WPE



•  Josh Wright created the Wireless Pwnage Edition (WPE) patch for
   FreeRADIUS 2.0.2
•  Adds the following features:
    –  Returns success for any authentication requests
    –  Logs all authentication credentials
        •  Challenge/response
        •  Password
        •  Username
    –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5,
       EAP-MSCHAPv2, PAP, CHAP, and others
DEMO
DEMO
Vulnerable PEAP Misconfiguration Two



•  Configuration:
    –  “Validate server certificate”
       is enabled
    –  Default Wireless Zero
       Configuration (WZC)
       settings
    –  Prompts users to validate
       server certificate
         •  Minimal detail is shown
            in the dialog box
•  Attack:
    –  Same attack applies but
       requires users to validate
       the certificate
Vulnerable PEAP Misconfiguration Three


•    Configuration:
      –  “Validate server certificate” is
         enabled
      –  Trusted Root Certificate
         Authority is selected
      –  Does not validate certificate CN!
•    Attack:
      –  Sniffs a valid login and identifies
         the CA of the TLS certificate
      –  Purchases a certificate from the
         trusted CA
           •  Any CN value can be used
      –  Configures the RADIUS server
         to use this certificate
Concerns Around Mobile Devices
If At First You Don’t Succeed



•  Some clients try multiple EAP types while trying to authenticate to a
   wireless network.
    –  Easy for attackers to detect by analyzing a packet capture.
•  Attackers can use this weakness to trick clients into authenticating to
   a fake AP with an insecure EAP type.
    –  Often de-auth floods are used to prevent the client from
       connecting to a legitimate AP.
SECURING WIRELESS
NETWORKS
Encryption and Authentication



•  Use CCMP for encryption
    –  Migrate off TKIP
    –  Never use WEP
•  Use PEAP, TTLS, or TLS for authentication
    –  TLS requires a PKI
    –  Avoid Pre-Shared Keys (PSK)
        •  Anything that is shared is not secure
        •  If you must use PSK, choose a unique SSID and use a
           complex passphrase over 14 characters
Secure the Infrastructure



•  Harden and patch the infrastructure:
    –  Access points
    –  Wireless controllers
    –  Authentication servers
        •  Apply the latest service pack to Windows Internet
           Authentication Service (IAS) servers
•  Do not use hidden access points
•  Make sure insecure EAP types such as MD5 are disabled
•  Prevent insecure clients from using the wireless network
•  Firewall and isolate the wireless network from the internal network
Wireless IDS



•  Consider deploying a wireless IDS
•  Can detect:
    –  De-auth attacks
    –  RTS and CTS denial of service attacks
    –  Rogue APs
         •  Both on and off your wired network
•  Remember IDS is only detection and not prevention
•  Be very careful with wireless IPS
    –  IPS system could end up attacking neighboring networks
•  Wireless IDS will not protect users while traveling
Secure the Clients



•  Require long and complex passwords
•  Apply all patches quickly
    –  Including firmware patches for wireless cards
•  Harden the system
    –  Run Anti-Virus software and keep definitions up to date
    –  Have users login with a non-administrative level account
    –  Encrypt sensitive data on drive
    –  Turned on and configured personal firewall
•  Disable ad-hoc networks
•  Prevent network bridging
•  Ensure the Supplicant is properly configured
Secure WZC PEAP Configuration


•    Ensure the following items are
     configured:
      –  Enable “Validate server
         certificate”
      –  Enable “Connect to these
         servers” and specify the CN of
         the RADIUS server
      –  Under “Trusted Root
         Certificate Authorities” check
         ONLY the CA that issued the
         certificate
      –  Enable “Do not prompt user to
         authorize new servers or
         trusted certification authorities
•    Enforceable through Group Policy
•    Refer to KB941123 for additional
     information
Perform Regular Assessments




                         Act




•  The Shewhart or Deming Cycle, used in Quality Assurance –
   instead of PDCA, it’s Check-Act-Plan-Do when relating to
   security strategy.
•  It’s imperative to perform assessments on a regular basis.
•  Have a third party perform a wireless security assessment.
     •  Ensure the assessment includes architecture and client
         configuration reviews.
QUESTIONS?
For More Information:
       www.SecureState.com
       www.MatthewNeely.com
       @matthewneely

More Related Content

PPT
Attacking Automatic Wireless Network Selection
PDF
Pentesting Wireless Networks and Wireless Network Security
PDF
The state of wireless security
PPS
Workshop on Wireless Security
PPT
Wireless hacking and security
PPTX
Wireless Security null seminar
PPTX
WiFi Secuiry: Attack & Defence
PPT
Wireless and WLAN Secuirty, Presented by Vijay
Attacking Automatic Wireless Network Selection
Pentesting Wireless Networks and Wireless Network Security
The state of wireless security
Workshop on Wireless Security
Wireless hacking and security
Wireless Security null seminar
WiFi Secuiry: Attack & Defence
Wireless and WLAN Secuirty, Presented by Vijay

What's hot (20)

PPTX
Wifi Security
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PDF
wifi-y3dips-stmik_mdp_slides
PPTX
802.11 Wireless, WEP, WPA lecture
PPT
5169 wireless network_security_amine_k
PPSX
Wireless Network Security
PDF
Wireless Hacking
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PPT
Securing wireless network
PPTX
WPA3 - What is it good for?
PPTX
DevLink - WiFu: You think your wireless is secure?
PPTX
PPTX
Wireless security using wpa2
PPT
Wifi Security
PPT
Wireless security837
PPT
Wi fi protected-access
PPTX
WPA-3: SEA and Dragonfly
PPTX
WPA 3
PDF
Wi-Fi security – WEP, WPA and WPA2
Wifi Security
Understanding WiFi Security Vulnerabilities and Solutions
wifi-y3dips-stmik_mdp_slides
802.11 Wireless, WEP, WPA lecture
5169 wireless network_security_amine_k
Wireless Network Security
Wireless Hacking
Cracking WPA/WPA2 with Non-Dictionary Attacks
Improvement in Rogue Access Points - SensePost Defcon 22
Securing wireless network
WPA3 - What is it good for?
DevLink - WiFu: You think your wireless is secure?
Wireless security using wpa2
Wifi Security
Wireless security837
Wi fi protected-access
WPA-3: SEA and Dragonfly
WPA 3
Wi-Fi security – WEP, WPA and WPA2
Ad

Viewers also liked (19)

PPTX
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
PDF
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
PDF
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
PDF
ACSR Clear Pass Policy Manager
PDF
Presentazione E-commerce Day 12/4/2013
PDF
Axoss Wireless Penetration Testing Services
PDF
Aruba ClearPass Guest 6.3 User Guide
PPTX
Real-world 802.1X Deployment Challenges
PDF
ClearPass Policy Model - An Introduction
PPT
Implementing 802.1x Authentication
PDF
Android Security & Penetration Testing
PPTX
ClearPass design scenarios that solve the toughest security policy requirements
PDF
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
PDF
Why Half of You Will Go Out of Business
PDF
The Evolution of Sales Tools
PDF
Japan's Abenomics and its implication on Asian economy
PDF
The Drift Brand Book
PDF
Gartner TOP 10 Strategic Technology Trends 2017
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
ACSR Clear Pass Policy Manager
Presentazione E-commerce Day 12/4/2013
Axoss Wireless Penetration Testing Services
Aruba ClearPass Guest 6.3 User Guide
Real-world 802.1X Deployment Challenges
ClearPass Policy Model - An Introduction
Implementing 802.1x Authentication
Android Security & Penetration Testing
ClearPass design scenarios that solve the toughest security policy requirements
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
Why Half of You Will Go Out of Business
The Evolution of Sales Tools
Japan's Abenomics and its implication on Asian economy
The Drift Brand Book
Gartner TOP 10 Strategic Technology Trends 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Ad

Similar to Attacking and Securing WPA Enterprise Networks (20)

PPT
Chapter08
PPT
Material best practices in network security using ethical hacking
PPTX
501 ch 4 securing your network
PPT
PDF
Telecommunications and Network Security Presentation
PDF
wi-fi technology
PPTX
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
PDF
Deploying Next Generation Firewalling with ASA - CX
PDF
Airheads barcelona 2010 securing wireless la ns
PPTX
Network Design and Security Best Practices
PPT
ICS PPT Unit 4.ppt
PPSX
Secure electronic transaction
PPTX
Owasp Indy Q2 2012 Cheat Sheet Overview
PPT
Ip sec and ssl
PDF
Ccna sec 01
PPTX
CompTIA Security+ Chapter Four Review
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Chapter08
Material best practices in network security using ethical hacking
501 ch 4 securing your network
Telecommunications and Network Security Presentation
wi-fi technology
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
Deploying Next Generation Firewalling with ASA - CX
Airheads barcelona 2010 securing wireless la ns
Network Design and Security Best Practices
ICS PPT Unit 4.ppt
Secure electronic transaction
Owasp Indy Q2 2012 Cheat Sheet Overview
Ip sec and ssl
Ccna sec 01
CompTIA Security+ Chapter Four Review
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology

Attacking and Securing WPA Enterprise Networks

  • 1. Attacking WPA-Enterprise Wireless Networks By: Matt Neely Presented: March 17, 2010 at NEO InfoSec Forum
  • 2. Speaker Biography •  Matt Neely, CISSP, CTGA, GCIH, and GCWN – Manager of the Profiling Team at SecureState –  Areas of expertise: wireless, penetration testing, physical security, security convergence, and incident response –  Formed and ran the TSCM team at a Fortune 200 company –  Over 10 years of security experience •  Outside of work: –  Co-host of the Security Justice podcast –  Licensed amateur radio operator (Technician) for almost 20 years •  First radio I hacked: –  Fisher-Price Sky Talker walkie talkie
  • 3. SecureState Overview •  Ohio-Based Company CISSP – Certified Information Systems Security –  Founded 2001 Professional CISM – Certified Information Security Manager CISA – Certified Information Systems Auditor •  30+ Security Professionals QDSP – Qualified Data Security Professional GSEC – SANS GIAC Security Essentials NSA INFOSEC Assessment Methodology (IAM) •  Information Assurance & Forensics – NTI, EnCase Protection ANSI X9/TG-3 •  Audit and business background (Big 10) •  Experts in ethical hacking across many specialized areas
  • 4. What You Will Learn Today •  Short history of wireless security •  What is 802.11 Enterprise authentication •  How PEAP works •  How to attack WPA Enterprise networks •  How to defend WPA Enterprise networks
  • 5. Brief History of Wireless •  WEP died over a decade ago •  Cisco released LEAP to make up for the deficiencies in WEP –  Proprietary and susceptible to brute force attacks •  WPA/WPA2 was developed to provide strong encryption and multiple authentication mechanisms
  • 6. Brief History of Wireless - WPA •  WPA/WPA2 encryption and authentication options –  Encryption •  WPA – TKIP (RC4 based algorithm) •  WPA2 – CCMP (AES based algorithm) –  Authentication •  Pre-Shared Key (PSK) Authentication –  Designed for home and small offices –  Anything that uses a shared password is not secure •  Enterprise Authentication –  Uses 802.1X as the authentication framework –  Provides per-user or per-system authentication
  • 7. 802.1X In One Slide •  Provides network access authentication –  EAP provides authentication –  Access point handles encryption (TKIP/CCMP) •  Three components: –  Supplicant (Client) –  Authenticator (AP) –  Authentication Server (RADIUS or IAS server) •  Supplicant and authentication server use an EAP type to authenticate
  • 8. EAP •  Extensible Authentication Protocol (EAP) is an authentication framework •  802.1X uses various EAP types to authenticate users –  Common EAP types used with wireless: TLS, PEAP, TTLS, and EAP-FAST –  EAP type and configuration can greatly impact the security of the wireless network •  Breakdown of EAP deployments: –  80% PEAP and TTLS –  15% EAP-FAST or LEAP –  5% TLS
  • 9. Introduction To PEAP and TTLS •  EAP originally was designed to work over wired networks where interception required physical access. •  Interception is a larger concern on wireless networks. •  Protected EAP (PEAP) and Tunneled Transport Layer Security (TTLS) use TLS to protect legacy authentication protocols from interception. •  Both require a certificate on the RADIUS server for the Supplicant to validate server identity. •  PEAP supports MS-CHAPv2 as the inner authentication method. •  TTLS supports a large number of inner authentication protocols (MS-CHAPv2, CHAP, PAP, etc).
  • 11. Importance of TLS Certificate Validation With PEAP •  Network SSID can be spoofed easily. •  TLS provides a method for validating the access point (Authenticator) and, therefore, the network. •  Once the certificate from the Authenticator is validated, the client passes authentication information to the network (Authentication Server). •  Authentication traffic is protected from eavesdropping by the TLS tunnel.
  • 12. Web Browser SSL/TLS Validation
  • 13. What happens when your wireless client trusts an invalid certificate?
  • 14. Vulnerable PEAP Misconfiguration One •  Many deployments disable all validation •  PEAP supplicant will trust any RADIUS server
  • 15. How An Attacker Can Exploit This •  Attacker sets up a fake AP –  Mirrors target network’s SSID, encryption type (WPA/WPA2), and band (a/b/g/n) –  Configures the AP to accept Enterprise authentication –  Sets AP to visible •  Attacker connects the fake AP to the special FreeRADIUS-WPE server that captures and records all authentication requests •  Attacker waits for users to attach to the fake network and captures their credentials –  Impatient attackers can de-auth clients from the legitimate network •  Attacker cracks the challenge/response pair to recover the password
  • 16. FreeRADIUS-WPE •  Josh Wright created the Wireless Pwnage Edition (WPE) patch for FreeRADIUS 2.0.2 •  Adds the following features: –  Returns success for any authentication requests –  Logs all authentication credentials •  Challenge/response •  Password •  Username –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5, EAP-MSCHAPv2, PAP, CHAP, and others
  • 17. DEMO
  • 18. DEMO
  • 19. Vulnerable PEAP Misconfiguration Two •  Configuration: –  “Validate server certificate” is enabled –  Default Wireless Zero Configuration (WZC) settings –  Prompts users to validate server certificate •  Minimal detail is shown in the dialog box •  Attack: –  Same attack applies but requires users to validate the certificate
  • 20. Vulnerable PEAP Misconfiguration Three •  Configuration: –  “Validate server certificate” is enabled –  Trusted Root Certificate Authority is selected –  Does not validate certificate CN! •  Attack: –  Sniffs a valid login and identifies the CA of the TLS certificate –  Purchases a certificate from the trusted CA •  Any CN value can be used –  Configures the RADIUS server to use this certificate
  • 22. If At First You Don’t Succeed •  Some clients try multiple EAP types while trying to authenticate to a wireless network. –  Easy for attackers to detect by analyzing a packet capture. •  Attackers can use this weakness to trick clients into authenticating to a fake AP with an insecure EAP type. –  Often de-auth floods are used to prevent the client from connecting to a legitimate AP.
  • 24. Encryption and Authentication •  Use CCMP for encryption –  Migrate off TKIP –  Never use WEP •  Use PEAP, TTLS, or TLS for authentication –  TLS requires a PKI –  Avoid Pre-Shared Keys (PSK) •  Anything that is shared is not secure •  If you must use PSK, choose a unique SSID and use a complex passphrase over 14 characters
  • 25. Secure the Infrastructure •  Harden and patch the infrastructure: –  Access points –  Wireless controllers –  Authentication servers •  Apply the latest service pack to Windows Internet Authentication Service (IAS) servers •  Do not use hidden access points •  Make sure insecure EAP types such as MD5 are disabled •  Prevent insecure clients from using the wireless network •  Firewall and isolate the wireless network from the internal network
  • 26. Wireless IDS •  Consider deploying a wireless IDS •  Can detect: –  De-auth attacks –  RTS and CTS denial of service attacks –  Rogue APs •  Both on and off your wired network •  Remember IDS is only detection and not prevention •  Be very careful with wireless IPS –  IPS system could end up attacking neighboring networks •  Wireless IDS will not protect users while traveling
  • 27. Secure the Clients •  Require long and complex passwords •  Apply all patches quickly –  Including firmware patches for wireless cards •  Harden the system –  Run Anti-Virus software and keep definitions up to date –  Have users login with a non-administrative level account –  Encrypt sensitive data on drive –  Turned on and configured personal firewall •  Disable ad-hoc networks •  Prevent network bridging •  Ensure the Supplicant is properly configured
  • 28. Secure WZC PEAP Configuration •  Ensure the following items are configured: –  Enable “Validate server certificate” –  Enable “Connect to these servers” and specify the CN of the RADIUS server –  Under “Trusted Root Certificate Authorities” check ONLY the CA that issued the certificate –  Enable “Do not prompt user to authorize new servers or trusted certification authorities •  Enforceable through Group Policy •  Refer to KB941123 for additional information
  • 29. Perform Regular Assessments Act •  The Shewhart or Deming Cycle, used in Quality Assurance – instead of PDCA, it’s Check-Act-Plan-Do when relating to security strategy. •  It’s imperative to perform assessments on a regular basis. •  Have a third party perform a wireless security assessment. •  Ensure the assessment includes architecture and client configuration reviews.
  • 30. QUESTIONS? For More Information: www.SecureState.com www.MatthewNeely.com @matthewneely