SlideShare a Scribd company logo
   War Driving
    ◦ Driving around scanning for unsecured networks to gain free Internet access or access network hosts
      and resources. Just because you can, does not mean its legal or ethical to do so
   Hackers (Crackers)
    ◦ Exploiting weak security measures (such as WEP and defaults) to gain access with malicious intent
   Rogue Access Points
    ◦ An access point installed by an employee (or contractor) without authorisation. Typically does not
      conform to enterprise security policy or configurations and becomes a weak link.
   Man in Middle Attack
    ◦ Software can be used to capture wireless traffic such as authentication and association requests.
      Security keys can be discovered and used for malicious activity
    ◦ Counter with intrusion prevention systems that monitor the RF band and scan for rogue access
      points, ad-hoc connections and other activity
   DOS Denial of Service
    ◦ Signal interference from sources such as cordless phones, microwaves can cause noise on channels
      and prevent frames from reaching their destinations
    ◦ Flooding the BSS with CTS or disassociate messages which cause collisions and disrupt operations
   WEP
    ◦ Wired Equivalent Privacy which uses a WEP key as the secret and RC4 as the
      cipher to encrypt the data
    ◦ WEP was the first standard. The WEP key can now be easily discovered using a
      tool.
    ◦ This method should NO LONGER be used
   WPA
    ◦ WIFI protected access based on the draft 802.11i standard
    ◦ Interim security standard while developing WPA 2
   WPA2
    ◦ WIFI protected access 2 that implements the ratified 802.11i standard
    ◦ This is the current security standard used to certify new devices
   WPS
    ◦ WiFI Protected Setup was intended to simplify security with a push button and
      pin.
    ◦ Major security flaw discovered late 2011 and this method should be disabled
   802.1x /EAP extensions
    ◦ A method that keeps wireless logical ports closed until the user authenticates.
      (not covered here – its in the Diploma course)
   WiFi Protected Access
    ◦ WiFi alliance security certified protocol
    ◦ Interim protocol while IEEE 802.11i standard developed
   Uses the TKIP Temporal Key Integrity Protocol
    ◦ TKIP uses the RC4 cipher (which WEP uses)
    ◦ 3 features added to fix the flaws in WEP and prevent discovery
      of the secret key
    ◦ Michael – MIC message integrity code to prevent tampering and
      replay attacks
      MIC – message integrity code added to the frame and encrypted
       with the data
      A replay attack captures an authentication exchange and attempts to
       resend the packets at a later time to get access without knowing the
       key
   WiFi Protected Access 2
    ◦ WPA 2 implements the IEEE 802.11i security standard but is certified
      and tested as WPA2
   WPA2 implements
    ◦ TKIP as the key management protocol for older devices
    ◦ Michael message integrity code (MIC)
    ◦ Uses CCMP encryption protocol with a new cipher: AES Advanced
      Encryption Standard
       AES requires AES capable hardware, TKIP is used for encryption for older
        equipment
   Authentication methods
    ◦ Pre-shared Key PSK
    ◦ Enterprise (EAP/Radius/TLS protocols) which do not allow data frames
      through the AP port until the user has successfully authenticated.
                  This can be integrated with Active Directory network accounts
   WiFi Protected Setup
    ◦ Created to allow easy security setup for adding new devices to
      the Wlan
    ◦ Uses a PIN, Push button, near field communications or USB
      configuration transfer
    ◦ Can be broken easily by brute-force attack (Dec 2011)
   Solution
    ◦ Disable WPS by applying a firmware update

More Related Content

PPT
Wifi Security
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPTX
Attack presentation
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PPTX
802.11 Wireless, WEP, WPA lecture
PPTX
WiFi Secuiry: Attack & Defence
PDF
cisco security training
PDF
Wireless Hacking
Wifi Security
Understanding WiFi Security Vulnerabilities and Solutions
Attack presentation
Wireless and WLAN Secuirty, Presented by Vijay
802.11 Wireless, WEP, WPA lecture
WiFi Secuiry: Attack & Defence
cisco security training
Wireless Hacking

What's hot (20)

PDF
Topics in network security
PPTX
Wifi hacking
PPTX
Firewall and its purpose
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
WIFI Hacking
PPT
Firewalls
PDF
wifi-y3dips-stmik_mdp_slides
PPTX
Firewalls in network security
PDF
Firewall girija ppt
PPTX
Wireless hacking
PPTX
Firewall presentation
PPTX
Firewall and its types and function
PPTX
Tingling wireless security
PPTX
Firewall & packet filter new
PPTX
Types Of Firewall Security
PPTX
Cyber Security: Trends and Globar War
PPT
LAN Security
PPTX
Vpn presnt
PDF
Firewall fundamentals
PPTX
Firewalls and packet filters
Topics in network security
Wifi hacking
Firewall and its purpose
Cracking WPA/WPA2 with Non-Dictionary Attacks
WIFI Hacking
Firewalls
wifi-y3dips-stmik_mdp_slides
Firewalls in network security
Firewall girija ppt
Wireless hacking
Firewall presentation
Firewall and its types and function
Tingling wireless security
Firewall & packet filter new
Types Of Firewall Security
Cyber Security: Trends and Globar War
LAN Security
Vpn presnt
Firewall fundamentals
Firewalls and packet filters
Ad

Viewers also liked (11)

PDF
Security In Dect
PDF
Ieee 2016 Network Security Papers Trichy
PDF
2015 and 2016 IEEE Projects for Network Security
PPTX
Network Security Architecture
PDF
Network Security Research Paper
KEY
Identity theft
PPTX
Network security
PPT
Network Security
PPT
Network security
PPTX
Thesis Power Point Presentation
PDF
Network Security Presentation
Security In Dect
Ieee 2016 Network Security Papers Trichy
2015 and 2016 IEEE Projects for Network Security
Network Security Architecture
Network Security Research Paper
Identity theft
Network security
Network Security
Network security
Thesis Power Point Presentation
Network Security Presentation
Ad

Similar to Security standard (20)

PPT
4 wifi security
PPTX
Wireless network security
PPTX
Module 6 Wireless Network security
PPT
WLAN SECURITY ..........................outline
PDF
wi-fi technology
PPTX
Wpa2 psk security measure
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPTX
WIRELESS_SECURITY.pptx
PDF
ECE560 Wireless and Mobile Security Fall2020..pdf
PPTX
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
PPTX
WPA3 - What is it good for?
PPTX
Wireless security
PPT
Wireless hacking septafiansyah
PPTX
Wi fi security
PPTX
Hacking Wireless Networks : Null Delhi (November)
PPT
5169 wireless network_security_amine_k
PPTX
Wireless security
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
4 wifi security
Wireless network security
Module 6 Wireless Network security
WLAN SECURITY ..........................outline
wi-fi technology
Wpa2 psk security measure
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WIRELESS_SECURITY.pptx
ECE560 Wireless and Mobile Security Fall2020..pdf
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
WPA3 - What is it good for?
Wireless security
Wireless hacking septafiansyah
Wi fi security
Hacking Wireless Networks : Null Delhi (November)
5169 wireless network_security_amine_k
Wireless security
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008

More from lyndyv (17)

PPTX
Datarate
PPTX
Logging
PPTX
Policy
PPTX
Capacity
PPTX
Auth and association
PPTX
Dhcp
PPTX
Port forward
PPTX
Nat
PPTX
Mac addressfilters
PPTX
Firewall
PPTX
Csmaca
PPTX
Basic config
PPTX
Service set
PPTX
Signals1
PPTX
Modulation
PPTX
IEEE WLAN standards
PPTX
Wireless components
Datarate
Logging
Policy
Capacity
Auth and association
Dhcp
Port forward
Nat
Mac addressfilters
Firewall
Csmaca
Basic config
Service set
Signals1
Modulation
IEEE WLAN standards
Wireless components

Security standard

  • 1. War Driving ◦ Driving around scanning for unsecured networks to gain free Internet access or access network hosts and resources. Just because you can, does not mean its legal or ethical to do so  Hackers (Crackers) ◦ Exploiting weak security measures (such as WEP and defaults) to gain access with malicious intent  Rogue Access Points ◦ An access point installed by an employee (or contractor) without authorisation. Typically does not conform to enterprise security policy or configurations and becomes a weak link.  Man in Middle Attack ◦ Software can be used to capture wireless traffic such as authentication and association requests. Security keys can be discovered and used for malicious activity ◦ Counter with intrusion prevention systems that monitor the RF band and scan for rogue access points, ad-hoc connections and other activity  DOS Denial of Service ◦ Signal interference from sources such as cordless phones, microwaves can cause noise on channels and prevent frames from reaching their destinations ◦ Flooding the BSS with CTS or disassociate messages which cause collisions and disrupt operations
  • 2. WEP ◦ Wired Equivalent Privacy which uses a WEP key as the secret and RC4 as the cipher to encrypt the data ◦ WEP was the first standard. The WEP key can now be easily discovered using a tool. ◦ This method should NO LONGER be used  WPA ◦ WIFI protected access based on the draft 802.11i standard ◦ Interim security standard while developing WPA 2  WPA2 ◦ WIFI protected access 2 that implements the ratified 802.11i standard ◦ This is the current security standard used to certify new devices  WPS ◦ WiFI Protected Setup was intended to simplify security with a push button and pin. ◦ Major security flaw discovered late 2011 and this method should be disabled  802.1x /EAP extensions ◦ A method that keeps wireless logical ports closed until the user authenticates. (not covered here – its in the Diploma course)
  • 3. WiFi Protected Access ◦ WiFi alliance security certified protocol ◦ Interim protocol while IEEE 802.11i standard developed  Uses the TKIP Temporal Key Integrity Protocol ◦ TKIP uses the RC4 cipher (which WEP uses) ◦ 3 features added to fix the flaws in WEP and prevent discovery of the secret key ◦ Michael – MIC message integrity code to prevent tampering and replay attacks  MIC – message integrity code added to the frame and encrypted with the data  A replay attack captures an authentication exchange and attempts to resend the packets at a later time to get access without knowing the key
  • 4. WiFi Protected Access 2 ◦ WPA 2 implements the IEEE 802.11i security standard but is certified and tested as WPA2  WPA2 implements ◦ TKIP as the key management protocol for older devices ◦ Michael message integrity code (MIC) ◦ Uses CCMP encryption protocol with a new cipher: AES Advanced Encryption Standard  AES requires AES capable hardware, TKIP is used for encryption for older equipment  Authentication methods ◦ Pre-shared Key PSK ◦ Enterprise (EAP/Radius/TLS protocols) which do not allow data frames through the AP port until the user has successfully authenticated.  This can be integrated with Active Directory network accounts
  • 5. WiFi Protected Setup ◦ Created to allow easy security setup for adding new devices to the Wlan ◦ Uses a PIN, Push button, near field communications or USB configuration transfer ◦ Can be broken easily by brute-force attack (Dec 2011)  Solution ◦ Disable WPS by applying a firmware update