Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
75 views33 pages

Securing The Wireless LAN: George Ou Network Systems Architect Contributing Editor

The document discusses securing wireless LANs, noting that the best approaches use strong authentication like EAP-TLS, EAP-TTLS, or PEAP along with strong encryption standards like AES, while dismissing weaker options like WEP, MAC filtering, or disabling DHCP. It also outlines tools used in wireless hacking and recommendations for home and small office wireless LAN implementations.

Uploaded by

marinach
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views33 pages

Securing The Wireless LAN: George Ou Network Systems Architect Contributing Editor

The document discusses securing wireless LANs, noting that the best approaches use strong authentication like EAP-TLS, EAP-TTLS, or PEAP along with strong encryption standards like AES, while dismissing weaker options like WEP, MAC filtering, or disabling DHCP. It also outlines tools used in wireless hacking and recommendations for home and small office wireless LAN implementations.

Uploaded by

marinach
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 33

Securing the Wireless LAN

George Ou
Network Systems Architect
Contributing editor – ZDNet
Contents

 Introduction
 Relative risks of Wireless LANs
 Six dumbest ways to secure a WLAN
 Tools of the wireless LAN hacker
 The best ways to secure the WLAN
 SOHO WLAN implementations
 Enterprise WLAN implementations
Introduction

 Wireless security is a huge headache in IT


 Wireless security widely misunderstood
 Wireless security is everyone’s problem even if
you don’t “think” you have a WLAN
 Banning WLANs often result in “improvised”
home grown solutions
 Wireless LANs can be secured
 Wireless security applicable elsewhere in IT
Relative risks of Wireless LANs

 Wireless security is NOT an oxymoron


 Less dangerous than having an Internet
connection direct or indirect
 Attacks from the Internet can come from
anywhere on the entire globe
 Web/FTP/Mail/DNS Servers
 Back doors R00TK1T5 that can dial home
 Attacks on Wireless LANs are limited to a couple
of kilometers
Six dumbest ways to secure a WLAN
Overview

 MAC “authentication”
 SSID “hiding”

 LEAP authentication

 Disabling DHCP

 Antenna placement and signal suppression

 Switch to 802.11a or Bluetooth Wireless LANs

______________________________________
 Dishonorable mention: WEP

Original article on http://blogs.zdnet.com/Ou


Six dumbest ways to secure a WLAN
MAC “authentication”

 Use of the word “authentication” is laughable


 All that’s happening is MAC address filtering
 MAC addresses are transmitted in clear text
 Extremely easy to capture
 Extremely easy to clone and defeat
 Extremely difficult to manage MAC filtering
Six dumbest ways to secure a WLAN
MAC spoofing
Six dumbest ways to secure a WLAN
SSID “hiding”

 No such thing as “hiding” an SSID


 All that’s happening is Access Point beacon
suppression
 Four other SSID broadcasts not suppressed
 Probe requests
 Probe responses
 Association requests
 Re-association requests

 SSIDs must be transmitted in clear text or else


802.11 cannot function
Six dumbest ways to secure a WLAN
LEAP authentication

 Cisco LEAP authentication is extremely weak


 LEAP successor EAP-FAST not much better
 Cisco dominates Enterprise WLAN market
 Significant percentage of Cisco shops use LEAP
but have started to migrate to EAP-TLS
 LEAP and EAP-FAST are free on client side
 Only Cisco can sell LEAP and EAP-FAST on
Access Points
 Cisco APs support all open authentication
standards like EAP-TLS and PEAP
Six dumbest ways to secure a WLAN
Disabling DHCP

 Disabling DHCP and forcing the use of Static IP


addresses is another common myth
 IP schemes are easy to figure out since the IP
addresses are sent over the air in clear text
 Takes less than a minute to figure out an IP
scheme and statically enter an IP address
Six dumbest ways to secure a WLAN
Antenna placement and signal suppression

 Antenna placement and signal suppression does


nothing to encrypt data
 The hacker’s antenna is bigger than your’s
 Directional high-gain antennas can pick up a
weak signal from several kilometers away
 Lowering the signal hurts legitimate users a lot
more than it hurts the hackers
 Wi-Fi paint or wall paper not 100% leak proof and
very expensive to implement
Six dumbest ways to secure a WLAN
Switch to 802.11a or Bluetooth wireless LANs

 802.11a is a transport mechanism similar to


802.11b or 802.11g
 802.11a has nothing to do with security
 Pray that the hacker doesn’t have 5 GHz 802.11a
capable equipment
 Bluetooth is more of a wireless USB alternative
 Can be used for wireless networking but not
designed as an 802.11 a or b/g replacement
Six dumbest ways to secure a WLAN
Dishonorable mention: WEP

 WEP barely missed the six dumbest list because it


can still hold up for a couple of minutes
 Hacker named “KoreK” releases new WEP
analysis tool in August 2004
 WEP coupled with 802.1x and EAP key rotation
(AKA DWEP) is considered broken
 Packet injection techniques lowers WEP cracking
times to minutes

Article: Next generation WEP cracking tools


Tools of the wireless LAN hacker
Overview

 Software
 Auditor CD
 Kismet
 ASLEAP
 Void11, Aireplay, Airedump, and Aircrack
 Hardware
 Cheap and compatible cardbus adapters
 Omni directional high-gain antennas
 Directional high-gain antennas
 Off the shelf Laptop computer
Tools of the wireless LAN hacker
Auditor CD

 Bootable Linux CD with every security auditing


tool under the sun
 Everything needed to penetrate most wireless
LAN and more
 Mentioned as a favorite of the FBI
 Relatively easy to use
Tools of the wireless LAN hacker
Kismet

 Kismet is a Linux wireless LAN audit tool


 Can see “hidden” SSIDs
 Can see MAC addresses
 Can see IP schemes
 Can capture raw packet
 GUI version lays everything out
Tools of the wireless LAN hacker
ASLEAP

 ASLEAP cracks Cisco LEAP authentication


 Exploits weak MSCHAPv2 authentication
 Uses pre-computed indexed hash tables
 Checks 45 million passwords a second
 Upgraded to support PPTP VPN cracking
Tools of the wireless LAN hacker
Void11, Aireplay, Airedump, and Aircrack

 New set of tools makes WEP cracking hundreds


of times faster
 Void11 forces users to re-authenticate
 Aireplay monitors re-auth session for ARP and
then plays back the ARP request to trigger
responses from legitimate computers
 Airedump captures all of the raw packets
 Aircrack only needs 200,000 packets instead of
10,000,000 packets from previous tools
Tools of the wireless LAN hacker
Hardware: Cheap and compatible cardbus adapters

 Prism 2/3 based 802.11b adapters


 PrismGT based 802.11 b/g adapters
 Atheros based 802.11 a/b/g adapters
 All typically around $40 to $70 USD
 All compatible with Linux cracking tools
Tools of the wireless LAN hacker
Omni directional high-gain antennas

 Typically 7 to 9 dB gain
 General purpose surveying and war driving
 Can be used to create evil twin access point
 Less than $100 USD
Tools of the wireless LAN hacker
Directional high-gain antennas

 Used to aim and focus in on victim


 Picks up weak signals many kilometers away
 Around $100 USD
Tools of the wireless LAN hacker
Off the shelf Laptops

 Any Laptop or PC can be used for hacking


 New Laptops with good cracking speed are as
low as $400 USD
 Wireless hacking is NOT cost prohibitive!
The best ways to secure the WLAN
Overview

 Good cryptography allows secure


communications over unsecured medium
 Follow best practice cryptographic principles
 Strong authentication
 Strong encryption
 WPA and WPA2 standards
The best ways to secure the WLAN
Strong authentication background

 Strong authentication is often overlooked


 Well established secure authentication methods
all use SSL or TLS tunnels
 TLS is the successor of SSL
 SSL has been used for nearly a decade in E-
Commerce
 SSL or TLS requires Digital Certificates
 Digital Certificates usually involves some form of
PKI and Certificate management
The best ways to secure the WLAN
Strong authentication in Wireless LANs

 Wireless LANs typically use 802.1x and EAP


 Common standard EAP types are EAP-TLS,
EAP-TTLS and PEAP
 LEAP and EAP-FAST are not standard
 EAP-TLS requires server and client certificates
 EAP-TTLS and PEAP only require client-side
certificates
 EAP-TTLS created by Funk and Certicom
 PEAP created by Microsoft, Cisco and RSA
Details on EAP types at: http://blogs.zdnet.com/Ou/?p=67
The best ways to secure the WLAN
Strong authentication and RADIUS servers

 EAP authentication requires RADIUS support in


Access Point and one or more RADIUS servers
 Microsoft Windows 2003 Server has fully
functional RADIUS component called IAS
 Supports EAP-TLS and PEAP
 Windows 2000 only supports EAP-TLS
 Easily integrates in to NT domains or Active Directory
 Funk software makes Steelbelted and Odyssey
 Open source FreeRadius supports broad range
of EAP types
The best ways to secure the WLAN
Strong encryption

 Encryption is well understood


 No known methods of breaking good encryption
 DES encryption has never been crypto-analyzed
in nearly 30 years and must be brute forced
 3DES still considered solid but slow
 AES is the official successor to DES and is solid
at 128, 192, or 256 bits
The best ways to secure the WLAN
Strong encryption in Wireless LANs

 RC4 encryption is known to be weak


 WEP uses a form of RC4 encryption
 Dynamic WEP makes WEP cracking harder
 TKIP is a rewritten WEP algorithm
 No known methods against TKIP yet but some
theoretical attacks are on the horizon
 AES encryption mandated in the newest
Wireless LAN standards is rock solid
The best ways to secure the WLAN
WPA and WPA2 standards

 WPA used a trimmed down version of 802.11i


 WPA2 uses the ratified 802.11i standard
 WPA and WPA2 certified EAP types
 EAP-TLS (first certified EAP type)
 EAP-TTLS
 PEAPv0/EAP-MSCHAPv2 (Commonly known as PEAP)
 PEAPv1/EAP-GTC
 EAP-SIM
 WPA requires TKIP capability with AES optional
 WPA2 requires both TKIP and AES capability
Details on EAP types at: http://blogs.zdnet.com/Ou/?p=67
SOHO WLAN implementations
 Minimum encryption should be TKIP
 Run AES encryption if possible
 EAP authentication usually not feasible for Small
offices and home offices
 SOHO WLANs usually rely on WPA-PSK
 PSK (pre-shared keys) are easier than WEP
with 26 HEX digits
 PSK must be at least 8 alphanumeric random
characters
 Zyxel offers Access Points with PEAP RADIUS
built-in
Enterprise WLAN implementations
WPA and WPA2 standards

 Minimum encryption should be TKIP


 Run AES encryption if possible
 EAP-TLS authentication recommended
 PEAP or EAP-TTLS authentication at a minimum
Enterprise WLAN implementations
Wireless Switches

 Wireless LAN switches manage large numbers


of Access Points
 Much easier to manage
 Wireless switch makers
 Symbol
 Cisco Airespace
 Aruba
Enterprise WLAN implementations
Advanced security implementations

 Multiple Virtual SSID and VLAN support


 VLAN assignment based on group membership
 Guest Wireless LANs that are isolated
 Mitigating WEP security risks for WEP only
devices using Firewall or Router ACLs (Access
Control Lists)
 Can be done with single device such as the
Cisco 851W which is a Firewall, Router,
Managed Switch, and Access Point all-in-one

You might also like