SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Wireside-Only Rogue Detection: Inadequate for Security
                           Hemant Chaskar and K. N. Gopinath
                                  AirTight Networks
                              www.airtightnetworks.com

                                      August 26, 2009

Rogue access point on enterprise network poses serious security threat. It is now well
established that wired–wireless traffic correlation is the only robust way for
comprehensive rogue access point detection. Nonetheless wireside-only scanning is
sometimes touted as a low cost alternative for detecting rogue access points on network.
It is important to note that the wireside only scanning is not robust enough to provide
assured rogue access point detection. This paper deliberates on this point.

How wireside-only scanning works?

Wireside scanner attempts to fingerprint devices connected to the network by issuing
different types of queries and examining responses to infer if the responding device is
access point. Commonly used queries are SNMP, HTTP etc. An example of wireside
only fingerprinting using HTTP is shown below:

                                                          Linksys WAP55AG access point

                            http://<IP address>
   Wireside
   Scanner
                Login HTML page including header
                “WWW-Authenticate Realm: Linksys WAP55AG”


So if HTTP query to an IP address fetches HTML page including the header “WWW-
Authenticate Realm: Linksys WAP55AG”, the scanner infers that the device at that IP
address is Linksys access point.

Sometimes MAC fingerprinting is also be used in the wireside-only scanning technique.
In MAC fingerprinting, the scanner infers vendor of the device from the OUI (3 most
significant bytes) of the wireside MAC addresses of the device. The scanner needs to
access wired MAC addresses by some means such switch CAM table lookup. For
example, the OUI assigned to Linksys Group is 00:04:5A. So if wireside MAC is found
starting with 00:04:5A, the scanner infers that it is most likely Linksys access point.

OS and IP stack fingerprinting can also be used in principle to detect rogue access points.

Drawbacks of wireside-only scanning for rogue detection

Wireside-only scanning is basically signature based identification. It requires extensive
set of signatures such as known responses of access points to HTTP/SNMP queries,
MAC OUI-vendor mapping, and other OS and IP stack fingerprints of access points.


                                           1 of 4
There is continuous overhead of keeping signatures up to date with new hardware and
firmware releases of access points. Moreover, it is to be noted that many of the signatures
are false alarm prone, for example, OUI assigned to DLink can be found not only in
wireside MAC addresses of WiFi access points, but also in MAC addresses of many
other networking devices provided by DLink.

Even if one assumes perfect signature database, still several rogue access points are
fundamentally undetectable with wireside-only scanning. Here are some examples:

Scenario (i): Bridging Access point whose wireside IP is inconsistent with subnet range
where it is connected.

This occurs if a bridging access point is connected in its default configuration or with a
static IP address to a network. Taking example of the above Linksys AP, it has IP address
of 192.168.1.246 on its wired interface by default. Now suppose that this AP is connected
in default configuration (which by the way also uses OPEN wireless link in default
configuration) into a network jack which is on 172.16.1.1/12 subnet. This AP being
bridging device, it is still fully operational on such network to forward packets between
wired and wireless sides, notwithstanding the IP mismatch. But now scanner cannot reach
wired side interface of this access point as it is not possible to route packets to
192.168.1.246 address sitting on 172.16.0.0/12 subnet. So in general HTTP, SNMP, and
OS fingerprinting is of no use.

It is also important to note that MAC address of the wired interface of this rogue access
point does not appear anywhere in the wired infrastructure (e.g., switch ports or DHCP
server) as it is not used for any forwarding or addressing functions. So MAC OUI
analysis is also not going to work.


                                                                       Wireside
                                                                       Scanner
                                                    Subnet Number =
                                                    192.168.1.1/24


                       Subnet Number =                       Scanner cannot reach
                       172.16.1.1/12                         wireside interface of AP

 Wireside IP =
 192.168.1.246

                                   Bridging AP
                                   acting as
                                   layer 2 hub




                                           2 of 4
The only way to fingerprint this AP from wireside is for the scanner to be also present on
172.16.1.1/12 subnet, which is not what commercial scanners are able to do today. Even
then not only does the scanner will have to do some low level non-standard tricks to
detect presence of such device on the network (such as ARPing for 192.168 addresses
even if the scanner is on 172.16 subnet), but it will also have to brute force its way
through all possible IP addresses. This is because it is possible to set static IP on wired
interface of this rogue access point to any value, not even necessarily in the private IP
address range. Such brute forcing will take significant time, and will also generate lots of
traffic on the subnet.

Scenario (ii): Wireless Router with cloned MAC addresses.

   MAC cloning makes OUI based
   fingerprinting impossible                        WAN Port does not respond
                                                    to HTTP and SNMP queries




                                                                    Wireless Router

Many wireless routers do not respond to HTTP, SNMP queries and even Ping on their
WAN interface. This behavior is consistent with their intended use in which the WAN
interface plugs into modem facing the Internet cloud and the LAN interfaces are for local
connectivity. It is not necessary to enable HTTP, SNMP or Ping on WAN interface; in
fact it is a good security practice to not enable them on WAN port. So HTTP and SNMP
based fingerprinting will not work on WAN port.

In addition, many wireless routers will have their WAN side MAC addressed cloned.
Cloned MAC address makes OUI based identification also impossible. Finally, many
wireless routers use standard IP stacks available in market and hence OS based
fingerprinting may not work as well.

Scenario (iii): Wireless Router piggybacked on enterprise laptop.

Several wireless USB and PCMCIA devices are available in the market which can be
connected to laptop to turn it into an access point. For example, Windy31 is such popular
device. Windy31 is a USB stick including WiFi radio which plugs into laptop’s USB
port. It automatically configures the laptop to perform routing between laptop’s wired
interface and the USB port.




                                           3 of 4
Internet
                                                                         Connection
                                                                         Sharing




Now what wireside-only scanner sees is the wired interface of the legitimate laptop and
completely misses the fact that it has rogue access point piggybacked on it.

Key Takeaways

Wireside-only scanning technique for detection of rogues on enterprise network at first
sight. However as we discussed it has several drawbacks as follows:

i) Wireside-only rogue detection requires extensive signature set which needs to be
regularly updated for new hardware and firmware versions. In practice, the signature set
will mostly be incomplete. Also signatures are often prone to false positives.

ii) Even if perfect signature database is assumed, wireside-only rogue detection misses
many types of common rogue scenarios.

iii) Wired-wireless correlation is the only robust way to comprehensively detect rogue
access points on network.

iv) Even the compliance bodies such as PCI have made wireless side scanning mandatory
to keep enterprise networks free from wireless vulnerabilities such as rogue APs.
Wireside-only scanning not only violates PCI DSS 1.2 in letter as it does not use wireless
scanners, but it also violates it in spirit as it fails to detect many common types of rogues
on wired network.

Comments?

You can post your comments on this article at the blog post on this topic at
http://blog.airtightnetworks.com/rogue-ap-detection-pci-compliance/




                                           4 of 4

Weitere ähnliche Inhalte

Was ist angesagt?

Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing compsafi Ullah
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
VPN presentation
VPN presentationVPN presentation
VPN presentationRiazehri
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip priya Nithya
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Cyberoam configuring vlan
Cyberoam configuring vlanCyberoam configuring vlan
Cyberoam configuring vlanEkrem Yorulmaz
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?Tũi Wichets
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast EngineersKit Peters
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]APNIC
 
Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-junkut3
 

Was ist angesagt? (20)

Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
IP-Subnetworking
IP-SubnetworkingIP-Subnetworking
IP-Subnetworking
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Mobile ip group_3
Mobile ip group_3Mobile ip group_3
Mobile ip group_3
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Cyberoam configuring vlan
Cyberoam configuring vlanCyberoam configuring vlan
Cyberoam configuring vlan
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Ids in wn
Ids in wnIds in wn
Ids in wn
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast Engineers
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
 
Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-Ccna 3-discovery-4-0-module-8-100-
Ccna 3-discovery-4-0-module-8-100-
 

Andere mochten auch

Gmp Section B Macro Economics Disinvestment Report
Gmp Section B Macro Economics Disinvestment ReportGmp Section B Macro Economics Disinvestment Report
Gmp Section B Macro Economics Disinvestment ReportAnshuman Jaiswal
 
Disinvestment. Evidence-based disinvestment.
Disinvestment. Evidence-based disinvestment.Disinvestment. Evidence-based disinvestment.
Disinvestment. Evidence-based disinvestment.HTAi Bilbao 2012
 
Disinvestment in public sectors in INDIA
Disinvestment in public sectors in INDIADisinvestment in public sectors in INDIA
Disinvestment in public sectors in INDIAVijay Shekhar
 
disinvestment in india
disinvestment in indiadisinvestment in india
disinvestment in indiavins2009
 
Short Presentation For Disinvestment By Government Of India In PSUs
Short Presentation For Disinvestment By Government Of India In PSUsShort Presentation For Disinvestment By Government Of India In PSUs
Short Presentation For Disinvestment By Government Of India In PSUsSwaraj Mishra
 
disinvestment in india
disinvestment in indiadisinvestment in india
disinvestment in indiakeyankarthi
 
Privatisation and public sector in india
Privatisation and public sector in indiaPrivatisation and public sector in india
Privatisation and public sector in indiaDr. J. Jayapradha Varma
 
Privatization in india
Privatization in indiaPrivatization in india
Privatization in indiaSagar Bhatt
 
Disinvestment
DisinvestmentDisinvestment
Disinvestmentdomsr
 
Privatisation of public sector
Privatisation of public sectorPrivatisation of public sector
Privatisation of public sectorPRASUNA M.V.
 
Privatisation
PrivatisationPrivatisation
PrivatisationKJSCCETR
 
Privatization ppt
Privatization ppt Privatization ppt
Privatization ppt Kapil Pundir
 
Ppt on disinvestment
Ppt on disinvestmentPpt on disinvestment
Ppt on disinvestmentmadydey
 
Privatisation and disinvestment
Privatisation and disinvestmentPrivatisation and disinvestment
Privatisation and disinvestmentVisakhapatnam
 

Andere mochten auch (19)

32 albuquerque
32 albuquerque32 albuquerque
32 albuquerque
 
roll no 20
roll no 20roll no 20
roll no 20
 
Gmp Section B Macro Economics Disinvestment Report
Gmp Section B Macro Economics Disinvestment ReportGmp Section B Macro Economics Disinvestment Report
Gmp Section B Macro Economics Disinvestment Report
 
Disinvestment. Evidence-based disinvestment.
Disinvestment. Evidence-based disinvestment.Disinvestment. Evidence-based disinvestment.
Disinvestment. Evidence-based disinvestment.
 
Disinvestment in public sectors in INDIA
Disinvestment in public sectors in INDIADisinvestment in public sectors in INDIA
Disinvestment in public sectors in INDIA
 
disinvestment in india
disinvestment in indiadisinvestment in india
disinvestment in india
 
Short Presentation For Disinvestment By Government Of India In PSUs
Short Presentation For Disinvestment By Government Of India In PSUsShort Presentation For Disinvestment By Government Of India In PSUs
Short Presentation For Disinvestment By Government Of India In PSUs
 
disinvestment in india
disinvestment in indiadisinvestment in india
disinvestment in india
 
Privatisation and public sector in india
Privatisation and public sector in indiaPrivatisation and public sector in india
Privatisation and public sector in india
 
Privatization in india
Privatization in indiaPrivatization in india
Privatization in india
 
Disinvestment
DisinvestmentDisinvestment
Disinvestment
 
Privatisation of public sector
Privatisation of public sectorPrivatisation of public sector
Privatisation of public sector
 
Privatisation
PrivatisationPrivatisation
Privatisation
 
Privatization ppt
Privatization ppt Privatization ppt
Privatization ppt
 
Ppt on disinvestment
Ppt on disinvestmentPpt on disinvestment
Ppt on disinvestment
 
Disinvestment
DisinvestmentDisinvestment
Disinvestment
 
Privatization
PrivatizationPrivatization
Privatization
 
Privatisation and disinvestment
Privatisation and disinvestmentPrivatisation and disinvestment
Privatisation and disinvestment
 
Privatisation
PrivatisationPrivatisation
Privatisation
 

Ähnlich wie Wireside Only Rogue Access Point Detection

Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answersccna4discovery
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Securityprachi67
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalHarold Sowards
 
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...IPv4Mall
 
Advance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking BasicsAdvance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking BasicsPayal Dungarwal
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wi-Fi Denver OWASP Presentation Feb. 15, 2017Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wi-Fi Denver OWASP Presentation Feb. 15, 2017keyalea
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and securityAdel Zalok
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfcyberhacker7
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysisnikitaa25
 

Ähnlich wie Wireside Only Rogue Access Point Detection (20)

Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014CCNA 1 Chapter 11 v5.0 2014
CCNA 1 Chapter 11 v5.0 2014
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournal
 
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
Finding An IP Address on Your Network | IP Address Buyer | How to Sell IP Add...
 
Advance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking BasicsAdvance Java Programming( CM5I) 4. Networking Basics
Advance Java Programming( CM5I) 4. Networking Basics
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wi-Fi Denver OWASP Presentation Feb. 15, 2017Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
 
Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdf
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Wireside Only Rogue Access Point Detection

  • 1. Wireside-Only Rogue Detection: Inadequate for Security Hemant Chaskar and K. N. Gopinath AirTight Networks www.airtightnetworks.com August 26, 2009 Rogue access point on enterprise network poses serious security threat. It is now well established that wired–wireless traffic correlation is the only robust way for comprehensive rogue access point detection. Nonetheless wireside-only scanning is sometimes touted as a low cost alternative for detecting rogue access points on network. It is important to note that the wireside only scanning is not robust enough to provide assured rogue access point detection. This paper deliberates on this point. How wireside-only scanning works? Wireside scanner attempts to fingerprint devices connected to the network by issuing different types of queries and examining responses to infer if the responding device is access point. Commonly used queries are SNMP, HTTP etc. An example of wireside only fingerprinting using HTTP is shown below: Linksys WAP55AG access point http://<IP address> Wireside Scanner Login HTML page including header “WWW-Authenticate Realm: Linksys WAP55AG” So if HTTP query to an IP address fetches HTML page including the header “WWW- Authenticate Realm: Linksys WAP55AG”, the scanner infers that the device at that IP address is Linksys access point. Sometimes MAC fingerprinting is also be used in the wireside-only scanning technique. In MAC fingerprinting, the scanner infers vendor of the device from the OUI (3 most significant bytes) of the wireside MAC addresses of the device. The scanner needs to access wired MAC addresses by some means such switch CAM table lookup. For example, the OUI assigned to Linksys Group is 00:04:5A. So if wireside MAC is found starting with 00:04:5A, the scanner infers that it is most likely Linksys access point. OS and IP stack fingerprinting can also be used in principle to detect rogue access points. Drawbacks of wireside-only scanning for rogue detection Wireside-only scanning is basically signature based identification. It requires extensive set of signatures such as known responses of access points to HTTP/SNMP queries, MAC OUI-vendor mapping, and other OS and IP stack fingerprints of access points. 1 of 4
  • 2. There is continuous overhead of keeping signatures up to date with new hardware and firmware releases of access points. Moreover, it is to be noted that many of the signatures are false alarm prone, for example, OUI assigned to DLink can be found not only in wireside MAC addresses of WiFi access points, but also in MAC addresses of many other networking devices provided by DLink. Even if one assumes perfect signature database, still several rogue access points are fundamentally undetectable with wireside-only scanning. Here are some examples: Scenario (i): Bridging Access point whose wireside IP is inconsistent with subnet range where it is connected. This occurs if a bridging access point is connected in its default configuration or with a static IP address to a network. Taking example of the above Linksys AP, it has IP address of 192.168.1.246 on its wired interface by default. Now suppose that this AP is connected in default configuration (which by the way also uses OPEN wireless link in default configuration) into a network jack which is on 172.16.1.1/12 subnet. This AP being bridging device, it is still fully operational on such network to forward packets between wired and wireless sides, notwithstanding the IP mismatch. But now scanner cannot reach wired side interface of this access point as it is not possible to route packets to 192.168.1.246 address sitting on 172.16.0.0/12 subnet. So in general HTTP, SNMP, and OS fingerprinting is of no use. It is also important to note that MAC address of the wired interface of this rogue access point does not appear anywhere in the wired infrastructure (e.g., switch ports or DHCP server) as it is not used for any forwarding or addressing functions. So MAC OUI analysis is also not going to work. Wireside Scanner Subnet Number = 192.168.1.1/24 Subnet Number = Scanner cannot reach 172.16.1.1/12 wireside interface of AP Wireside IP = 192.168.1.246 Bridging AP acting as layer 2 hub 2 of 4
  • 3. The only way to fingerprint this AP from wireside is for the scanner to be also present on 172.16.1.1/12 subnet, which is not what commercial scanners are able to do today. Even then not only does the scanner will have to do some low level non-standard tricks to detect presence of such device on the network (such as ARPing for 192.168 addresses even if the scanner is on 172.16 subnet), but it will also have to brute force its way through all possible IP addresses. This is because it is possible to set static IP on wired interface of this rogue access point to any value, not even necessarily in the private IP address range. Such brute forcing will take significant time, and will also generate lots of traffic on the subnet. Scenario (ii): Wireless Router with cloned MAC addresses. MAC cloning makes OUI based fingerprinting impossible WAN Port does not respond to HTTP and SNMP queries Wireless Router Many wireless routers do not respond to HTTP, SNMP queries and even Ping on their WAN interface. This behavior is consistent with their intended use in which the WAN interface plugs into modem facing the Internet cloud and the LAN interfaces are for local connectivity. It is not necessary to enable HTTP, SNMP or Ping on WAN interface; in fact it is a good security practice to not enable them on WAN port. So HTTP and SNMP based fingerprinting will not work on WAN port. In addition, many wireless routers will have their WAN side MAC addressed cloned. Cloned MAC address makes OUI based identification also impossible. Finally, many wireless routers use standard IP stacks available in market and hence OS based fingerprinting may not work as well. Scenario (iii): Wireless Router piggybacked on enterprise laptop. Several wireless USB and PCMCIA devices are available in the market which can be connected to laptop to turn it into an access point. For example, Windy31 is such popular device. Windy31 is a USB stick including WiFi radio which plugs into laptop’s USB port. It automatically configures the laptop to perform routing between laptop’s wired interface and the USB port. 3 of 4
  • 4. Internet Connection Sharing Now what wireside-only scanner sees is the wired interface of the legitimate laptop and completely misses the fact that it has rogue access point piggybacked on it. Key Takeaways Wireside-only scanning technique for detection of rogues on enterprise network at first sight. However as we discussed it has several drawbacks as follows: i) Wireside-only rogue detection requires extensive signature set which needs to be regularly updated for new hardware and firmware versions. In practice, the signature set will mostly be incomplete. Also signatures are often prone to false positives. ii) Even if perfect signature database is assumed, wireside-only rogue detection misses many types of common rogue scenarios. iii) Wired-wireless correlation is the only robust way to comprehensively detect rogue access points on network. iv) Even the compliance bodies such as PCI have made wireless side scanning mandatory to keep enterprise networks free from wireless vulnerabilities such as rogue APs. Wireside-only scanning not only violates PCI DSS 1.2 in letter as it does not use wireless scanners, but it also violates it in spirit as it fails to detect many common types of rogues on wired network. Comments? You can post your comments on this article at the blog post on this topic at http://blog.airtightnetworks.com/rogue-ap-detection-pci-compliance/ 4 of 4