Wireless LAN Deployment Best Practices

Michael Boman
Michael BomanIT Security Specialist at Pensionsmyndigheten um Swedish Pensions Agency
Wireless LAN Deployment Best Practices Michael Boman IT Security Researcher & Developer http://proxy.11a.nu | proxy@11a.nu
What We Will Cover ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Basics ,[object Object],[object Object],[object Object],[object Object]
Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object]
The different 802.11 Standards ,[object Object],[object Object],[object Object],[object Object]
The different 802.11 Standards ,[object Object],[object Object],[object Object],[object Object]
The different 802.11 Standards ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],The different 802.11 Standards
The different 802.11 Standards ,[object Object],[object Object],[object Object]
Concepts of the 802.11 MAC layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concepts of the 802.11 MAC layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ad Hoc Networks ,[object Object],[object Object],[object Object]
Ad Hoc mode or IBSS configuration CELL Wireless Laptop Computers
Infrastructure Networks ,[object Object],[object Object],[object Object],[object Object]
Infrastructure mode or BSS configuration Wireless Access Point Wireless Laptop Computer Wireless Laptop Computer Internal LAN
[object Object]
Antenna Signal ,[object Object],[object Object],[object Object],[object Object]
Antenna Signal ,[object Object],[object Object]
802.11 Design Flaws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSID ,[object Object],[object Object],[object Object]
SSID
SSID
Access Control ,[object Object],[object Object],[object Object],[object Object]
Wired Equivalent Privacy (WEP) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wired Equivalent Privacy (WEP) ,[object Object],[object Object],[object Object],[object Object]
Wi-Fi Protected Access (WPA) ,[object Object],[object Object],[object Object]
Extensible Authentication Protocol (EAP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Network Access Controls ,[object Object],[object Object],[object Object]
Business Risks of Wireless LANs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Risks  INTRODUCED by Wireless Technology ,[object Object],[object Object],Computerworld survey estimate at least 30 percent of businesses have rogue wireless LANs.
Rogue Device Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Rogue Access Points
Denial of Service ,[object Object],[object Object],[object Object]
Security Risks of Wireless LANs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless is insecure by its very nature   The point?
[object Object]
Hardware Wireless Card and Antenna
Hardware ,[object Object]
Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stumbling Tools ,[object Object]
Sniffing Tools ,[object Object]
Handheld Tools ,[object Object]
Hacking Tools ,[object Object]
Attacks against Wireless Networks
Leeching access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Auto Configuration Algorithm ,[object Object],[object Object]
Wireless Auto Configuration Algorithm ,[object Object]
Wireless Auto Configuration Algorithm ,[object Object],[object Object],[object Object],[object Object]
Wireless Auto Configuration Algorithm ,[object Object],[object Object]
Wireless Auto Configuration Algorithm ,[object Object],[object Object],[object Object]
Attacking Wireless Auto Configuration ,[object Object],[object Object],[object Object]
Attacking Wireless Auto Configuration ,[object Object]
Attacking Wireless Auto Configuration ,[object Object],[object Object],[object Object]
Wireless Auto Configuration Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Tool to Automate the Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating An  ALL SSIDs  Network ,[object Object],[object Object],[object Object],[object Object]
Creating a  FishNet ,[object Object],[object Object],[object Object],[object Object]
FishNet Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Client-Side Application Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Beating access control ,[object Object],[object Object],[object Object],[object Object],[object Object]
Denial of service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session hijacking ,[object Object],[object Object],[object Object]
Man in the middle ,[object Object],[object Object],[object Object],[object Object]
Home Users Wireless Access Point Hack-me Hack-me
Corporate Networks Accounting Payroll Wireless Access Point Wireless Hacker Switch
Corporate Networks Accounting Payroll Wireless Access Point Wireless Hacker Switch
[object Object],[object Object],[object Object],[object Object],[object Object],Corporate Networks
Telecommuters
[object Object]
SEC-     -Y U - R - IT  If not you, who?  If not now, when? The key to security awareness is embedded in the word security…
Countermeasures ,[object Object],[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object]
Identification ,[object Object],[object Object],[object Object],[object Object]
Response ,[object Object],[object Object],[object Object]
Countermeasures - Antenna Signal  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countermeasures - SSID ,[object Object],[object Object],[object Object]
Countermeasures - MAC ACL  ,[object Object],[object Object],[object Object]
Countermeasures - WEP ,[object Object],[object Object],[object Object]
Countermeasures - User Access Control  ,[object Object],[object Object],[object Object]
Countermeasures - Access Point (AP) ,[object Object],[object Object],[object Object],[object Object]
Countermeasures - DOS ,[object Object],[object Object],[object Object],[object Object]
Wireless can be Secure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Putting it all together Wireless Laptop Computer VPN Gateway Authentication Server Internal LAN With personal Firewall & VPN Software WEP MAC Filtering  Unique SSID  (If Broadcasting is not disabled) IP Protocol 50,51 UDP port 500 Wireless Access Point Firewall IDS WIDS WIDS
[object Object]
1 von 86

Recomendados

Wireless security presentation von
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
40.5K views21 Folien
Wimax von
WimaxWimax
WimaxShayan Asadbeygi
52.3K views36 Folien
Hiperlan von
HiperlanHiperlan
HiperlanThen Murugeshwari
16.2K views23 Folien
GSM & UMTS Security von
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS SecuritySohaib Altaf
2.9K views29 Folien
Wi-MAX Technology von
Wi-MAX TechnologyWi-MAX Technology
Wi-MAX TechnologyBibhu Prasad Sahu
1.1K views21 Folien
Wlan architecture von
Wlan architectureWlan architecture
Wlan architectureVishal Verma
24.3K views19 Folien

Más contenido relacionado

Was ist angesagt?

Sensor Protocols for Information via Negotiation (SPIN) von
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
8.5K views16 Folien
Presentation on CDMA von
Presentation on CDMAPresentation on CDMA
Presentation on CDMAShuvangkar Dhar
22.7K views22 Folien
Wifi Security von
Wifi SecurityWifi Security
Wifi SecurityShital Kat
2.4K views28 Folien
Cellular network von
Cellular networkCellular network
Cellular networkshreb
16.7K views40 Folien
Wireless lan security von
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
858 views12 Folien
Black hole attack von
Black hole attackBlack hole attack
Black hole attackRicha Kumari
4.8K views39 Folien

Was ist angesagt?(20)

Sensor Protocols for Information via Negotiation (SPIN) von rajivagarwal23dei
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei8.5K views
Wifi Security von Shital Kat
Wifi SecurityWifi Security
Wifi Security
Shital Kat2.4K views
Cellular network von shreb
Cellular networkCellular network
Cellular network
shreb16.7K views
Wireless lan security von Ankit Anand
Wireless lan securityWireless lan security
Wireless lan security
Ankit Anand858 views
Mac protocols von juno susi
Mac protocolsMac protocols
Mac protocols
juno susi15.9K views
Handover in Mobile Computing von KABILESH RAMAR
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR10.3K views
Wireless Local Area Networks von Don Norwood
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
Don Norwood13.9K views
HANDOFF von AJAL A J
HANDOFFHANDOFF
HANDOFF
AJAL A J58K views
Wireless network ppt von Basil John
Wireless network pptWireless network ppt
Wireless network ppt
Basil John20.5K views
ADAPTIVE MODULATION TECHNIQUES FOR CAPACITY IMPROVEMENT OF BER IN WCDMA von mirza asif haider
ADAPTIVE MODULATION TECHNIQUES FOR CAPACITY IMPROVEMENT OF BER IN WCDMAADAPTIVE MODULATION TECHNIQUES FOR CAPACITY IMPROVEMENT OF BER IN WCDMA
ADAPTIVE MODULATION TECHNIQUES FOR CAPACITY IMPROVEMENT OF BER IN WCDMA
mirza asif haider1.2K views
Topics in wireless communication for project and thesis von Techsparks
Topics in wireless communication for project and thesisTopics in wireless communication for project and thesis
Topics in wireless communication for project and thesis
Techsparks 332 views
Wi-max Technology PPT von Vinay Krishna
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
Vinay Krishna31.4K views
Gsm security algorithms A3 , A5 , A8 von RUpaliLohar
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
RUpaliLohar2.5K views

Destacado

W-LAN (Wireless Local Area Network) von
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
23.2K views28 Folien
Basic Concepts in Wireless LAN von
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LANDr Shashikant Athawale
3.5K views32 Folien
Ieee 802.11 wireless lan von
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lanParthipan Parthi
2.7K views30 Folien
Wireless LAN security von
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
28.9K views14 Folien
Wireless LAN technologies von
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologiesbalasubramani p
4.9K views47 Folien
Fudcon 2015...Wireless: From Basics to Internals von
Fudcon 2015...Wireless: From Basics to InternalsFudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to InternalsKiran Divekar
896 views36 Folien

Destacado(19)

W-LAN (Wireless Local Area Network) von Parvesh Taneja
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja23.2K views
Wireless LAN security von Rajan Kumar
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar28.9K views
Fudcon 2015...Wireless: From Basics to Internals von Kiran Divekar
Fudcon 2015...Wireless: From Basics to InternalsFudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to Internals
Kiran Divekar896 views
Computer networks wireless lan,ieee-802.11,bluetooth von Deepak John
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
Deepak John4.5K views
Wireless communication von izhar ul haq
Wireless communicationWireless communication
Wireless communication
izhar ul haq848 views
SOLAR TREE technical seminar PPT(by mohsin khan) von Mohsin Khan
SOLAR TREE technical seminar  PPT(by mohsin khan)SOLAR TREE technical seminar  PPT(by mohsin khan)
SOLAR TREE technical seminar PPT(by mohsin khan)
Mohsin Khan1.4K views
Wireless LAN Security, Policy, and Deployment Best Practices von Cisco Mobility
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility20.7K views
Satellite communications von SARITHA REDDY
Satellite communicationsSatellite communications
Satellite communications
SARITHA REDDY107K views

Similar a Wireless LAN Deployment Best Practices

Wi Fi Technology von
Wi Fi TechnologyWi Fi Technology
Wi Fi TechnologyAlok Pandey (AP)
826 views42 Folien
Wireless Device and Network level security von
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
1.7K views42 Folien
Securing the Use of Wireless Fidelity (WiFi) in Libraries von
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesPhilippine Association of Academic/Research Librarians
1.2K views51 Folien
Wireless hacking septafiansyah von
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
1.9K views39 Folien
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com von
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
1.3K views74 Folien
Wireless Technology von
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
306 views6 Folien

Similar a Wireless LAN Deployment Best Practices(20)

Wireless Device and Network level security von Chetan Kumar S
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S1.7K views
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com von phanleson
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
phanleson1.3K views
Wireless Technology von Netwax Lab
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab306 views
Wireless+LAN+Technology+and+Security+Vulnerabilities von Yogesh Kumar
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar329 views
Wireless communication and networking von M Sabir Saeed
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed800 views
POLITEKNIK MALAYSIA von Aiman Hud
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud237 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy318 views
Wireless security von paripec
Wireless securityWireless security
Wireless security
paripec1.5K views
Pentesting Your Own Wireless Networks, June 2011 Issue von Ishan Girdhar
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar2.1K views
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg von Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Eric Vanderburg2.4K views
Chapter 7 - Wireless Network Security.pptx von AmanuelZewdie4
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4152 views

Más de Michael Boman

How to drive a malware analyst crazy von
How to drive a malware analyst crazyHow to drive a malware analyst crazy
How to drive a malware analyst crazyMichael Boman
1.1K views51 Folien
Indicators of compromise: From malware analysis to eradication von
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationMichael Boman
1.4K views29 Folien
44CON 2014: Using hadoop for malware, network, forensics and log analysis von
44CON 2014: Using hadoop for malware, network, forensics and log analysis44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysisMichael Boman
10.1K views34 Folien
DEEPSEC 2013: Malware Datamining And Attribution von
DEEPSEC 2013: Malware Datamining And AttributionDEEPSEC 2013: Malware Datamining And Attribution
DEEPSEC 2013: Malware Datamining And AttributionMichael Boman
6K views43 Folien
44CON 2013 - Controlling a PC using Arduino von
44CON 2013 - Controlling a PC using Arduino44CON 2013 - Controlling a PC using Arduino
44CON 2013 - Controlling a PC using ArduinoMichael Boman
2.2K views15 Folien
Malware Analysis on a Shoestring Budget von
Malware Analysis on a Shoestring BudgetMalware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring BudgetMichael Boman
1.3K views41 Folien

Más de Michael Boman(20)

How to drive a malware analyst crazy von Michael Boman
How to drive a malware analyst crazyHow to drive a malware analyst crazy
How to drive a malware analyst crazy
Michael Boman1.1K views
Indicators of compromise: From malware analysis to eradication von Michael Boman
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradication
Michael Boman1.4K views
44CON 2014: Using hadoop for malware, network, forensics and log analysis von Michael Boman
44CON 2014: Using hadoop for malware, network, forensics and log analysis44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysis
Michael Boman10.1K views
DEEPSEC 2013: Malware Datamining And Attribution von Michael Boman
DEEPSEC 2013: Malware Datamining And AttributionDEEPSEC 2013: Malware Datamining And Attribution
DEEPSEC 2013: Malware Datamining And Attribution
Michael Boman6K views
44CON 2013 - Controlling a PC using Arduino von Michael Boman
44CON 2013 - Controlling a PC using Arduino44CON 2013 - Controlling a PC using Arduino
44CON 2013 - Controlling a PC using Arduino
Michael Boman2.2K views
Malware Analysis on a Shoestring Budget von Michael Boman
Malware Analysis on a Shoestring BudgetMalware Analysis on a Shoestring Budget
Malware Analysis on a Shoestring Budget
Michael Boman1.3K views
Malware analysis as a hobby (Owasp Göteborg) von Michael Boman
Malware analysis as a hobby (Owasp Göteborg)Malware analysis as a hobby (Owasp Göteborg)
Malware analysis as a hobby (Owasp Göteborg)
Michael Boman776 views
Malware analysis as a hobby - the short story (lightning talk) von Michael Boman
Malware analysis as a hobby - the short story (lightning talk)Malware analysis as a hobby - the short story (lightning talk)
Malware analysis as a hobby - the short story (lightning talk)
Michael Boman575 views
Sans och vett på Internet von Michael Boman
Sans och vett på InternetSans och vett på Internet
Sans och vett på Internet
Michael Boman452 views
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W... von Michael Boman
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Michael Boman628 views
Hur man kan testa sin HTTPS-server von Michael Boman
Hur man kan testa sin HTTPS-serverHur man kan testa sin HTTPS-server
Hur man kan testa sin HTTPS-server
Michael Boman381 views
OWASP AppSec Research 2010 - The State of SSL in the World von Michael Boman
OWASP AppSec Research 2010 - The State of SSL in the WorldOWASP AppSec Research 2010 - The State of SSL in the World
OWASP AppSec Research 2010 - The State of SSL in the World
Michael Boman418 views
Enkla hackerknep för testare von Michael Boman
Enkla hackerknep för testareEnkla hackerknep för testare
Enkla hackerknep för testare
Michael Boman511 views
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08 von Michael Boman
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Michael Boman331 views
USB (In)Security 2008-08-22 von Michael Boman
USB (In)Security 2008-08-22USB (In)Security 2008-08-22
USB (In)Security 2008-08-22
Michael Boman409 views
Automatic Malware Analysis 2008-09-19 von Michael Boman
Automatic Malware Analysis 2008-09-19Automatic Malware Analysis 2008-09-19
Automatic Malware Analysis 2008-09-19
Michael Boman340 views
Overcoming USB (In)Security von Michael Boman
Overcoming USB (In)SecurityOvercoming USB (In)Security
Overcoming USB (In)Security
Michael Boman987 views
Privacy in Wireless Networks von Michael Boman
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
Michael Boman754 views
Network Security Monitoring - Theory and Practice von Michael Boman
Network Security Monitoring - Theory and PracticeNetwork Security Monitoring - Theory and Practice
Network Security Monitoring - Theory and Practice
Michael Boman1K views

Último

Serverless computing with Google Cloud (2023-24) von
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 views33 Folien
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
34 views35 Folien
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
21 views15 Folien
PharoJS - Zürich Smalltalk Group Meetup November 2023 von
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023Noury Bouraqadi
132 views17 Folien
Future of AR - Facebook Presentation von
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentationssuserb54b561
15 views27 Folien
Design Driven Network Assurance von
Design Driven Network AssuranceDesign Driven Network Assurance
Design Driven Network AssuranceNetwork Automation Forum
15 views42 Folien

Último(20)

Serverless computing with Google Cloud (2023-24) von wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院

Wireless LAN Deployment Best Practices

  • 1. Wireless LAN Deployment Best Practices Michael Boman IT Security Researcher & Developer http://proxy.11a.nu | proxy@11a.nu
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Ad Hoc mode or IBSS configuration CELL Wireless Laptop Computers
  • 14.
  • 15. Infrastructure mode or BSS configuration Wireless Access Point Wireless Laptop Computer Wireless Laptop Computer Internal LAN
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. SSID
  • 22. SSID
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Wireless is insecure by its very nature The point?
  • 36.
  • 37. Hardware Wireless Card and Antenna
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Home Users Wireless Access Point Hack-me Hack-me
  • 65. Corporate Networks Accounting Payroll Wireless Access Point Wireless Hacker Switch
  • 66. Corporate Networks Accounting Payroll Wireless Access Point Wireless Hacker Switch
  • 67.
  • 69.
  • 70. SEC- -Y U - R - IT If not you, who? If not now, when? The key to security awareness is embedded in the word security…
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85. Putting it all together Wireless Laptop Computer VPN Gateway Authentication Server Internal LAN With personal Firewall & VPN Software WEP MAC Filtering Unique SSID (If Broadcasting is not disabled) IP Protocol 50,51 UDP port 500 Wireless Access Point Firewall IDS WIDS WIDS
  • 86.