SlideShare a Scribd company logo
1 of 33
Download to read offline
Wireless security

                       The Competa Plane
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 1
Wireless security

                            See if it Flies ....
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 2
Wireless security

                                               Me

               • Rudi van Drunen
                     •   Senior Consultant & CTO Competa IT
                         •   Design, Deliver and Maintain Complex IT Infrastructure

                     •   CTO XlexiT Technology B.V.
<XlexiT>




                         •   Wireless / Embedded / Networking

                     •   Tech Guru Wireless Leiden
                         •   Largest wireless community network in NL



ver. 1.3
           © 2008 R.van.Drunen@competa.com                        Slide 3
Wireless security

                                     This Talk

                  • Attacks
                  • What to do about it, Applied to wireless
                    • RF level
                    • Protocol level
                      • Encryption
<XlexiT>




                      • Authentication
                    • Application level

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 4
Wireless security

                                           Hierarchy

                                                    Attacks



                     Passive                                                          Active
<XlexiT>




                   Eavesdropping                                                       Denial
                                                 Replay
                                                                                     of Service
                               Traffic analysis            Masquerade

                                                                        Message
                                                                       Modification




ver. 1.3
           © 2008 R.van.Drunen@competa.com                                       Slide 5
Wireless security

                                       Passive


                • Eavesdropping
                   •   Need signal

                   •   Decrypt if needed
<XlexiT>




                • Traffic Analysis
                   •   Get data from signal and traffic


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 6
Wireless security

                                    Active (1)


                • Denial of Service
                   •   Radio Level (microwave method)

                   •
<XlexiT>




                       Flooding AP with packets

                   •   Disconnect messages



ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 7
Wireless security

                                    Active (2)


                • Replay
                   •   Listen to the traffic, get SSID, MAC

                   •   replay and associate, masquerade
<XlexiT>




                • Message modification
                   •   Rogue Accesspoint


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 8
Wireless security

                       802.11 alphabet soup
                •   802.11a 5 GHz WLAN


                •   802.11b 2.4 GHz WLAN


                •   802.11c Bridging between APs


                •   802.11d Global frequency harmonization


                •   802.11e MAC level enhancements for QoS


                •
<XlexiT>




                    802.11f Inter Access Point Protocol for Roaming


                •   802.11g High Rate 2.4 GHz WLAN


                •   802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control


                •   802.11i   Security Enhancements


                •   802.11n Super Fast WLAN (mimo)



ver. 1.3
           © 2008 R.van.Drunen@competa.com                                            Slide 9
Wireless security

                                      Wireless



                • RF Level ...
                   •
<XlexiT>




                       cf. ethernet level.....




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 10
Wireless security

                           leaky building ...
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 11
Wireless security

                                    Antennae
<XlexiT>




                  Omnidirectional                   Directional

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 12
Wireless security

                         Shaping coverage
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 13
Wireless security

                                  Site Survey
<XlexiT>




                  - Outside-in
                  - Use Antennas (remember:Leaky building)
                  - Check RF interference

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 14
Wireless security

                               Protocol Level
                  • Encryption
                        •   WEP, WPA, WPA2

                  • Key management
                  • Authorization - Authentication
<XlexiT>




                        •   802.1x, RADIUS

                        •   EAP Methods

                  • Cooking it up: WPA2 with EAP-TLS
ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 15
Wireless security

                                             WEP
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 16
Wireless security

                              Next please ...

                • 802.11i
                   •   WPA
                        •   Transient Security Network (TSN)

                              •   TSN = TKIP + WPA(1) + Radius
<XlexiT>




                        •   Temporal keys, Message Integrity Check


                   •   WPA2
                        •   Robust Security Network (RSN)

                              •   RSN = CCMP + WPA(2) + Radius


ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 17
Wireless security

                                             WPA

                • 802.11i framework
                • Try to fix the flaws introduced in WEP
                   •   TKIP, MIC, tsc

                • Keep backwards compatible
<XlexiT>




                   •   (HW level (should be firmware update))

                • Add authentication layer (802.1x)
ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 18
Wireless security

                                             WPA
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 19
Wireless security

                                         WPA2
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 20
Wireless security

                               Key managment

            •       Pairwise Keys

                •    Between EACH client and AP different pair

                •    Computed / Distributed @association time

                •    Unicast
<XlexiT>




            •       Group Keys

                •    Same key between AP and every client

                •    Broadcast (and multicast)




ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 21
Wireless security

                                Key Hierachy
               • Pairwise master key (PMK)
                  •   From Auth server (or pre-shared)

                  •   Generated during authentication (tls/ssl)

                  •   WPA: Radius server sends PMK to AP

               • From PMK AP derives Temporal keys
<XlexiT>




                  •   Pairwise Transient Keys
                        •   Data Encryption ,Integrity keys ; EAPOL keys

                        •   These keys are used in encryption engines
ver. 1.3
           © 2008 R.van.Drunen@competa.com                       Slide 22
Wireless security

                              Authentication



                • 802.1x
                   •   Not part of 802.11 suite
<XlexiT>




                   •   Can also be used on wired networks.




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 23
Wireless security

                   Authentication: Radius

                • Component in 802.1x
                • Other Applications in Wireless
                   •   MAC Address authentication
<XlexiT>




                       •   NOT SECURE !

                   •   Captive Portal
                       •   nocat, m0n0wall   (www.m0n0.ch/wall)




ver. 1.3
           © 2008 R.van.Drunen@competa.com                        Slide 24
Wireless security

                         802.1x + RADIUS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 25
Wireless security

                               Cooking it up

               • EAP-TLS enterprise in time
                  •   Authentication mechanism

                  •   Key distribution mechanism

               • Other fun things wpa
<XlexiT>




               • WPA @home

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 26
Wireless security

                                      EAP-TLS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 27
Wireless security

                                      EAP-TLS
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 28
Wireless security

                               Fun things WPA

                 • Key caching
                       •   Returning authenticated client
                           •   send (PM)Key name in associate request

                           •   AP start 4-way handshake
<XlexiT>




                           •   AP verifies PMKey


                 • Pre-authentication
                           •   Makes Roaming seamless and faster



ver. 1.3
           © 2008 R.van.Drunen@competa.com                         Slide 29
Wireless security

                                  WPA@home
                • No Radius server
                • Primary Master Key as Shared Secret
                   •   Key generation from password (rfc 2898)
                           •   good passwords: https://www.grc.com/passwords
<XlexiT>




                   •   AP and Client have same PMK

                   •   4 way handshake between AP - Client

                   •   Client / AP derive temporal keys for
                       encryption
ver. 1.3
           © 2008 R.van.Drunen@competa.com                           Slide 30
Wireless security

                       WPA-PSK Overview
<XlexiT>




ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 31
Wireless security

                           Application Level

                • VPN (ipsec, OpenVPN)
                   •   Some Setup required

                • SSL connections
                   •
<XlexiT>




                       You thought everything did ssl, right ?!

                • Captive portals
                   •   Hotspot model

ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 32
Wireless security




                               Questions ?!
<XlexiT>




                   R.van.Drunen@competa.com


ver. 1.3
           © 2008 R.van.Drunen@competa.com              Slide 33

More Related Content

What's hot

Nexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentNexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentSal Lopez
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...Erol TOKALACOGLU
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleAri Zoldan
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07Niit Care
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15Niit Care
 

What's hot (8)

Nexus 1010 Overview and Deployment
Nexus 1010 Overview and DeploymentNexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
CRENNO Technologies Network Consultancy &amp; Session Border Controller Solut...
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R BundleProxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
 
Comp tia n+_session_07
Comp tia n+_session_07Comp tia n+_session_07
Comp tia n+_session_07
 
Comp tia a+_session_15
Comp tia a+_session_15Comp tia a+_session_15
Comp tia a+_session_15
 

Viewers also liked

Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchImage Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchMatt Hancher
 
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationNASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationDavid Mittelman
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionJOLLUSUDARSHANREDDY
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldApplications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldAshwani Srivastava
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSahil Biswas
 

Viewers also liked (10)

Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision WorkbenchImage Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
 
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 PresentationNASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
 
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
 
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detectionwireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical FieldApplications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
 
Medical Image Processing
Medical Image ProcessingMedical Image Processing
Medical Image Processing
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 

Similar to Wireless Security

Cours Cisco
Cours CiscoCours Cisco
Cours Cisco123addou
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switchesKJ Savaliya
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27JungIn Jung
 
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Jake Yoo
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡zman
 
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica  Fabian Kienle FinalCvc2009 Moscow Repeater+Ica  Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle FinalLiudmila Li
 
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication   Herman ClausTr@Ins6 Trackside Communication   Herman Claus
Tr@Ins6 Trackside Communication Herman Clausimec.archive
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationNir Cohen
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksYaser Rahmati
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01Lema John Michael
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalFisal Anwari
 

Similar to Wireless Security (20)

L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
Cours Cisco
Cours CiscoCours Cisco
Cours Cisco
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
10 fn s45
10 fn s4510 fn s45
10 fn s45
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
 
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 
從INTEL技術談網路卡
從INTEL技術談網路卡從INTEL技術談網路卡
從INTEL技術談網路卡
 
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica  Fabian Kienle FinalCvc2009 Moscow Repeater+Ica  Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
 
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication   Herman ClausTr@Ins6 Trackside Communication   Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
NetX
NetXNetX
NetX
 
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Wireless Security

  • 1. Wireless security The Competa Plane <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 1
  • 2. Wireless security See if it Flies .... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 2
  • 3. Wireless security Me • Rudi van Drunen • Senior Consultant & CTO Competa IT • Design, Deliver and Maintain Complex IT Infrastructure • CTO XlexiT Technology B.V. <XlexiT> • Wireless / Embedded / Networking • Tech Guru Wireless Leiden • Largest wireless community network in NL ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 3
  • 4. Wireless security This Talk • Attacks • What to do about it, Applied to wireless • RF level • Protocol level • Encryption <XlexiT> • Authentication • Application level ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 4
  • 5. Wireless security Hierarchy Attacks Passive Active <XlexiT> Eavesdropping Denial Replay of Service Traffic analysis Masquerade Message Modification ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 5
  • 6. Wireless security Passive • Eavesdropping • Need signal • Decrypt if needed <XlexiT> • Traffic Analysis • Get data from signal and traffic ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 6
  • 7. Wireless security Active (1) • Denial of Service • Radio Level (microwave method) • <XlexiT> Flooding AP with packets • Disconnect messages ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 7
  • 8. Wireless security Active (2) • Replay • Listen to the traffic, get SSID, MAC • replay and associate, masquerade <XlexiT> • Message modification • Rogue Accesspoint ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 8
  • 9. Wireless security 802.11 alphabet soup • 802.11a 5 GHz WLAN • 802.11b 2.4 GHz WLAN • 802.11c Bridging between APs • 802.11d Global frequency harmonization • 802.11e MAC level enhancements for QoS • <XlexiT> 802.11f Inter Access Point Protocol for Roaming • 802.11g High Rate 2.4 GHz WLAN • 802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control • 802.11i Security Enhancements • 802.11n Super Fast WLAN (mimo) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 9
  • 10. Wireless security Wireless • RF Level ... • <XlexiT> cf. ethernet level..... ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 10
  • 11. Wireless security leaky building ... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 11
  • 12. Wireless security Antennae <XlexiT> Omnidirectional Directional ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 12
  • 13. Wireless security Shaping coverage <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 13
  • 14. Wireless security Site Survey <XlexiT> - Outside-in - Use Antennas (remember:Leaky building) - Check RF interference ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 14
  • 15. Wireless security Protocol Level • Encryption • WEP, WPA, WPA2 • Key management • Authorization - Authentication <XlexiT> • 802.1x, RADIUS • EAP Methods • Cooking it up: WPA2 with EAP-TLS ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 15
  • 16. Wireless security WEP <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 16
  • 17. Wireless security Next please ... • 802.11i • WPA • Transient Security Network (TSN) • TSN = TKIP + WPA(1) + Radius <XlexiT> • Temporal keys, Message Integrity Check • WPA2 • Robust Security Network (RSN) • RSN = CCMP + WPA(2) + Radius ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 17
  • 18. Wireless security WPA • 802.11i framework • Try to fix the flaws introduced in WEP • TKIP, MIC, tsc • Keep backwards compatible <XlexiT> • (HW level (should be firmware update)) • Add authentication layer (802.1x) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 18
  • 19. Wireless security WPA <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 19
  • 20. Wireless security WPA2 <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 20
  • 21. Wireless security Key managment • Pairwise Keys • Between EACH client and AP different pair • Computed / Distributed @association time • Unicast <XlexiT> • Group Keys • Same key between AP and every client • Broadcast (and multicast) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 21
  • 22. Wireless security Key Hierachy • Pairwise master key (PMK) • From Auth server (or pre-shared) • Generated during authentication (tls/ssl) • WPA: Radius server sends PMK to AP • From PMK AP derives Temporal keys <XlexiT> • Pairwise Transient Keys • Data Encryption ,Integrity keys ; EAPOL keys • These keys are used in encryption engines ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 22
  • 23. Wireless security Authentication • 802.1x • Not part of 802.11 suite <XlexiT> • Can also be used on wired networks. ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 23
  • 24. Wireless security Authentication: Radius • Component in 802.1x • Other Applications in Wireless • MAC Address authentication <XlexiT> • NOT SECURE ! • Captive Portal • nocat, m0n0wall (www.m0n0.ch/wall) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 24
  • 25. Wireless security 802.1x + RADIUS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 25
  • 26. Wireless security Cooking it up • EAP-TLS enterprise in time • Authentication mechanism • Key distribution mechanism • Other fun things wpa <XlexiT> • WPA @home ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 26
  • 27. Wireless security EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 27
  • 28. Wireless security EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 28
  • 29. Wireless security Fun things WPA • Key caching • Returning authenticated client • send (PM)Key name in associate request • AP start 4-way handshake <XlexiT> • AP verifies PMKey • Pre-authentication • Makes Roaming seamless and faster ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 29
  • 30. Wireless security WPA@home • No Radius server • Primary Master Key as Shared Secret • Key generation from password (rfc 2898) • good passwords: https://www.grc.com/passwords <XlexiT> • AP and Client have same PMK • 4 way handshake between AP - Client • Client / AP derive temporal keys for encryption ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 30
  • 31. Wireless security WPA-PSK Overview <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 31
  • 32. Wireless security Application Level • VPN (ipsec, OpenVPN) • Some Setup required • SSL connections • <XlexiT> You thought everything did ssl, right ?! • Captive portals • Hotspot model ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 32
  • 33. Wireless security Questions ?! <XlexiT> R.van.Drunen@competa.com ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 33