Submit Search
Upload
Wireless Security
•
2 likes
•
1,298 views
R
rudivd
Follow
Rudi van Drunen Presentation on wireless security NLUUG vj 08. Courtesy of www.competa.com
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 33
Download now
Download to read offline
Recommended
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
Sonic wall tz series
Sonic wall tz series
Shahaji Kaitke
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Yury Chemerkin
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
Banking at Ho Chi Minh city
Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
Comp tia n+_session_08
Comp tia n+_session_08
Niit Care
O Lplc01 Course Manual1
O Lplc01 Course Manual1
ersaurabh28
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
Eugene Sushchenko
Recommended
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
Sonic wall tz series
Sonic wall tz series
Shahaji Kaitke
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Yury Chemerkin
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
Banking at Ho Chi Minh city
Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
Comp tia n+_session_08
Comp tia n+_session_08
Niit Care
O Lplc01 Course Manual1
O Lplc01 Course Manual1
ersaurabh28
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
Eugene Sushchenko
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Sal Lopez
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Erol TOKALACOGLU
Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Yustinus Malawau
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Ari Zoldan
Comp tia n+_session_07
Comp tia n+_session_07
Niit Care
Comp tia a+_session_15
Comp tia a+_session_15
Niit Care
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
Matt Hancher
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
David Mittelman
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
NASA Open Government Initiative
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
JOLLUSUDARSHANREDDY
Security in wireless sensor network
Security in wireless sensor network
Adit Pathak
Wireless Networking Security
Wireless Networking Security
Anshuman Biswal
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Ashwani Srivastava
Medical Image Processing
Medical Image Processing
Pantech ProLabs India Pvt Ltd
Digital Image Processing
Digital Image Processing
Sahil Biswas
L2 Attacks.pdf
L2 Attacks.pdf
vinaykumar947680
Cours Cisco
Cours Cisco
123addou
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
More Related Content
What's hot
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Sal Lopez
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Erol TOKALACOGLU
Comp tia n+_session_02
Comp tia n+_session_02
Niit Care
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Yustinus Malawau
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Ari Zoldan
Comp tia n+_session_07
Comp tia n+_session_07
Niit Care
Comp tia a+_session_15
Comp tia a+_session_15
Niit Care
What's hot
(8)
Nexus 1010 Overview and Deployment
Nexus 1010 Overview and Deployment
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
CRENNO Technologies Network Consultancy & Session Border Controller Solut...
Comp tia n+_session_02
Comp tia n+_session_02
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Proxim Tsunami QuickBridge.11 Model 5054-R Bundle
Comp tia n+_session_07
Comp tia n+_session_07
Comp tia a+_session_15
Comp tia a+_session_15
Viewers also liked
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
Matt Hancher
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
David Mittelman
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
NASA Open Government Initiative
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
JOLLUSUDARSHANREDDY
Security in wireless sensor network
Security in wireless sensor network
Adit Pathak
Wireless Networking Security
Wireless Networking Security
Anshuman Biswal
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Ashwani Srivastava
Medical Image Processing
Medical Image Processing
Pantech ProLabs India Pvt Ltd
Digital Image Processing
Digital Image Processing
Sahil Biswas
Viewers also liked
(10)
Image Processing and Cartography with the NASA Vision Workbench
Image Processing and Cartography with the NASA Vision Workbench
NASA Spinoff 2015 Presentation
NASA Spinoff 2015 Presentation
2011 NASA Open Source Summit - Terry Fong
2011 NASA Open Source Summit - Terry Fong
wireless security control system and sensor network for smoke and fire detection
wireless security control system and sensor network for smoke and fire detection
Security in wireless sensor network
Security in wireless sensor network
Wireless Networking Security
Wireless Networking Security
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Applications of Digital image processing in Medical Field
Applications of Digital image processing in Medical Field
Medical Image Processing
Medical Image Processing
Digital Image Processing
Digital Image Processing
Similar to Wireless Security
L2 Attacks.pdf
L2 Attacks.pdf
vinaykumar947680
Cours Cisco
Cours Cisco
123addou
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Sumutiu Marius
10 fn s45
10 fn s45
Scott Foster
10 fn s45
10 fn s45
Scott Foster
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
JungIn Jung
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
Jake Yoo
CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
computerlenguyen
從INTEL技術談網路卡
從INTEL技術談網路卡
zman
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Liudmila Li
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
imec.archive
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
NetX
NetX
CVA757
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
FAST-Lab. Factory Automation Systems and Technologies Laboratory, Tampere University of Technology
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Nir Cohen
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
Yaser Rahmati
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
Lema John Michael
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
Fisal Anwari
Similar to Wireless Security
(20)
L2 Attacks.pdf
L2 Attacks.pdf
Cours Cisco
Cours Cisco
Cisco systems hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
10 fn s45
10 fn s45
10 fn s45
10 fn s45
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
Sungho Yoo's software development portfolio
Sungho Yoo's software development portfolio
CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
從INTEL技術談網路卡
從INTEL技術談網路卡
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Cvc2009 Moscow Repeater+Ica Fabian Kienle Final
Tr@Ins6 Trackside Communication Herman Claus
Tr@Ins6 Trackside Communication Herman Claus
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
NetX
NetX
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Safety Monitoring system for a manufacturing workstation using Web Service Te...
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
Recently uploaded
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
mohitsingh558521
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Recently uploaded
(20)
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Wireless Security
1.
Wireless security
The Competa Plane <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 1
2.
Wireless security
See if it Flies .... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 2
3.
Wireless security
Me • Rudi van Drunen • Senior Consultant & CTO Competa IT • Design, Deliver and Maintain Complex IT Infrastructure • CTO XlexiT Technology B.V. <XlexiT> • Wireless / Embedded / Networking • Tech Guru Wireless Leiden • Largest wireless community network in NL ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 3
4.
Wireless security
This Talk • Attacks • What to do about it, Applied to wireless • RF level • Protocol level • Encryption <XlexiT> • Authentication • Application level ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 4
5.
Wireless security
Hierarchy Attacks Passive Active <XlexiT> Eavesdropping Denial Replay of Service Traffic analysis Masquerade Message Modification ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 5
6.
Wireless security
Passive • Eavesdropping • Need signal • Decrypt if needed <XlexiT> • Traffic Analysis • Get data from signal and traffic ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 6
7.
Wireless security
Active (1) • Denial of Service • Radio Level (microwave method) • <XlexiT> Flooding AP with packets • Disconnect messages ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 7
8.
Wireless security
Active (2) • Replay • Listen to the traffic, get SSID, MAC • replay and associate, masquerade <XlexiT> • Message modification • Rogue Accesspoint ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 8
9.
Wireless security
802.11 alphabet soup • 802.11a 5 GHz WLAN • 802.11b 2.4 GHz WLAN • 802.11c Bridging between APs • 802.11d Global frequency harmonization • 802.11e MAC level enhancements for QoS • <XlexiT> 802.11f Inter Access Point Protocol for Roaming • 802.11g High Rate 2.4 GHz WLAN • 802.11h ETSI requirements of Dynamic Frequency Selection and Transmitter Power Control • 802.11i Security Enhancements • 802.11n Super Fast WLAN (mimo) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 9
10.
Wireless security
Wireless • RF Level ... • <XlexiT> cf. ethernet level..... ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 10
11.
Wireless security
leaky building ... <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 11
12.
Wireless security
Antennae <XlexiT> Omnidirectional Directional ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 12
13.
Wireless security
Shaping coverage <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 13
14.
Wireless security
Site Survey <XlexiT> - Outside-in - Use Antennas (remember:Leaky building) - Check RF interference ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 14
15.
Wireless security
Protocol Level • Encryption • WEP, WPA, WPA2 • Key management • Authorization - Authentication <XlexiT> • 802.1x, RADIUS • EAP Methods • Cooking it up: WPA2 with EAP-TLS ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 15
16.
Wireless security
WEP <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 16
17.
Wireless security
Next please ... • 802.11i • WPA • Transient Security Network (TSN) • TSN = TKIP + WPA(1) + Radius <XlexiT> • Temporal keys, Message Integrity Check • WPA2 • Robust Security Network (RSN) • RSN = CCMP + WPA(2) + Radius ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 17
18.
Wireless security
WPA • 802.11i framework • Try to fix the flaws introduced in WEP • TKIP, MIC, tsc • Keep backwards compatible <XlexiT> • (HW level (should be firmware update)) • Add authentication layer (802.1x) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 18
19.
Wireless security
WPA <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 19
20.
Wireless security
WPA2 <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 20
21.
Wireless security
Key managment • Pairwise Keys • Between EACH client and AP different pair • Computed / Distributed @association time • Unicast <XlexiT> • Group Keys • Same key between AP and every client • Broadcast (and multicast) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 21
22.
Wireless security
Key Hierachy • Pairwise master key (PMK) • From Auth server (or pre-shared) • Generated during authentication (tls/ssl) • WPA: Radius server sends PMK to AP • From PMK AP derives Temporal keys <XlexiT> • Pairwise Transient Keys • Data Encryption ,Integrity keys ; EAPOL keys • These keys are used in encryption engines ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 22
23.
Wireless security
Authentication • 802.1x • Not part of 802.11 suite <XlexiT> • Can also be used on wired networks. ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 23
24.
Wireless security
Authentication: Radius • Component in 802.1x • Other Applications in Wireless • MAC Address authentication <XlexiT> • NOT SECURE ! • Captive Portal • nocat, m0n0wall (www.m0n0.ch/wall) ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 24
25.
Wireless security
802.1x + RADIUS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 25
26.
Wireless security
Cooking it up • EAP-TLS enterprise in time • Authentication mechanism • Key distribution mechanism • Other fun things wpa <XlexiT> • WPA @home ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 26
27.
Wireless security
EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 27
28.
Wireless security
EAP-TLS <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 28
29.
Wireless security
Fun things WPA • Key caching • Returning authenticated client • send (PM)Key name in associate request • AP start 4-way handshake <XlexiT> • AP verifies PMKey • Pre-authentication • Makes Roaming seamless and faster ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 29
30.
Wireless security
WPA@home • No Radius server • Primary Master Key as Shared Secret • Key generation from password (rfc 2898) • good passwords: https://www.grc.com/passwords <XlexiT> • AP and Client have same PMK • 4 way handshake between AP - Client • Client / AP derive temporal keys for encryption ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 30
31.
Wireless security
WPA-PSK Overview <XlexiT> ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 31
32.
Wireless security
Application Level • VPN (ipsec, OpenVPN) • Some Setup required • SSL connections • <XlexiT> You thought everything did ssl, right ?! • Captive portals • Hotspot model ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 32
33.
Wireless security
Questions ?! <XlexiT> R.van.Drunen@competa.com ver. 1.3 © 2008 R.van.Drunen@competa.com Slide 33
Download now