Wifi Security
Wifi Security
Practice
2
Wireless Network Modes
• The 802.11 wireless networks operate in two basic
modes:
― Infrastructure mode
― Ad-hoc mode
• Infrastructure mode
― Each wireless client connects directly to a central
device called Access Point (AP)
― No direct connection between wireless clients
― AP acts as a wireless hub that performs the connections
and handles them between wireless clients
3
Wireless Network Modes
• Ad-hoc mode:
― Each wireless client connects directly with
each other
― No central device managing the
connections
― Rapid deployment of a temporal network
where no infrastructures exist (advantage
in case of disaster…)
― Each node must maintain its proper
authentication list
4
Key Factors Contributing to Risks
• Channel: broadcast communication (more
susceptible to eavesdropping and jamming)
• Mobility: additional risks (later)
• Resources: advanced OS (iPhone, Android),
but limited resources (memory, processing)
• Accessibility: Certain devices may be left
unattended
5
Wireless Networking Components
(Facilitating points of attack)
6
Wireless Network Threats
No central
Accidental Malicious Ad hoc point
association association networks of control
7
Wireless Security Measures
• Signal hiding
― Turn off SSID name broadcasting
― Cryptic names
• Encryption (standard)
8
Securing Wireless Networks
• Use encryption
• Use and enable anti-virus, anti-spyware,
firewall
• Turn off SSID broadcasting
• Change default identifier on router
• Change router’s preset password
• Apply MAC-filtering
9
SSID – Service Set Identification
• Identifies a particular wireless network
• A client must set the same SSID as the one in that
particular AP Point to join the network
• Without SSID, the client won’t be able to select and
join a wireless network
• Hiding SSID is not a security measure because the
wireless network in this case is not invisible
• It can be defeated by intruders by sniffing it from any
probe signal containing it.
10
SSID
• A way for vendors to make more money
• It is easy to find the ID for a “hidden” network
because the beacon broadcasting cannot be turned
off
• Simply use a utility to show all the current networks:
― inSSIDer
― NetStumbler
― Kismet
11
Mobile Device Security Challenges
• No more tight control over computing devices
• Growing use of mobile (endpoint) devices
• Cloud-based applications readily available (Box,
Dropbox, Skype, …)
• De-perimeterization: static network perimeter is
gone
• External business requirements (guests, third-
party contractors, …)
• Bring Your Own Device (BYOD)
• The above results in threats (next page)
12
Mobile Device Security Threats
• Lack of physical security control
• Use of untrusted mobile devices
• Use of untrusted networks
• Use of apps created by unknown parties
• Interaction with other systems (e.g.,
cloud-based data sync)
• Use of untrusted contents
13
Mobile Device Security Strategy
• Device security (next slide)
• Traffic security (e.g., SSL, VPNs)
• Barrier security (e.g., firewalls, IDS/IPS)
14
Mobile Device Security
• Configure (enable) auto-lock
• Configure/enable SSL
• Enable password/PIN protection
• Configure (disable/discourage) auto-completion (for
passwords)
• Enable remove wipe
• Up-to-date OS/software
• Install anti-virus software
• Encrypt sensitive data on mobile devices
• Prohibit installation of third-party apps
• Policy development followed by training
15
Mobile Device Security Elements
Configure based
on policy
Encrypt
Authenticate/
access control
16
IEEE 802.11 Wireless LAN
• IEEE 802: a committee responsible for
LANs
• IEEE 802.11: responsible for developing
wireless protocols
― Many standards
• The Wi-Fi alliance: became popular with
802.11b
― Wi-Fi Protected Access (WPA, WPA2)
17
IEEE 802.11 Protocol Stack
• Physical layer
(encode/decode
signals)
• MAC layer:
assembles MAC
frame, disassembles
frames and performs
address recognition
• LLC: keeps track of
frame transmission
18
A MAC Frame (MPUD)
• MAC protocol data unit (MPUD)
19
IEEE 802.11 Extended Service Set
• BSS: the
smallest
building block
• BSSs connected
via APs
― Aps functions as
bridges
• ESS: two or
more BSSs
20
IEEE 802.11# Wireless Security
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• WPA2
• Robust Security network (RSN)
21
WEP - Wired Equivalent Privacy
RC4
key
IV encrypted packet
26
WEP Cracking Example
27
WPA - WI-FI Protected Access
• New technique in 2002
• Replacement of security flaws of WEP
• Improved data encryption
• Strong user authentication
• Because of many attacks related to static key,
WPA minimize shared secret key in
accordance with the frame transmission
• Use the RC4 algorithm in a proper way and
provide fast transfer of the data before
someone can decrypt the data.
28
WPA2 - WI-FI Protected Access 2
Based on the IEEE 802.i standard
2 versions: Personal & Enterprise
The primary enhancement over WPA is the use of the
AES (Advanced Encryption Standard) algorithm
The encryption in WPA2 is done by utilizing either AES or
TKIP
The Personal mode uses a PSK (Pre-shared key) & does
not require a separate authentication of users
The enterprise mode requires the users to be separately
authenticated by using the EAP protocol
29
WPA2
WPA2 has immunity against many types of
hacker attacks
Man-in-the middle
Authentication forging
Replay
Key collision
Weak keys
Packet forging
Dictionary attacks
30
WEP vs WPA vs WPA2
WEP WPA WPA2
31
Procedures to Improve Wireless Security
Use wireless intrusion prevention system (WIPS)
Enable WPA-PSK
Use a good passphrase
(https://grc.com/password)
Use WPA2 where possible
AES is more secure, use TKIP for better
performance
Change your SSID every so often
Wireless network users should use or upgrade
their network to the latest security standard
released
32
Wireless Network Tools
MAC Spoofing
http://aspoof.sourceforge.net/
http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp
http://www.klcconsulting.net/smac/
34
Securing Access Point
• Disallow unauthorized access to the AP
• Require authentication for any access
including for devices wishing to attach
themselves to the AP
35
Securing Wireless Networks
change the
turn off identifier identifier on your
broadcasting router from the
default
36
IEEE 802.11 Terminology
37
Wireless Fidelity (Wi-Fi) Alliance
• 802.11b
― first 802.11 standard to gain broad industry acceptance
• Wireless Ethernet Compatibility Alliance (WECA)
― industry consortium formed in 1999 to address the concern of
products from different vendors successfully interoperating
― later renamed the Wi-Fi Alliance
38
IEEE 802 Protocol Architecture
39
General IEEE 802 MPDU Format
40
IEEE 802.11 Architecture: Extended
Service Set
41
IEEE 802.11 Services
Service provider
may be a station
or DS; station
services are
implemented
in every 802.11
station
42
Association Services
• establishes an initial
association association between a station
and an AP
44
Association-Related Services
• Transition types, based on mobility:
― No transition
• A station of this type is either stationary or moves only within the
direct communication range of the communicating stations of a
single BSS
― BSS transition
• Station movement from one BSS to another BSS within the same
ESS; delivery of data to the station requires that the addressing
capability be able to recognize the new location of the station
― ESS transition
• Station movement from a BSS in one ESS to a BSS within another
ESS; maintenance of upper-layer connections supported by 802.11
cannot be guaranteed
45
Wireless LAN Security Protocols
46
IEEE 802.11i Services
• Authentication: the exchange between a
user and an authentication server (AS);
temporary keys are generated
• Access control: routes messages
properly, facilitates key exchange
• Privacy: MAC level data are encrypted
• Security protocols that support the above
services: next page
47
Elements of IEEE 802.11i
48
Phases of Operations: Possibilities
• Two wireless STAs in the same BSS
communicate via an AP
• Two wireless STAs in the same ad hoc BSS
communicating directly
• Two wireless STAs in different BSS
communicating via their Aps
• A wireless less STA communicating with
wired station via its AP
49
IEEE 802.11i Phases of
Operation
• Discovery: AP sends Beacon,
Probe responses to advertise its
802.11 security policy
• Authentication: STA and AS
prove their identities
• Key MGMT: cryptographic key
are generated and saved in STA
and SA
• Protected data transfer
• Connection termination
50
IEEE 802.11i
Phases of
Operation
51
IEEE 802.1x Access Control (for Controlling
Access)
Two physical ports;
many logical ports
mapped to the physical
ports
52
MPDU Exchange
• authentication phase consists of three phases:
― connect to AS
• the STA sends a request to its AP that it has an association with for
connection to the AS; the AP acknowledges this request and sends an access
request to the AS
― EAP (Extensible Authentication Protocol ) exchange
• authenticates the STA and AS to each other
53
IEEE 802.11i
Keys for Data
Confidentiality
and Integrity
Protocols
54
IEEE 802.11i
Key Hierarchy
(Key MGMT)
55
Phases of
Operation:
4-way
Handshake
56
Temporal Key Integrity Protocol (TKIP)
• Designed to require only software changes to devices
that are implemented WEP
• Provides two services:
message data
integrity confidentiality
57
Summary
• Wireless security overview
― wireless network threats
― wireless security measure
― IEEE 802.11 wireless LAN overview
― Wi-Fi alliance
― IEEE 802 protocol architecture
― IEEE 802.11 network components and architectural
model
― IEEE 802.11 services
58