WLANSecurity Mtech
WLANSecurity Mtech
Wireless LANs
1
Outline
• Introduction
• Overview of WLAN Security
• 802.11i architecture and Problems in it
• Issues in WLAN security
2
Introduction
3
Why WLANs?
5
What is WLAN?
IEEE 802.11X Standard
802.11a/b/n – 2.5GHz/5GHz
– 11 Mbps/54Mbps
802.11i – security (802.1X)
802.11w – management frame security
802.11r – mobility/Fast Transition
Options:
Voice-over wiFi
Mobile with wiFi
Mobile without wiFi Supporting Local Transfers (Convergence)
6
802.11 WLAN technologies
IEEE 802.11 standards and rates
IEEE 802.11 (1997) 1 Mbps and 2 Mbps (2.4 GHz band )
IEEE 802.11b (1999) 11 Mbps (2.4 GHz band) = Wi-Fi
IEEE 802.11a (1999) 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz
band)
IEEE 802.11g (2001 ... 2003) up to 54 Mbps (2.4 GHz) backward
compatible to 802.11b
IEEE 802.11n 2009 up to 15, 30, 45, 60, 90, 120, 135, 150
IEEE 802.11ac 2012 up to 200, 433.3, 866.7
IEEE 802.11ad 2014 up to 6.75Gb/s
7
IEEE 802 LAN standards and
TCP/IP model
The IEEE 802.x LAN standards deal with the
DataLink and Physical layer of the TCP/IP model
IEEE 802 LAN
10
Access Points
Used in the infrastructure mode.
Functions like a bridge between an IEEE
802.11 wireless network and an Ethernet.
An infrastructure mode station must
associate with an access point.
All frame transfer must pass through the AP even if
frames can be directly sent to other stations using
the ad hoc mode.
The AP, acting like a central controller
14- 11
Limitation
Contention based
Separate frames for management
functionalities and data transfer
Limited range and Capacity of APs (An AP
can cater limited users at a time)
Broadcast communication (collision occurs
and visible to others)
Wireless Hotspot - Wardriving
Two layer (redundant) security exists
12
Overview of WLAN Security
13
Security in WLAN: An Overview
Attack Tools - 1
Tcpdump for obtaining MAC information: http://www.tcpdump.org/
Wireshark for obtaining MAC information: http://www.wireshark.org/
Kismet for obtaining MAC information:
http://www.kismetwireless.net/
Sniffing software for management frames “Netstumbler”:
http://www.netstumbler.com
Collection of tools for network penetration “Dsniff”:
http://packages.debian.org/stable/net/dsniff/
GNU MAC Changer 16.0: http://www.alobbs.com
MAC Spoofing “SpoofMAC”: http://www.klcconsulting.net/smac/
MAC address Changer“Technitium”:
www.technitium.com/tmac/index.html
Wireless network discovery tool for Mac OS X “KisMAC”:
http://binaervarianz.de/projekte/
15
Attack Tools - 2
File2air written by Joshua Wright at:
http://www.willhackforsushi.com/File2air.html
Frame injection program “Aireplay-ng”:
http://www.aircrack-ng.org/doku.php
“FakeAP”: Black Alchemy Weapons Lab:
http://www.blackalchemy.to/project/fakeap/
Rogue wireless access point setup utility “Airsnarf”:
http://airsnarf.shmoo.com
DoS attack tools by forging management frames. “Airjack”:
http://sourceforge.net/projects/airjack/
WLAN DoS attack tool “Void11”: http://www.wlsec.net/void11/
WPA-PSK keys cracking program “Aircrack-ng” at http://www.aircrack-
ng.org/
Encrypted packets injection program “Packet forge-ng”
http://www.aircrack-ng.org/doku.php
16
Basic security
SSIDs, MAC Address and Open System Authentication:
Goals of WPA
To address the issues with WEP encryption through a
software upgrade
To provide a secure wireless networking solution for
small office/home office wireless users
To be forward-compatible with the upcoming IEEE
802.11i standard
Features of WPA
WPA Authentication
Pre-shared key (PSK)
less secure
education
Encryption
RC4 stream cipher using 128-bit key, 48-bit IV
Key Management
Temporal Key Integrity Protocol (TKIP) - dynamically
Payload Integrity
8 Byte Message integrity code( MIC)
byte ICV
MIC includes a frame counter to prevent replay attacks
WPA makes breaking into a Wireless LAN difficult by
24
IEEE 802.11i / WPA2
An amendment to the 802.11, specifying security mechanisms
for wireless networks
The draft standard was ratified on 24 June 2004
adds stronger encryption, authentication, and key management
strategies
makes use of the Advanced Encryption Standard (AES) block
cipher instead of RC4 stream cipher.
the use of WPA2 needs firmware or driver support of the wireless
host (router or access point) and the wireless client (adapter).
Components of WPA2
Open System
802.11 Authenticated
Association
802.1X (EAPOL)
802.11 Associated Asociation
CCMP Protected
Communication
TKIP Protected
Communication
29
EAP over LAN (EAPOL)
EAP method
EAP
RADIUS RADIUS
802.1X 802.1X
TCP/IP TCP/IP
802.11 802.11 Ethernet Ethernet
30
802.11i Authentication and
4-way handshake
31
Supplicant Authenticator
Authenticated Authenticated
Associated Associated Authentication
802.1X 802.1X Server
Blocked Blocked (RADIUS)
1. EAPOL-Start
Authentication Phase
2. EAPOL-Request Identity
3. EAPOL-Response Identity
5. Mutual Authentication 4. RADIUS-Request
(de facto EAP-TLS)
6. RADIUS-Accept
7. EAPOL-Success
Master Session 8. MSK Master Session
Key (MSK) Key (MSK)
32
AP-RADIUS Key Identity
802.1X/EAP-Request Identity
802.1X/EAP-Response
RADIUS Access Request/EAP-Response
802.1X/EAP-Success
33
Problems in the current
structure
Complex
Lengthy
Not secure (Message replay, malicious Access Point (AP) associations
etc.)
Prone to Denial of Service vulnerabilities
Before handshake
(Attacks- Authentication, Association, De-authentication,
Dissociation, Request Floods etc.)
During handshake
(via initial message )
After handshake
(De-authentication, Dissociation )
34
DoS attacks in WLANs
False AP attack
Flooding DoS
Exploiting Setup mechanism
Protocol based attack
Exploitation of authentication mechanism
IEEE 802.11w
Provides protection against Authentication/ Association requests
in existing connection and Deauthentication/Dissassociation
DoS attacks.
37
Issues: WLAN Security
Unauthenticated and unprotected management frames,
Deprecation of lightweight WEP,
Existence of bulky 802.11i,
Authentication mechanisms themselves fell prey against
DoS attacks,
Per frame lightweight authentication solutions lacks
security measures like secrecy, integrity etc.
No security protocols against DoS attacks, the DoS
solutions are in pieces,
The existing solutions against MAC spoofing,
masquerading, replay, modifications are not sufficient,
Mobile authentication protocols are not directly
applicable in WLAN.
Practical Steps to Secure
WLAN
1. Discovery of Rogue Access Points & Vulnerabilities
Netstumbler and Kismet, and other commercial scanners
can survey the airwaves for rogue access points and
some network vulnerabilities.
2. Implement the best practices of wireless LAN
security
change the default Service Set Identifiers (SSIDs)
A Cisco access point with the default SSID of "tsunami"
alerts hackers to a wide-open network
An SSID of “Director Office" calls attention to valuable
information
39
Practical Steps to Secure
WLAN
configure access points to disable the broadcast mode
where the access point constantly broadcasts its SSID
as a beacon in search for stations with which to connect.
By turning this default feature off, stations must know the
SSID in order to connect to the access point.
MAC address filtering provides basic control over which
stations can connect to your network.
3. Encryption, Authentication and VPN
Introduce 802.1x as strengthened authentication for all
802.11 networks.
40
Practical Steps to Secure
WLAN
4. Set & Enforce Wireless LAN Policies
Fundamental policies include:
Forbidding the installation of unauthorized access points
and ad hoc networks.
Mandating the use of WEP or VPNs.
Limit wireless LAN traffic to operate on set channels
Limit wireless LAN connectivity to chosen business
hours.
5. Deploying an intrusion detection system (IDS)
41
Summing Up..
42
Thank You
43