W&M 2009 – Best practices for wireless network security

27
M A R Q U E S T Professional Services WLAN Security Peter Mackenzie MarQuest Limited www.MarQuest.com [email protected]

Transcript of W&M 2009 – Best practices for wireless network security

Page 1: W&M 2009 – Best practices for wireless network security

M A R Q U E S TProfessional Services

WLAN Security

Peter MackenzieMarQuest [email protected]

Page 2: W&M 2009 – Best practices for wireless network security

2

M A R Q U E S TProfessional Services

© MarQuest Limited

Introductions

• Peter Mackenzie [email protected]– Head of Technical Operations (MarQuest Limited)– Wireless Certifications

• Certified Wireless Network Administrator

• Certified Wireless Security Professional

• Certified Wireless Analysis Professional

• Certified Wireless Network Expert

• Certified Wireless Network Trainer

• • MarQuest Limited

– CWNP Education Centre– WildPackets Academy– Installation– Consultancy

Page 3: W&M 2009 – Best practices for wireless network security

3

M A R Q U E S TProfessional Services

© MarQuest Limited

Itinerary

• Wireless Inherently Insecure

• Security Solutions– Default Security (included in 802.11)

– The Security Standard (802.11i)

• WLAN Intrusion

• Detection and Prevention

Page 4: W&M 2009 – Best practices for wireless network security

4

M A R Q U E S TProfessional Services

© MarQuest Limited

Inherently Insecure

Confidentiality Authentication Denial of Service

Page 5: W&M 2009 – Best practices for wireless network security

5

M A R Q U E S TProfessional Services

© MarQuest Limited

Wireless Attacks

Page 6: W&M 2009 – Best practices for wireless network security

6

M A R Q U E S TProfessional Services

© MarQuest Limited

Default Security

• Original 802.11 Standard– Authentication Methods

• Open System• Shared Key

– Encryption• Shared WEP Key

– MAC Authentication (Device Security)

Page 7: W&M 2009 – Best practices for wireless network security

7

M A R Q U E S TProfessional Services

© MarQuest Limited

WEP Cracking

Page 8: W&M 2009 – Best practices for wireless network security

8

M A R Q U E S TProfessional Services

© MarQuest Limited

MAC Address Filtering

• Mac Spoofing

Page 9: W&M 2009 – Best practices for wireless network security

9

M A R Q U E S TProfessional Services

© MarQuest Limited

Standards Security

• WPA (TKIP, RC4)– Personal

• Pre-Shared Key (PSK) • SOHO, no RADIUS server)

– Enterprise• 802.1x/ EAP• Backend RADIUS server

• 802.11i & WPA v2 (CCMP, AES)– Personal

• Pre-Shared Key (PSK) • SOHO, no RADIUS server)

– Enterprise• 802.1x/ EAP• Backend RADIUS server

Page 10: W&M 2009 – Best practices for wireless network security

10

M A R Q U E S TProfessional Services

© MarQuest Limited

EAP types comparison

Client Password Authentication

Client Certificate Server Certificate

DynamicExchange

Mutual Authentication

EAP-MD5

LEAP

EAP-TLS

PEAP

EAP-TTLS

Page 11: W&M 2009 – Best practices for wireless network security

11

M A R Q U E S TProfessional Services

© MarQuest Limited

CoWPAtty

You only need to capture the

4-way handshake

Dictionary attack

Page 12: W&M 2009 – Best practices for wireless network security

12

M A R Q U E S TProfessional Services

© MarQuest Limited

Asleap

Fast dictionary

attack

Can not get strong password

Page 13: W&M 2009 – Best practices for wireless network security

13

M A R Q U E S TProfessional Services

© MarQuest Limited

A strong password policy?

If users can’t remember their password what

do they do?

Page 14: W&M 2009 – Best practices for wireless network security

14

M A R Q U E S TProfessional Services

© MarQuest Limited

EAP – Generic Method

Supplicant (Client) Authenticator (AP) Authentication Server (RADIUS)

Identity: Peter

Challenge Response: Cipher Text

Access Request: Peter

Request Identity

Challenge: TextChallenge: Text

Challenge Response: Cipher Text

Access AcceptAccess: Success

Exchange keys

Page 15: W&M 2009 – Best practices for wireless network security

15

M A R Q U E S TProfessional Services

© MarQuest Limited

PEAP

Supplicant (Client) Authenticator (AP) Authentication Server (RADIUS)

Identity: Dummy Access Request: Dummy

Request Identity

Authenticate Server CertificateAuthenticate Server Certificate

Establish Encrypted tunnel using certificate

Identity: Peter

Challenge Response: Cipher Text

Access Request: Peter

Challenge: TextChallenge: Text

Challenge Response: Cipher Text

Access AcceptAccess: Success

Exchange keys

Page 16: W&M 2009 – Best practices for wireless network security

16

M A R Q U E S TProfessional Services

© MarQuest Limited

Client Configuration Weakness

Page 17: W&M 2009 – Best practices for wireless network security

17

M A R Q U E S TProfessional Services

© MarQuest Limited

Evil Twin

SSID: ABC

SSID:ABC

IntruderWireless AnalyserSoft Access Point

DHCP Server SoftwareSignal Generator

Channel 1Channel 11

Key:

Page 18: W&M 2009 – Best practices for wireless network security

18

M A R Q U E S TProfessional Services

© MarQuest Limited

No Wi-Fi Policy

“It’s ok, we have a no

Wi-Fi Policy”

How do you enforce that policy?

How do you know you don’t

have any Wi-Fi?

Do you have any laptops with inbuilt

Wi-Fi Clients?

Page 19: W&M 2009 – Best practices for wireless network security

19

M A R Q U E S TProfessional Services

© MarQuest Limited

Client Hijacking

Home Work

SSID: LINKSYS

Probe: LINKSYS

SSID: LINKSYS

Page 20: W&M 2009 – Best practices for wireless network security

20

M A R Q U E S TProfessional Services

© MarQuest Limited

Identification and Protection

• Wireless Analysis

• Wireless ISP

• Training

• Penetration Testing

Page 21: W&M 2009 – Best practices for wireless network security

21

M A R Q U E S TProfessional Services

© MarQuest Limited

WildPackets’ OmniPeek

•Wireless LAN environment scan•Rogue access point and station detection•Intrusion detection•Station Location•Ensuring wireless LAN policy

What does your wireless environment really look like?

Page 22: W&M 2009 – Best practices for wireless network security

22

M A R Q U E S TProfessional Services

© MarQuest Limited

AirDefense IDS/IPS

•Intrusion Detections/Protection System•Sensors report back to Server•Alarms and notifications•Countermeasures

Page 23: W&M 2009 – Best practices for wireless network security

23

M A R Q U E S TProfessional Services

© MarQuest Limited

AirDefense Protects Wireless Networks

Hacker

INTRANET

INTERNET

Desktop

1 Identifies & Terminates Rogue APs

4 Monitors for Non-Compliant APs

5 Protects Users

Muni Wi-Fi

3 Stops Leaked Wired Traffic & Insertion

2 Prevents Hotspot Phishing

Hotspot Evil Twin

Mobile User

Laptop

AP

Server

Courtesy of AirDefense

Page 24: W&M 2009 – Best practices for wireless network security

24

M A R Q U E S TProfessional Services

© MarQuest Limited

Automated Policy-Based Active Defences

X

Managed Switch

AirDefense Server

On-command Suppression Policy-Based Suppression Device Reconfiguration

Wired-side Mitigation

On-command Disconnect Policy-Based Disconnect

Authorization Required, Audit Trail Maintained

Mitigation of the right target due to accurate detection

Wireless Mitigation

Public AP

Laptop: Wired-Wireless

Bridge

ALERT!Detected by AirDefense

Accidental Association

TERMINATED!By AirDefense

Accidental Association

ALERT!Detected by AirDefense

Rogue AP on Network

PORT SUPPRESSED!By Managed Switch

Rogue AP on Network

Page 25: W&M 2009 – Best practices for wireless network security

25

M A R Q U E S TProfessional Services

© MarQuest Limited

Training

Training is key to a successful security solution

Which security solution should I use?

What monitoring should I be doing?

Do I need a security audit?

What should be included in a wireless security policy?

Which staff need training?

Page 26: W&M 2009 – Best practices for wireless network security

26

M A R Q U E S TProfessional Services

© MarQuest Limited

Penetration Testing

•Information gathering•Social engineering•Eavesdropping•Active attacks•Rogue AP placement•Denial of Service

Page 27: W&M 2009 – Best practices for wireless network security

27

M A R Q U E S TProfessional Services

© MarQuest Limited

Thank You!

Stand Number

704

Any Questions?