20131204 wireless sec
DESCRIPTION
TRANSCRIPT
![Page 1: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/1.jpg)
!!
Wireless Security in the cruel world
Kitisak Jirawannakool E-Government Agency (Public Organization)
!
!1 !!
Agenda❖ About EGA and myself ❖ Wireless technology ❖ Threats ❖ Protections
!2
!!
Agreement❖ Turn off your mobile phone or keep silent ❖ Stop me anytime, if you want to ask or share
something ❖ Relax and feel free to discuss ❖ Keep in touch and keep sharing after class
!
❖ Be Aware, but Do not Panic
!3 !!
Contact me
Name : Kitisak Jirawannakool !
Facebook : http://www.facebook.com/kitisak.note !
Email : [email protected] !
Weblog : http://foh9.blogspot.com !!
Twitter : @kitisak
!4
![Page 2: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/2.jpg)
!!
About me
❖ Education ❖ Bachelor : Comp. Eng. KKU ❖ Master : Comp. Sci. CU
❖ Certification and Award ❖ COMTIA Security+ ❖ Asia Pacific Information Security Leader Achievements
2011 (ISLA) by (ISC)2
❖ Membership ❖ APWG, ShadowServer, OWASP, MSCP, CSA Thailand
Chapter, MedSec
!5 !!
About me (Experience)❖ Almost 11 years in IT Security at NECTEC
❖ Incidents response ❖ Research ❖ Speaker and writer ❖ …
❖ Working as a Security Specialist at EGA ❖ Looking for our collaborations
❖ OWASP Thailand Chapter Leader
!6
!!
About EGA❖ First established in 1997 as Government
Information Technology Services (GITS) ❖ ~ 190 staffs ❖ Services
❖ Government Information Network (GIN) ❖ Government Cloud Services (G-Cloud) ❖ MailgoThai service ❖ e-Gov portal ❖ e-CMS 2.0
❖ More details : http://www.ega.or.th
!7 !!
E-Government services
!824x7 Helpdesk and Contact CenterEGA Contact
Other Government’s services
ServicesGovernment Security Monitoring (GovMon)
Incident
Informati
Response
Risk Cloud
Cloud
Cloud Inter SaaS PaaS IaaS
Government GINGovernment
![Page 3: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/3.jpg)
!!
Situation is changing
!9 !!
Important points
!10
Incident ResponseTechnical Training
CollaborationAwareness Training
!!
❖ C (Confidentiality) ❖ I (Integrity) ❖ A (Availability)
!11
What is Security?
!
Wireless Technology - Big picture
!12
Internet Backbone
2G,3G Cellular Network • GSM, GPRS, WCDMA, cdma2000
Wireless Personal Area Network (WPAN) • Bluetooth, Zigbee
Wireless Local Area Network (WLAN) • Wi-Fi
Wireless Metropolitan Area Network (WMAN) • WiMAX
Satellite Network
![Page 4: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/4.jpg)
!!
Connection technology❖ 3G, 4G or EDGE ❖ Wifi, WiMax ❖ NFC - Near Field Communication ❖ DLNA - Digital Living Network Alliance ❖ Bluetooth
!13 !!
NFC
!14
!!
DLNA
!15 !!
Mobile devices
!16
![Page 5: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/5.jpg)
!!
Simple Questions❖ Do you Lock your mobile device? ❖ Do you have Anti-malware installed? ❖ How many Apps in your device? ❖ Are them all Trustworthy? ❖ Have you ROOTED/Jail-broken your device?
!17 !!
Recent mobile devices❖ Truly handheld computer ❖ Connectivity everywhere ❖ Apps for everything ❖ Cheap
!18
!!
Mobile and Smart devices❖ Laptop/Notebook ❖ Mobile phone ❖ Tablet ❖ Other
❖ Smart, Android and Apple TV ❖ GPS ❖ Cars ❖ Game consoles ❖ Medical devices
!19 !!
Smart phone activities in Thailand
!20
https://www.facebook.com/imcinstitute
![Page 6: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/6.jpg)
!! !21 !!
The Common Fails!❖ Lost ❖ Stolen ❖ Free WiFi lovers ❖ Lots of apps (Trusted/Untrusted) ❖ No passcode protected ❖ Location services ❖ Left unattended ❖ Just click ❖ Full time WiFi on and with “Auto connect”
!22
!
Simple Questions (2)❖ Do you surf the internet via public wifi? ❖ Have you removed SSID from your list? ❖ Have you ever transferred money online by using
public wifi?
!23 !!
Threat Examples❖ WiFi attacks
❖ War Driving and WiFi Sniffing ❖ Rouge Access points ❖ Man in the Middle Attacks ❖ Flood/ DDoS
!24
![Page 7: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/7.jpg)
!!
WLAN Security: Why it matter?❖ International concerns
❖ Access point ≈ Wireless Hub ❖ Difficult to trace attackers
❖ Low cost hacking equipment
❖ Typical insecure WLAN deployments
❖ Lack of user/admin security awareness
❖ Technology limitations & vulnerabilities
!25 !!
WLAN Security Threats❖ Passive data sniffing
❖ AiroPeek, Kismet ❖ Username/password ❖ Credit card number ❖ Email messages ❖ Company Info.
!26
Stealth sniffer !
!!
WLAN Security Threats❖ Unauthorized access
!27
! Wardriving ! Internet attack ! MAC spoofing ! Company backdoor ! Client-to-client attack ! Spam mail
Stealth Attacker!
!!
War Driving❖ War driving is when people
drive around with high-gain antennas on their cars with special software to detect wireless networks
!28
http://www.gugli.it/modules/gallery/photos/wardriving1/1.jpg
![Page 8: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/8.jpg)
!!
Wireless Networks in LA
!29 !!
Toys for Hackers
!30
!!
A Dual-Use Product
!31
Cantenna
!
Easy and Cheap to buy
!32
![Page 9: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/9.jpg)
!!
WLAN Security Threats❖ Jamming or denial of service attack
!33
! 2.4 GHz RF jamming ! Packet flood
RF Jamming unsolvable!
!!
WLAN Security Threats❖ User hijacking & Man-in-the-middle attack
!34
! Inverse Wardriving ! Sniff & Modify ! Fake server and AP ! Https hack ! SSL Strip ! Faked Certification ! Password stealing ! “Phishing”
User
HackerRogue AP
Jam & Roam
!!
WLAN Security Threats❖ Man-in-the-middle attack
!35
!! Inverse Wardriving
AP
Internet
A Company
Traffic analysis
Rogue APInternet
Hacker
!!
Man In The Middle attack
!36
![Page 10: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/10.jpg)
!!
HTTPS attacks!❖ SSL Strip (HTTPS -> HTTP) ❖ Faked Certification
❖ HTTPS (without awareness) = HTTP
!37
https://surajonunix.wordpress.com/2012/02/24/man-in-the-middle-using-ssl-strip/
!!
WLAN Security Countermeasures❖ Data encryption
!
❖ Authentication (e.g., Login Username/Password, Smart card)
!
❖ Authorization (e.g., Access Control)
!
❖ Monitoring (e.g., IDS)
!38
@sdo#$%ks!*ss&^)d:;s@#$ae&*
!!
How to use WiFi securely?❖ Use only trusted WiFi network (access point) ❖ Look carefully at the access point name ❖ Remove the unused access point name from list ❖ Select to connect to only the encrypted
connection (WPA and WEP) ❖ Install “HTTPS Everywhere” extension for
Chrome and Firefox ❖ Do not share files and folders ❖ Turn on personal firewall
!39
Details in Thai : http://foh9.blogspot.com/2012/09/blog-post.html
!!
Network-connected system
!40
![Page 11: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/11.jpg)
!!
New generation❖ PC liked ❖ Connect to the internet ❖ Many apps provided ❖ Not many people concern about security
!41 !!
What will we do, if ...❖ Malware is infected on TV or Refrigerator ❖ TVs are hacked ❖ Spam are sent to show on our TV ❖ Game consoles break down because of malware
or hacker ❖ We need to investigate TV or other non-PC
devices for finding criminals
!42
!!
Endpoint Protection❖ Do not Root or Jailbreak ❖ Install Anti-malware software ❖ Lock the phone with the secure pincode ❖ Finding our phone
❖ iPhone and Galaxy have their own software ❖ For other, use Anti-malware software (aka. Avast,
and Sophos security and antivirus) ❖ Wiping our phone remotely ❖ Do not post our phone number publicly ❖ Browse the webs securely -> next page
!43 !!
Do not use these pincodes❖ Do not use these pincodes ❖
!44
http://nakedsecurity.sophos.com/2011/06/14/the-top-10-passcodes-you-should-never-use-on-your-iphone/
![Page 12: 20131204 wireless sec](https://reader037.vdocuments.mx/reader037/viewer/2022102823/5495db9bb47959a5628b46a4/html5/thumbnails/12.jpg)
!!
Securing a mobile for web browsing❖ Do not click on suspicious links ❖ Consider URLs carefully and beware short URLs ❖ Use 3G rather than free WiFi ❖ Use a VPN ❖ Be selective with your browsing ❖ Keep your device secure ❖ Download from trusted sources ❖ Keep your OS and apps up-to-date
!45 !!
Cyber Terrorists❖ Mobile weaponing
❖ Bot on Mobile ❖ DDoS
❖ PwnPad
!46
!
Conclusion❖ Wireless technology is growing fast ❖ More convenience, but easier to attack ❖ Protection need to do on providers and users ❖ Security awareness is the most important
!47 !!
Contact me
Name : Kitisak Jirawannakool !
Facebook : http://www.facebook.com/kitisak.note !
Email : [email protected] Weblog : http://foh9.blogspot.com !
Twitter : @kitisak
!48