(802.11) security

12
BY MOHAMMED ALQAHTANI (802.11) Security

Upload: favian

Post on 07-Jan-2016

33 views

Category:

Documents


0 download

DESCRIPTION

(802.11) Security. By Mohammed Alqahtani. What is 802.11 ?. IEEE 802.11 is a set of standards carrying out WLAN computer communication in frequency bands. 802.11 standards are created by the IEEE Standards Committee (IEEE 802). Peer-to-peer or via access point - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: (802.11) Security

BY MOHAMMED ALQAHTANI

(802.11) Security

Page 2: (802.11) Security

What is 802.11 ?

IEEE 802.11 is a set of standards carrying out WLAN computer communication in frequency bands.

802.11 standards are created by the IEEE Standards Committee (IEEE 802).

Peer-to-peer or via access point It is used in most wireless network , in public

WLAN i.e. Airports, hotels, coffee shops and private WLAN.

12/9/2009(802.11) Security

2

Page 3: (802.11) Security

Types of IEEE 802.11

IEEE 802.11 (1997) IEEE 802.11a(1999)IEEE 802.11b(1999)EEE 802.11g(2003 )IEEE 802.11n(currently)

12/9/2009(802.11) Security

3

Page 4: (802.11) Security

Types of IEEE 802.11 Con’t

IEEE 802.11c :Developing the interoperability between devices

IEEE 802.11d : Support the roamingIEEE 802.11e :Developing QoSIEEE 802.11f : to adjust inter-AP hand offsIEEE 802.11i : Developing WLAN security

12/9/2009(802.11) Security

4

Page 5: (802.11) Security

How it works

authentication and make association with client to the access point must be set prior to communicating

1.Authentication: communications between a supplicant “software on a client device”, authenticator (guard)” wireless access point –AP”, and authentication server “server uses RADIUS and EAP protocols.

2.The supplicant must identity itself to be validated and authorized by sending request message “user name / password / digital certificate “ to the authenticator.

3. -Tithe authenticator forwards the message to the authentication server to verify. If the information was valid similer to the cop in the database the supplicant access to resources located on the network .

12/9/2009(802.11) Security

5

Page 6: (802.11) Security

802.11 Vulnerabilities AND Risks

Key distribution problem : Shared key “everyone has the same key.

Easy to guess the password if it was generated by the key .

WEP with its known Weak encryption . Insertion attack : 1.Unauthorized AP on legitimate networks.2.Unauthorized clients “i.e. war driving .Denial Jamming of service: (,flood bogus ,

radio frequency ) .

12/9/2009(802.11) Security

6

Page 7: (802.11) Security

802.11 Vulnerabilities AND Risks 2

Interception and monitoring of wireless traffic : 1. In WALN must be in the range of WLAN .2. Sniffing : usually happens in first part of the session

“password / user name ”.3. If an attacker get to AP , the attacker can have all the traffic

because of broadcasting on WLAN to each hub.4. Evil Twin : An attacker Laure clients to connect to another

the network by creating unauthorized AP nearby the wireless clients ,so the user get access to the attacker’s servers . The clinte might send out some significant info .

5. Using the traffic : possibly get traffic into a connection “commands on behalf of a trusted user to hijack session.

12/9/2009(802.11) Security

7

Page 8: (802.11) Security

802.11 Vulnerabilities AND Risks 3

ad hoc mode attacks : in Client-to-client Misconfiguration in SSID : all clintes in the AP have the same

SSID to communicate . Mostly acts as a single key or password so that it is weak protection.

12/9/2009(802.11) Security

8

Page 9: (802.11) Security

What to do to solve

Sharing the files as less as you can.Using WEP Encryption even it is weak but to make it

harder to attack . Set the AP with Password . Using MAC address for allowing the Access and

control connection . The SSID : not to broadcast if it’s possible . Avoid setting AP nearby the walls.Using RADIUS “Remote Authentication Dial In User

Service ”. Don’t use non-upgradable equipment , to catch up

with updates. Use NetStumbler to figure out if there is an illegal AP

is founded . Set AP in DMS , create VPN tunnel to get into your

network . 12/9/2009(802.11) Security

9

Page 10: (802.11) Security

What to do to solve

There some useful in the implemented internet .

12/9/2009(802.11) Security

10

Page 11: (802.11) Security

References

http://en.wikipedia.org/wiki/IEEE_802.11 http://www.ieee802.org/11/ http://www.drizzle.com/~aboba/IEEE/ http://www.wardrive.net/ Wireless LAN Security, 802.11/Wi-Fi :

http://www.wardrive.net/security/links . Your 802.11 Wireless Network has No Clothes :

http://www.drizzle.com/~aboba/IEEE/wireless.pdf . Wireless Network Security 802.11, Bluetooth and Handheld Devices :

http://www.itsec.gov.cn/docs/20090507161834185644.pdf http://documents.iss.net/whitepapers/wireless_LAN_security.pdf http://h20331.www2.hp.com/Hpsub/downloads/

Wireless_Security_rev2.pdf

12/9/2009(802.11) Security

11

Page 12: (802.11) Security

Questions

12/9/2009(802.11) Security

12