CH 7 - Securing Wireless LANs
CH 7 - Securing Wireless LANs
IEEE 802.11i….
AES instead of RC4
Pre-shared key (PSK) instead of IV
Or WPA-Enterprise
Authenticate with RADIUS server
The Problem: most WAPs and network cards couldn't handle AES
Solution: Wi-Fi Protected Access (WPA)
RC4 with PSK or RADIUS server
WPA2
AES
Can do RADIUS or PSK
Counter-Mode/CBC-MAC Protocol (CCMP)
The Problem: can be cracked through the handshake
WPA3
Disallows outdated protocols
Protected Management Frames (PMF)
Simultaneous authentication of equals (SAE)
Bluetooth….
802.15.1 Standard (2.4 or 5 GHz frequency range)
Wireless networking with shorter range than Wi-Fi
Class 1 - Up to 100 meters (328 feet)
Example: USB Wi-Fi Dongles
Class 2 - 10 meters (33 feet)
Example: Bluetooth Headset
Devices must be paired together to communicate
Car stereo - Headset - Keyboards
Bluetooth Attacks….
Bluejacking - unauthorized sending of anonymous msgs to a Bluetooth device
Example: sharing bogus contact info with a message as the contact name
Wi-Fi Attacks….
Connecting to Open WLANs
Cracking WEP Passphrase
RF Signal Jamming
Interference Wi-Fi Channel Overlap
Flood AP with Deauthentication (disassociation) Packets
Denial of Service (DoS) attack
EAP-TLS
Server- and client-side certificates
EAP-TTLS
Requires a server certificate
Encapsulates RADIUS messages
Protected EAP
Requires a server certificate
Encapsulates EAP messages
Hardening Wi-Fi….
Change default AP credentials
Captive portal
Landing page (Web site)
May require user authentication
Until authenticated, all HTTP requests show the landing page
User may only need to agree to terms of use