1 / 9

Solving the Security Risks of WLAN

This article outlines general guidelines for securing WLAN networks, including radio interface optimization, access point and client configuration, the use of TKIP encryption, and the implementation of a honey pot. It also provides useful links and tools for further information and network scanning.

Download Presentation

Solving the Security Risks of WLAN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Solving the Security Risks of WLAN Tuukka Karvonen 3.1.2020

  2. Outline • General Guidelines • Radio Interface • Access Point Configuration • Client Configuration • TKIP • Honey pot – Fake AP • Links

  3. General Guidelines • Know the risks: War-Driving, Insertion Attacks, Monitoring, SNMP services, weak WEP algorithm, etc. • The default configuration of the devices usually lacks security • Clients and access points should be configured well • Organizations need a wireless security policy, which everyone should follow

  4. Radio Interface • Provide coverage only to the areas where it is needed • Adjust transmitting power • use directional antennas • Unintentional and intentional jamming is possible -> have an alternative, if it’s important to have your connection working • Notice, it is fully legal for anybody to disturb your WLAN on the license-free ISM band

  5. Access Point Configuration • Turn of the broadcasting of SSID and don’t use the default one • Provide DHCP (Dynamic Host Configuration Protocol) only if needed • Require Wired Equivalent Privacy and strengthen it with IEEE 802.1X and TKIP • Original WEP algorithm is weak, so keys need to be changed frequently

  6. Client Configuration • Disable unnecessary services (i.e. Windows file sharing) • Install Personal Firewall • Use higher level security (IPsec, VPNs, SSL, SSH etc.) • Use WEP and if possible strengthen it

  7. Temporal Key Integrity Protocol (TKIP) • Devices using WEP can be upgraded to TKIP with firmware patches • Uses temporal key, which is changed every 10000 packets with help of 802.1X • Combines the temporal key with the client's MAC address before adding a initialization vector -> every device has own encryption key • Inserts message integrity code into each packet to avoid forgeries

  8. Honey Pot – Fake AP • Confuses war drivers • Hides the real access point by generating thousands of counterfeit 802.11b access points • Sends Beacon frames with random SSID:s and MAC addresses • Advanced version would also need to create real traffic • http://www.blackalchemy.to/project/fakeap/

  9. Links • Information • http://www.iss.net/wireless/WLAN_FAQ.php • http://www.80211-planet.com/ • Access point maps • http://www.wifimaps.com/ • http://www.netstumbler.com/ • Tools: • http://freshmeat.net/projects/airsnort/ • http://www.netstumbler.com/ • Wireless Scannerhttp://www.iss.net/download/

More Related