240 likes | 352 Views
SIM313. The Ultimate Guide to Wireless Network Security. Hasain Alshakarti Senior Security Advisor TrueSec. Agenda. The Evolution of WiFi Security Weaknesses & Attack Scenarios Best Practice Protecting the Enterprise Best Practice Protecting the Mobile Client.
E N D
SIM313 The Ultimate Guide to Wireless Network Security HasainAlshakarti Senior Security Advisor TrueSec
Agenda • The Evolution of WiFi Security • Weaknesses & Attack Scenarios • Best Practice Protecting the Enterprise • Best Practice Protecting the Mobile Client
The Evolution of WiFiSecurity Security Management Compatibility • Proprietary • WEP • WPA • WPA2
The Evolution of WiFi Authentication Security Management Compatibility • Proprietary • Open • Shared • PSK • 802.1x
WiFi Security – The Wrong Way • MAC address filtering • Disable SSID broadcast • Static IP Addressing • Rogue AP Detection & Wireless IPS
Weaknesses & Attack Scenarios • Attacking the client • Open Networks • Fake AP / EvilTwin • Weak Authentication • Attacking the Infrastructure • Crackthe secret • Brute force • Weak Encryption
Free WIFI anybody? demo
Best Practice Protecting the Enterprise • Managed Configuration • Security misconfigurations are common! • 802.1x & WPA2 • Sufficient Authentication • Sufficient Encryption • Network Access Protection • Added Benefits!
Best Practice Protecting the Enterprise • Managed Configuration • Group Policy • No Client/Local Override! • Identity Management • Active Directory & Certificate Services • Server Validation • Server Certificates • Network Segmentation • Guest Access, Corp Access, Quarantine etc.
Best Practice Protecting the Enterprise • 802.1x & WPA2 • EAP-types • PEAP [Extensibility] • EAP-TLS [Compatibility] • Mutual Authentication • Strong Encryption [AES] • Redundant Radius(NPS) servers • Availability
Best Practice Protecting the Enterprise • Network Access Protection • Computer AND User Authentication • Health Validation • Auto Remediation • Quarantine Non-Healthy Clients
Best Practice Protecting the Mobile Client • User Awareness • Is this my network? • Strong Mutual Authentication • Do not forget the Server! • Combine with “VPN” on Open Networks • Disable AD-Hoc • Host Firewall • WLAN interface = Public Profile • LAN/WLAN Switching • Disable Windows 7 Wireless Hosted Network
Trustworthy Computing Safety and Security Center http://www.microsoft.com/security Security Development Lifecycle http://www.microsoft.com/sdl Security Intelligence Report http://www.microsoft.com/sir End to End Trust http://www.microsoft.com/endtoendtrust
Resources • Connect. Share. Discuss. http://northamerica.msteched.com Learning • Sessions On-Demand & Community • Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning • Resources for IT Professionals • Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn