Wireless Security-25 Juni 2008
Wireless Security-25 Juni 2008
Wireless Security-25 Juni 2008
update
Security
Wireless
Yosia Suherman
([email protected])
Highlights
http://www.theregister.co.uk/2005/08/19/finnish_wifi_bank_hack/
http://www.securityfocus.com/brief/273
Wifi Deployment
Shell
Dcost
Hotspot Anywhere
Hotspot Detection
How
Find
Target
War Chalking
War Driving
Tools
Success
Find Target
1. Mall / Shopping Center
2. Office
3. Hospital
4. Internet Public Access
5. Airport
6. School / Campus
7. Hotels
War Chalking
Wireless Hotspot Sign Indicator
War Wardriving
Wardriving is the act of searching for Wi-Fi wireless
networks by a person in a moving vehicle using such items
as a laptop or a PDA.
Equipment
Antenna
Omni
Bidirectional
Result
Tools
1. Netstumbler/Kismet/KisMac
2. Mac Changer
3. Aircrack
4. AirSnort
5. Wireshark
6. Void
7. Airpawn
..etc
Top 3 Attack
1. Reveal SSID
2. MAC Address Spoofing
3. Encryption Attack
4. Authentication
5. Eavesdropping
6. MITM ( Man in The Middle) Attack
7. Wireless Denial Of Service
8. Roque Access Point
9. Client to client Attack
10. Physical damage or theft
Reveal SSID
Many Access Point use this protection to hide SSID
MAC Spoofing
Filtering access to the access point allows only those MAC
addresses specified in the list the ability to access the
wireless network.
Encryption Attack
Enabling WEP Encrytion for secure data transmission.
Other encryption WPA, WPA2
Others Attack
1. Reveal SSID
2. MAC Address Spoofing
3. Encryption Attack
4. Authentication
5. Eavesdropping
6. MITM ( Man in The Middle) Attack
7. Wireless Denial Of Service
8. Roque Access Point
9. Client to client Attack
10. Physical damage or theft
s
l
i
a
t
e
d
e
r
o
M
g
n
i
n
i
a
r
t
in
Prevention
People
Process
Technology
People
Security Awareness (Seminar, Workshop, Security Update)
Training for improvement skill
Process
Technology
OSI Layer Protection
Layer 2 (Data Link Layer) :
WEP
Tunneling Protocol (L2TP)
802.1x /EAP
Layer 3 :
Point to Point Tunneling Protocol (PPTP)
IP Security (IPSec)
Layer 7 :
Secure Shell (SSH)
Secure Shell Version 2 (SSH2)
Technology
Client (Mobile Unit)
Personal Firewall
VPN
Antivirus
Q&A