Lesson 04 - Wireless LAN Security
Lesson 04 - Wireless LAN Security
William H. Wolfe II
Cisco Certified Networking Academy Instructor Trainer
So now you need wireless AND security…
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1. Overview of WLAN Security
6. Conclusion/Remarks/Resources
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Overview of WLAN Security
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Wired vs. Wireless Privacy
Authentication
Proving identity can be done using:
− Something you know
Password
Something you do
− Something you have
Physical object
Value read from a device you have
− Something you are
Biometric reading
Authenticating Devices vs. Users
Encryption
Symmetric and Asymmetric Encryption
Wireless Threats
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Why Are Wireless LANs Prone to Attack?
Physical Security Wired Security
“War Driving”
Lessons:
Do not rely on basic WEP encryption; requirement for enterprise class security
(WPA, EAP/802.1x protocols, Wireless IDS, VLANs/SSIDs, etc.)
Employees often install WLAN equipment on their own (compromises security of
your entire network)
Business impact due to stolen data: Potential financial and legal
consequences (laws to protect data confidentiality; example: healthcare,
retail, financial, government)
WLAN Security “Visibility”
Prevalence of technology
PWLAN (Public Wireless LAN) and other public 802.11 networks
Other security fears—identity theft, phishing, etc.
“Hackers target Xbox Live players”, Feb 20, 2009
http://news.bbc.co.uk/2/hi/technology/7888369.stm
“Crime to boom as downturn blooms” Dec 30, 2008
http://news.bbc.co.uk/2/hi/technology/7797946.stm
Public availability of tools
Aircrack—WEP key exploit
coWPAtty—WPA-PSK exploit
Kismac—MAC-based implementation of Kismet
http://www.darknet.org.uk/2006/04/top-15-securityhacking-tools-utilities
Wireless Security Threats
Classifying the attack types
Non-802.11 Attacks
Backdoor access
BLUETOOTH AP Service disruption MICROWAVE BLUETOOTH RF-JAMMERS RADAR
WLAN Security Vulnerabilities
and Threats
Examples of Existing Vulnerabilities and Threats
WLAN sniffing/war driving
Encryption vulnerabilities: WEP
Denial of Service (DoS) attacks: using 802.11
de-authentication/disassociation frames,
RF jamming, etc.
Authentication vulnerabilities: dictionary attacks,
MITM attacks
Address spoofing: MAC-address spoofing and
IP address spoofing (both hostile/outsider attacks
as well as insider attacks)
An Example:
How Does a Wireless Exploit Take Place?
Malicious hacker
Penetrates physical security specifically to Less likely
install a rogue AP
Can customize AP to hide it from detection tools
Hard to detect—more effective to prevent via 802.1x
and physical security
More likely to install LINUX box than an AP
What Is a Dictionary Attack Tool?
What is a dictionary?
Contains variations of passwords
Weak passwords can be cracked using standard dictionaries (found easily in various Internet
discussion forums and web sites)
Success factors for this tool depend on:
Variation of the user’s password must be found in the dictionary used by the attacker
Attacker’s experience and knowledge in generating dictionaries
Password strength
A weak six character password will be easily compromised compared to a strong ten letter
password
Attacker’s dictionary strength determines whether the password
can be compromised
MAC Address Spoofing
As with wired networks, MAC address and IP address
spoofing are possible, if not easy, in Wireless Networks Authorized
Client
Outsider (hostile) attack scenario
Does not know key/encryption policy
IP Address spoofing is not possible if Encryption is turned on
(DHCP messages are encrypted between the client and the AP) Sniff Client
MAC Addr
MAC Address spoofing alone (i.e., without IP Address spoofing) and IP
may not buy much if encryption is turned on Address
Access
Insider attack scenario Point
RF Jamming
– Any intentional or un-intentional RF transmitter in the same frequency can adversely affect the
WLAN
DoS using 802.11 Management frames (MPF can help mitigate)
– Management frames are not authenticated today
– Trivial to fake the source of a management frame
– De-Authentication floods are probably the most worrisome
Misuse of Spectrum (CSMA/CA – Egalitarian Access!)
– “Silencing” the network with RTS/CTS floods, Big-NAV Attacks
802.1X Authentication floods and Dictionary attacks
– Overloading the system with unnecessary processing
– Legacy implementations are prone to dictionary attacks, in addition to other algorithm-based
attacks
Authentication Vulnerabilities
Management frames are not authenticated !
Dictionary attacks
On-line (active) attacks: active attack to compromise passwords or
pass-phrases
Off-line attacks: passive attack to compromise passwords or pass-
phrases
MITM attacks
Active attacks: an attacker attempts to insert himself
in the middle of authentication sequence
Can be employed in 802.1X as well as PSK environments
Multiple known WEP weaknesses, and many exploits out there
Exploits Using 802.11 as a Launchpad
Standard Layer 2 exploits, e.g., Dsniff, Nmap
Penetration test—server and service vulnerabilities:
Metasploit project—open source RPC injector http://metasploit.com
Immunity CANVAS
Core security technology impact
Application security—exploit/malware
Specific examples that have been launched:
Installation of various viruses, worms, and other malware, thereby complicating detection—
Security Conference, Canfield University, UK
Simple sniffing of unencrypted user ID, passwords, account
nos., etc.—Wi-Fi hotspots
WLAN Security Vulnerabilities and
Threats Summary
Man-in-the-Middle
MAC/IP Spoofing Evil Twin AP Fake DHCP server
Fake AP ARP Request Replay Attack Pre-standard APs (a,b,g,n)
Denial of Service
Malformed 802.11 frames EAPOL attacks Microwave interference
FATA-Jack, AirJack Probe-response Bluetooth interference
Fragmentation attacks Resource management Radar interference
Excessive authentication RF Jamming Other non-802.11 interference
De-auth attacks Michael Device error-rate exceeded
Association attacks Queensland Interfering APs
CTS attacks Virtual carrier Co-channel interference
RTS attacks Big NAV VoWLAN-based attacks
Excessive device bandwidth Power-save attacks Excessive roaming
Threat Mitigation Technologies
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Cisco’s Attack Detection Mechanisms
Adaptive
Base IDS
wIPS
Built-in to
Controller Requires MSE
Software
Business Challenge
Intranet
Zero-day response to viruses,
malware and suspect signatures
Cisco ASA
w/ IPS
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml
What is CleanAir?
Problem Solution
Wireless management frames are not Insert a signature (Message Integrity
authenticated, encrypted, or signed Code/MIC) into the management frames
A common vector for exploits Clients and APs use MIC to validate
authenticity of management frame
APs can instantly identify
rogue/exploited management frames
Di
sa
ss
oc
iat
ion
WLAN Security
Vulnerabilities and Threats
On-Wire Attacks Over-the-Air Attacks
Ad-hoc Wireless Bridge Evil Twin/Honeypot AP Reconnaissance
HACKER HACKER’S HACKER
AP
DENIAL OF
SERVICE
Non-802.11 Attacks
Cisco CleanAir
Backdoor access Detects These Attacks
BLUETOOTH AP Service disruption MICROWAVE BLUETOOTH RF-JAMMERS RADAR
WLAN Security
Vulnerabilities and Threats
On-Wire Attacks Over-the-Air Attacks
Ad-hoc Wireless Bridge Evil Twin/Honeypot AP Reconnaissance
MFP
MFP Neutralizes
Neutralizes all
all
HACKER’S
HACKER HACKER
Management
Management Frame
Frame AP
Exploits,
Exploits, such
such as
as Man-in-
Man-in-
the-Middle
the-Middle Attacks
Attacks
Rogue
Rogue detection,
detection,
Client-to-client backdoor access Connection to malicious AP WPA2/802.11i
WPA2/802.11i
Seeking network vulnerabilities
classification
classification and
and
Cisco wIPS Detects These Attacks
mitigation
mitigation addresses
addresses
Neutralizes
Neutralizes Recon
Recon
Rogue Access Points Denial of Service and
and Cracking
Cracking Attacks
CrackingTools
Attacks
these
these attacks
attacks
HACKER HACKER
DENIAL OF
SERVICE
Non-802.11 Attacks
Cisco CleanAir
Backdoor access Detects These Attacks
BLUETOOTH AP Service disruption MICROWAVE BLUETOOTH RF-JAMMERS RADAR
Strong Authentication and Encryption
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
802.11 Security Fundamentals:
Setting up a secure 802.11 link
Authentication
Enforce strong, mutual authentication of client & server
Recommendation is 802.1X/EAP
802.1X blocks user access until authentication successful
AAA
Server
Association
Establish a virtual port for the link
Encryption
Enforce strong encryption to provide data privacy over the
802.11 link
– Recommendation is AES (WPA2) or TKIP (WPA)
Secure or open SSID?
Secure SSID
Open SSID
Enterprise Personal
(802.1X Authentication) (PSK Authentication)
Authentication server required Authentication server not
required
RADIUS used for authentication Shared secret used for
and key distribution authentication
Centralized access control Local access control
Security vs.
Complexity
Authenticatio
Client
n Server
Support
Support
EAP
Type(s)
Deployed
Most clients such as Windows, Mac OSX, Apple iOS devices support
EAP-TLS, PEAP (MS-CHAPv2).
Additional supplicants can add more EAP types (Cisco AnyConnect).
Certain EAP types (TLS) can be more difficult to deploy than others
depending on device type.
Authentication Best Practices:
WPA2-Enterprise
Strong Authentication
Strong Encryption
• AES
EAP Authentication Types
Tunneling-Based Certificate
EAP-
-Based
PEAP Inner Methods
EAP-
TTLS
EAP-GTC EAP-MSCHAPv2 EAP-TLS
EAP-
FAST
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
802.1x
WLC
802.1x Architecture
Credentials Certificate Username and Password
Microsoft/
Cisco/
Microsoft Cisco RSA
EAP
802.1x
Infrastructure requirements
EAP-TLS-supported RADIUS server
RADIUS server requires a server certificate
Certificate Authority server (PKI Infrastructure)
Certificate management
Both client and RADIUS server certificates to be managed
PEAP
CCX v2 CCX v4
WPA compliance CCKM with EAP-TLS,
Fast roaming with PEAP
CCKM WIDS
PEAP MBSSID
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Conclusion / Remarks
• When Deploying Wireless Networks… Security should always be the primary concern.
• Deploy WLAN Security with a MINIMUM security configuration of WPA2/PSK and AES
Encryption.
• Guest Wireless Access should adhere to the MINIMUM security configuration, but in the event
that is not feasible, use WebAuth with a Splash Page and disclaimers and a Login.
• Enterprise WLAN Deployments should ALWAYS separate Guest Access and Corporate Access
with WVLANs and separate SSIDs.
• WLANs are always being scanned… Be aware and monitor your RF environment.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Resources
• The Cisco Learning Network
https://learningnetwork.cisco.com/welcome
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Thank you.