Notes
Slide Show
Outline
1
Building Secure Wireless Networks
  • zSnark
2
Wireless Technologies
  • 802.11b “WiFi”
  • 802.11a
  • 802.11g
  • Bluetooth / 802.15.1
3
802.11b Network Details
  • 2.4GHz
  • “11Mbps”
  • WEP “Wired Equivalent Privacy” 64/128
  • 802.1x EAP & EAP-PEAP
  • PPTP & IPSec


4
Radio Physics In Two Minutes
  • RF signals behave like light
  • Signal diminishes rapidly over distance
  • Blocked by metal, stone and water



5
Hardware
  • Access points
  • Client devices
  • Antennas
  • Amplifiers


6
Topologies: Typical
7
Topologies: With Wireless
8
Topologies: Recommended
9
Intruders
  • Unintentional
  • Opportunist
  • Targeted
10
Intruders: Unintentional
  • Auto-connecting clients
  • Users of other nearby networks
  • Windows XP, MacOS X



11
Intruders: Opportunists
  • “Netstumblers”
  • Liability Issues


12
Intruders: Targeted
  • Foreknowledge of network
  • Will take what they’re looking for and leave
  • Hardest to detect
13
Three Classes of Attacks
  • Passive attacks
  • Wireless segment attacks
  • Full compromise
14
Attacks: Passive
  • Cracking WEP
  • Passive Sniffers


15
Attacks: Wireless Segment
  • Direct client attacks
  • Man-in-the-middle attacks
  • Denial of service
  • 802.1x


16
Attacks: Full Compromise
  • Compromise of your access control device
  • Attacks against upstream hosts
  • Man-in-the-middle and redirection against upstream users
17
Keeping Your Network Secure
  • Use a VPN for wireless access (e.g. IPSEC or PPTP)
  • Enable MAC filtering
  • Check for rogue access points on a routine basis or install automated
    monitoring
  • Carefully monitor access logs


18
Secure Wireless Network
19
For More Information
  • zsnark [at] ghettohackers [dot] net
  • www.openbs.org/~zsnark