Hardware Information |
|
Security Risks and Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
Introduction This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. Wireless networks have not been around for many years. Federal Express has been using a type of wireless networks, common to the 802.11 networks used today, but the general public has recently just started to use wireless networking technology. Because of weak security that exists in wireless networks, companies such as Best Buy have decided to postpone the roll-out of wireless technology. The United States Government has done likewise and is suspending the use of wireless until a more universal, secure solution is available. Background What is Wireless? Wireless LANs or Wi-Fi is a technology used to connect computers and devices together. Wireless LANs give persons more mobility and flexibility by allowing workers to stay connected to the Internet and to the network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site. Besides being very simple to install, WLANs are easy to understand and use. With few exceptions, everything to do with wired LANs applies to wireless LANs. They function like, and are commonly connected to, wired Ethernet networks. The Wireless Ethernet Compatibility Alliance [WECA] is the industry organization that certifies 802.11 products that are deemed to meet a base standard of interoperability. The first family of products to be certified by WECA is that based on the 802.11b standard. This set of products is what we will be studying. Also more standards exist such as 802.11a and 802.11g. The original 802.11 standard was published in 1999 and provides for data rates at up to 2 Mbps at 2.4 GHz, using either FHSS or DSSS. Since that time many task groups have been formed to create supplements and enhancements to the original 802.11 standard. The 802.11b TG created a supplement to the original 802.11 standard, called 802.11b, which has become the industry standard for WLANs. It uses DSSS and provides data rates up to 11 Mbps at 2.4 Ghz. 802.11b will eventually be replaced by standards which have better QoS features, and better security. Network Topology There are two main topologies in wireless networks which can be configured: Peer-to-peer (ad hoc mode) - This configuration is identical to its wired counterpart, except without the wires. Two or more devices can talk to each other without an AP. Client/Server (infrastructure networking) - This configuration is identical to its wired counterpart, except without the wires. This is the most common wireless network used today, and what most of the concepts in this paper apply to. Benefits of Wireless LANs
Wireless LANs give you more mobility and flexibility by allowing you to stay connected to the Internet and to the network as you roam. Cons of Wireless LANs Wireless LANs are a relatively new technology which has only been around since 1999. With any new technology, standards are always improving, but in the beginning are unreliable and insecure. Wired networks send traffic over a dedicated line that is physically private; WLANs send their traffic over shared space, airwaves. This introduces interference from other traffic and the need for additional security. Besides interference from other wireless LAN devices, the 2.4 GHz is also used by cordless phones and microwaves. Security Issues of WLANs
Eavesdropping & Espionage Because wireless communication is broadcast over radio waves, eavesdroppers who just listen over the airwaves can easily pick up unencrypted messages. These intruders put businesses at risk of exposing sensitive information to corporate espionage. Wireless LAN Security - What Hackers Know That You Don't www.airdefense.net Copyright 2002 Internal Vulnerabilities Within an organization network security can be compromised by ways such as, Rouge WLANs (or Rouge Aps), Insecure Network Configuration, and Accidental Associations to name a few. Rouge Access Points - An employee of an organization might hook up an access point without the permission or even knowledge of IT. This is simple to do, all a person has to do is plug an Access point or wireless router into an existing live LAN jack and they are on the network. One statistic in 2001 by Gartner said that, "at least 20 percent of enterprises already have rouge access points." Another type of attack would be if, someone from outside the organization, enters into the workplace and adds an Access Point by means of Social Engineering. Insecure Network Configurations- Many companies think that if they are using a firewall or a technology such as VPN, they are automatically secure. This is not necessarily true because all security holes, big and small, can be exploited. Also if devices and technologies, such as VPNs, firewalls or routers, are mis-configured, the network can be compromised. Accidental Associations - This can happen if a wireless network is setup using the same SSID as your network and within range of your wireless device. You may accidentally associate with their network without your knowledge. Connecting to another wireless LAN can divulge passwords or sensitive document to anyone on the neighboring network. Wireless LAN Security - What Hackers Know That You Don't www.airdefense.net Copyright 2002 Social Engineering - Social Engineering is one of the most effective and scariest types of attacks that can be done. This type of attack really scares me and can be done for many other purposes besides compromising security in wireless networks. A scenario: Someone dressed up as a support person from Cisco enters the workplace. The secretary sees his fake credentials and lets him get pass the front desk. The impersonator walks from cubicle to cubicle, collecting user names and passwords as he/she goes. After finding a hidden corner, which seems to be lightly traveled, he plugs an insecure Access Point into the network. At the same time he configures the Access Point to not broadcast its SSID and modifies a few other settings to make it hard for the IT department to find this Rouge Access Point. He then leaves without ever being questioned by anyone because it looks like he just fits in. Now, all he has to do is be within 300 feet from the access point, (more if he added an antenna), and now has access to all kinds of secure documents and data. This can be a devastating blow to any corporation and could eventually lead to bankruptcy if the secrets of the company were revealed to competitors. Bruce Schneier came to my classroom and said the following about Social Engineering, "Someone is just trying to do their job, and be nice. Someone takes advantage of that by targeting this human nature. Social Engineering is unsolvable." Securing Wireless Networks According to Bruce Schneier and others such as Kevin Mitnick, you can never have a totally secure computing environment. What is often suggested is to try and control the damage which can be done if security is breached. One can try many different tools on the market which can help prevent security breaches. WEP - WEP supports both 64 and 128-bit keys. Both are vulnerable, however, because the initialization vector is only 24-bits long in each case. Its RC4 algorithm, which is used securely in other implementations, such as SSL, is quite vulnerable in WEP. Http://www.infosecuritymag.com/2002/jan/cover.shtml Wireless Insecurities By Dale Gardner. Different tools exist to break WEP keys, including AirSnort, which can be found at www.airsnort.net. Although this method is not a secure solution, it can be used to help slowdown an attacker if other means are not possible financially or otherwise. VPN and IPSec- IPSec VPNs let companies connect remote offices or wireless connections using the public Internet rather than expensive leased lines or a managed data service. Encryption and authentication systems protect the data as it crosses the public network, so companies don't have to sacrifice data privacy and integrity for lower costs. A lot of VPN's exist on the market today. An important note about VPNs is, interoperability does not really exist, and whatever you use for your server has to be the same brand as your clients most of the time. Some VPNs include:
DMZ - Adding this to your network enables you to put your wireless network on an untrusted segment of your network. Firewalls - Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn't go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:
PKI - Public-key infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet. What is PKI? http://verisign.netscape.com/security/pki/understanding.html Site Surveys - Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks. Proactive Approaches Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks. Honeypots - are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec. "ManTrap has the unique ability to detect both host- and network-based attacks, providing hybrid detection in a single solution. No matter how an internal or external attacker tries to compromise the system, Symantec ManTrap's decoy sensors will deliver holistic detection and response and provide detailed information through its system of data collection modules." http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=157 Intrusion Detection - Intrusion Detection is software that monitors traffic on the network. It sounds out a warning if a hacker it trying to access the network. One such free product is Snort. "Before we proceed, there are a few basic concepts you should understand about Snort. There are three main modes in which Snort can be configured: sniffer, packet logger, and network intrusion detection system. Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set and perform several actions based upon what it sees." http://www.snort.org/docs/writing_rules/chap1.html#tth_chAp1 Network Monitoring- Network Monitoring would be products such as snort that monitor the flow of traffic over the network. Quick tips and tricks
About The Author Richard J Johnson Network+ Certified RJ Computer Consulting http://rjcomputerconsulting.com Richard@johnsorichard.com
MORE RESOURCES: IBM boosts entire quantum computing stack Ars Technica Two Ryzen 7 9800X3D CPUs burned out on X870 motherboards — vendor investigates the Ryzen burnout issues Tom's Hardware 6 things people still get wrong about PC hardware XDA Developers NASA dealing with aging ISS and spacewalk hardware: 'None of our spacesuits are spring chickens' Space.com PG&E plans 200MW data center campus in San Jose, deploys Nvidia hardware to nuclear power plant DatacenterDynamics HackUTD Event to Draw 1K+ Student App and Hardware Makers This Weekend dallasinnovates.com Oglesby hardware store to close Shaw Local News Network Join local hardware store’s Ladies Night on Thursday evening to help raise money for water rescue agency Sky-Hi News Wallace State Machine Tool Technology students fabricate hardware for NASA The Cullman Tribune NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Batting cages, golf simulators coming to former hardware store space in Auburn The Business Journals Phison intros 'world's fastest' high-capacity 128TB SSD — Pascari D205V hits 3 million IOPS and 14,600 MB/s with PCIe 5.0 Tom's Hardware AWS to discontinue Snowcone Edge appliance, cuts Snowball family hardware range to two devices DatacenterDynamics Microsoft releases official Windows 11 ISO for Arm devices — Extending support for Qualcomm's Snapdragon X Elite processors Tom's Hardware TSMC sued for race and citizenship discrimination at its Arizona facilities (updated) Tom's Hardware AMD claims the Ryzen AI 9 HX 370 is 75% faster than Intel's Core Ultra 7 258V in gaming Tom's Hardware RISC-V motherboard for Framework 13 laptops and mini-PCs starts at $199 – quad-core RISC-V CPU and 8GB of RAM included Tom's Hardware From AI to Hardware Costs: Enterprise Tech Leaders Prepare for Trump 2.0 The Wall Street Journal Guangdong KinLong Hardware ProductsLtd (SZSE:002791) Has A Pretty Healthy Balance Sheet Simply Wall St Sunshine Ace Hardware to host Grand Opening Celebration for Ave Maria store Priority Marketing At 2024 AI Hardware & Edge AI Summit: Prasad Jogalekar, Head of Global AI and Accelerator Hub, Ericsson insideBIGDATA Best Graphics Cards for Gaming in 2024 Tom's Hardware Despite brutal price hikes on many products, VMWare makes Fusion Pro and Workstation Pro free for all users Tom's Hardware Local and foreign chip manufacturers flee China, expand in Vietnam — companies move to Southeast Asia as US-China tensions simmer Tom's Hardware Adding ceramic powder to liquid metal thermal paste improves cooling up to 72% says researchers Tom's Hardware PS5 Pro Tops Japanese Hardware In Debut Week With Over 78,000 Units Sold PlayStation Universe Taiwanese law prevents TSMC from producing 2nm chips overseas, Taiwanese govt official confirms Tom's Hardware Best Early Black Friday Tech and PC Hardware Deals Tom's Hardware AMD is purportedly preparing Ryzen 200 "Hawk Point Refresh" APUs — Ryzen 7 255/260 set to replace the Ryzen 7 8745H/8845H series Tom's Hardware Ace Hardware Releases Q3 2024 Results Hardware Retailing Elon Musk's massive AI data center gets unlocked — xAI gets approved for 150MW of power, enabling all 100,000 GPUs to run concurrently Tom's Hardware Nvidia App reaches version 1.0 milestone and exits beta — GeForce Experience and Control Panel now deprecated Tom's Hardware Best SSDs 2024: From Budget SATA to Blazing-Fast NVMe Tom's Hardware ACE HARDWARE REPORTS THIRD QUARTER 2024 RESULTS PR Newswire Pizza Hut's new pizza warmer uses the PlayStation 5's heat to keep your pizza hot — you can 3D print the new PIZZAWARMR for free Tom's Hardware LG's new stretchable display can grow by 50%, bendy panels can be deformed into new form factors Tom's Hardware Kove unveils hardware memory solution to achieve unprecedented data center performance Digital Infra Network Xbox gaming handheld is years away, Microsoft exec says Tom's Hardware This Season, Men’s Accessories Go Heavy on Hardware The New York Times Global GPU market to hit $100 billion in 2024: JPR Tom's Hardware Yubico’s biometric security hardware now comes in USB-C and USB-A Biometric Update Tangible raises £4M to bridge funding gap for climate hardware companies Tech Funding News Solidigm reveals 122TB SSD, the world's highest-capacity drive for AI workloads — D5-P5336 offers unlimited write durability Tom's Hardware Tips & Tricks for cooler weather | K&K Hardware WHBF - OurQuadCities.com |
RELATED ARTICLES
Investing On A 1D Bar Code Reader Whereas 2D bar codes offer more security and safety for their subjects, 1D bar codes, as read by 1D bar code readers, are more practical for wide scale operations. The reason? Bar codes with single layers are more affordable to produce than the double layered inscriptions of 2D bar codes. A Review of Refurbished Toshiba Laptops Toshiba offers a few of their refurbished laptops in the "Clearance Store" of their official website toshibadirect.com. Survey of Both Past and Modern Printers Printers are on-line devices initially categorised as being either impact whereby a printing head assembly of some type is in physical contact with the paper, and non-impact where there is no mechanical contact with the paper.Impact printers:Dot matrix printers; employ a set of pins that can be projected or withdrawn as required to form a dot matrix of the required character that is fired through an inked ribbon to form characters on an underlying sheet of paper. Motherboard Basics A recent Tech Tip covered the basics of selecting a computer case and made mention of the various sizes that correspond to motherboards of different form factors. A few people wrote in expressing interest in understanding more about the basics of motherboards, and that's exactly what this Tech Tip intends to address. How to Read CRT Tube Part Numbers All picture tubes, whether monochrome or color type are identified by a specific code consisting of numbers and letters. The codes are different from each other because different tubes have different characteristics. Video Encryption What is Video Encryption?Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.The scrambling is the easy part. Expansion Cards Part 3: PCI Express In the first two installments of this series of Tech Tips, we took a look at PCI and AGP, undoubtedly the most common expansion slots in a computer today. With a few key improvements over both of these, PCI Express is destined to replace both and offer a whole new level of computer performance. Ink Cartridges - A Humble Beginning Computers and their accompanying printers were huge years ago. In the past toner reservoirs and toner cartridges were used instead of ink cartridges like those used now. Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 2 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase. What is Blu-Ray DVD Video technology has increased significantly over the past years, and is continuing to grow at an incredible rate. Digital Video Disc's aka DVD's are the most likely the last big jump in consumer video technology that everyone is familiar with. Laptop Computer Extras for the Mobile Traveler A laptop computer certainly provides you with an unprecedented level of freedom and mobility away from the office. However there are a few extras you might want to bring along on your laptop travels:Extra 1: portable printerIf you travel a lot, you never know when you might need to commit one of your digital documents to paper. Inkjet Jargon Explained With all the technical terms out there, it is becoming increasingly difficult to keep up with inkjet jargon. Unfortunately, understanding the differences between the various terminologies is a must in todays advanced technological age. Basics of RAID A couple of the recent Tech Tips from www.geeks. Top Three Factors to Consider While Choosing a Data Center for Your Business Data Centers are the core of the Internet. The computer servers that power the Interne,t call Data Centers their home. Build Your First Computer from Hardware Scratches Wow- if you do it first time and have some asset of time in your disposition - then go ahead and purchase motherboard, your favorite processor, memory, video card (probably it is better to purchase it external for advanced quality). You will also need computer case - first computer should probably go to the cheap one - with USB 2 ports from the front side - the only question - you might want to replace noisy cheap power supply with $50 dollars one. Video Display Video displays are most recent technique used in both outdoor and indoor environments.Video displays are used to display live actions at either sporting event, cultural show, or any industrial event. Does Size Really Matter In Our Digital Age? Well, we've all seen the advert, but that's not what I want to talk about, so get that out of your head straight away. No, let's think about what many call the "Queen of Arts" - namely painting. Nvidia Geforce 7800 GTX Review Nvidia has done it again, with it's newest video card, the geforce 7800 GTX. If money is no object and you demand the best, this is the video card for you. Getting to Know Inkjet Printers Inkjet printers were born in the 1980s, replacing the popular dot matrix printer. Inkjet printers drop droplets of ink onto printer paper to produce text and images. A Review of Refurbished HP Laptops HP refurbished laptops can be found on their website hpshopping.com. |
home | site map |
© 2006 |