Teaching

advertisement
CWNA Guide to Wireless LANs, Second Edition
Chapter 8
Wireless LAN Security and Vulnerabilities
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms
8-1
CWNA Guide to Wireless LANs, Second Edition
8-2
Lecture Notes
Overview
When compared to a wired network, a wireless LAN has several features that make it
more vulnerable to attacks. Coupled with the fact that wireless security in the original
IEEE 802.11 standard was not properly implemented and thus further exposed wireless
networks to a variety of attacks, security has been the Achilles heel of wireless
networking for many years. However, much of that is changing. According to many
experts, by implementing new wireless security technologies WLANs can be made as
secure as their wired counterparts. In this chapter students will look at wireless security
and vulnerabilities. They start by briefly reviewing security in general. Then they
explore the basic IEEE 802.11 security protections and observe the vulnerabilities in
that protection mechanism. Finally the students will consider some of the different types
of attacks on WLANs.
Chapter Objectives




Define information security
Explain the basic security protections for IEEE 802.11 WLANs
List the vulnerabilities of the IEEE 802.11 standard
Describe the types of wireless attacks that can be launched against a wireless
network
Teaching Tips
Security Principles
1. Provide a brief overview of information security, and discuss the importance of
understanding the concepts involved in information security when trying to analyze the
vulnerabilities of a system.
What Is Information Security?
1. Define the term information security. Discuss the various media on which the digital
information being protected may be located.
2. Explain that information security involves ensuring that protective measures are
properly implemented.
3. Using the list on page 257 of the text as a guide, discuss the three characteristics of
information that must be protected by information security. Stress that information
security protects the confidentiality, integrity, and availability of information on the
devices that store, manipulate, and transmit the information through products, people,
and procedures. Use Figure 8-1 to illustrate.
CWNA Guide to Wireless LANs, Second Edition
8-3
Challenges of Securing Information
1. Using the list on pages 258 and 259 of the text as a guide, discuss the various reasons
why security has become increasingly difficult. Stress that it can be difficult to
distinguish an attack from normal Internet traffic. Define the term day zero attacks.
Mention that distributed attacks make it impossible to stop an attack by trying to
identify and block the source.
Categories of Attackers
1. Using the list on pages 259 and 260 of the text as a guide, describe in detail the six
different categories of attackers. Stress that employees of a company are one of the
largest categories of attackers.
Teaching
Tip
The original connotation of the term "hacker" referred to someone with the intent
to expand his or her knowledge of computing through experimentation. The
term's connotation has, over the years, assumed a more negative connotation.
Teaching
Tip
An attacker may fall into more than one of the described categories.
Teaching
Tip
Mention to the students that the U.S. Department of Homeland Security’s annual
budget includes hundreds of millions of dollars for information infrastructure
protection from cyberterrorists.
2. Using Table 8-1 as a guide, summarize the different types of attackers, their motivation,
and their skill level.
Security Organizations
1. Using the list on page 261 of the text as a guide, discuss some of the organizations
dedicated to information security. Explain these organization's missions and goals.
Basic IEEE 802.11 Security Protections
1. Explain that, unlike a wired LAN that requires access to the cable plant in order to view
data that is being transmitted, data transmitted through the air by a wireless LAN could
be intercepted and viewed by an attacker. Discuss the importance of providing basic
security mechanisms for WLANS.
2. Briefly introduce the three categories of protections that can be applied to WLANS.
Access Control
1. Explain that access control is intended to guard the availability of data.
2. Provide an overview of the concept of wireless access control, or filtering.
CWNA Guide to Wireless LANs, Second Edition
8-4
3. Describe the concept of MAC layer filtering, stressing that this is the most common
form of access control in WLANs. Briefly review the purpose of the MAC layer,
reminding the students that it is one of the two divisions of the Data Link layer specified
by the IEEE 802 standards. Remind the students that the MAC address is a hardware
address that uniquely identifies each node of a network.
Teaching
Tip
The MAC layer was first discussed in Chapter 4.
4. Using Figure 8-2 to illustrate, discuss the format of a typical MAC address, explaining
the purpose of the OUI and IAB.
Teaching
Tip
MAC addresses are regulated by the IEEE. At this writing, an OUI costs $1,650
and an IAB is $550.
5. Explain that access to the wireless network can be restricted by entering the MAC
address of approved devices into the access point. Illustrate with Figures 8-3 and 8-4.
Teaching
Tip
Although it does not restrict access to the wireless LAN, another type of filtering
can restrict the type of traffic that passes through the access point based on the
protocol. For example, if Web traffic were to be restricted, the AP could be
configured to reject all HTTP traffic on Port 80.
6. Explain that MAC address filtering has the drawback of requiring pre-approval for
MAC addresses.
Teaching
Tip
Wireless LAN MAC address filtering has serious vulnerabilities. These
vulnerabilities are discussed later in this chapter.
Wired Equivalent Privacy (WEP)
1. Explain that WEP is intended to guard the confidentiality of the data on a WLAN, and
that it ensures that only authorized parties can view the information.
2. Mention that WEP uses a process of "scrambling" information in order to encrypt it.
Teaching
Tip
WEP was actually part of the original IEEE 802.11 standard that was released in
1997.
Cryptography
CWNA Guide to Wireless LANs, Second Edition
8-5
1. Define the terms cryptography and steganography, mentioning the difference between
them.
2. Define the terms encryption, plaintext, and ciphertext.
3. Define the terms algorithm and cipher. Stress that a cipher algorithm is given a key that
is used to encrypt and decrypt the text. Mention why both the sender and the receiver
would need this key. Illustrate with Figure 8-5.
4. Define the term weak key, and explain that easily discovered keys are unacceptable
when trying to provide secure information transfer.
WEP Implementation
1. Using the list on page 266 of the text as a guide, discuss the IEEE 802.11 cryptography
objectives as outlined in the standard.
2. Stress that WEP relies on a secret key that is “shared” between a wireless device and the
AP. Explain that this type of encryption is known as private key cryptography or
symmetric encryption, and requires that the same key be installed on both the AP and
the wireless device. Illustrate with Figure 8-6.
3. Explain that WEP shared secret keys must be a minimum of 40 bits in length, and that
most vendors implement a 104-bit key.
4. Using the second list on page 266 of the text as a guide, discuss the various ways that
shared keys may be generated within the WEP framework.
5. Explain that the IEEE standard also specifies that the access points and devices can hold
up to four WEP shared secret keys simultaneously. Illustrate with Figure 8-7.
6. Discuss the role of the default key. Mention that a device may decrypt packets that have
been encrypted with any of the four keys, but can only encrypt packets based on the
default key. Illustrate with Figure 8-8.
Teaching
Tip
In practice, most installations use a single key that is shared among all wireless
devices and APs.
7. Using the steps listed on page 269 of the text as a guide, and using Figure 8-9 to
illustrate, describe the mechanisms used by WEP to perform encryption. Define the
terms CRC, ICV, IV, PRNG, and keystream.
Teaching
Tip
The reason why the IV is added to the ciphertext in plaintext is because it is
needed to decrypt the message.
CWNA Guide to Wireless LANs, Second Edition
8-6
8. Describe the processes that occur when an encrypted frame arrives at its destination
device.
9. Explain that generating the keystream using the PRNG is based on the RC4 cipher
algorithm. Briefly discuss the origins of the RC4 cipher algorithm, and define the term
stream cipher. Illustrate with Figure 8-10.
Authentication
1. Stress that, because wireless LANs cannot limit access to the RF signal by walls or
doors, wireless authentication requires the wireless device and not the individual user to
be authenticated prior to being connected to the network.
Teaching
Tip
Authentication is covered in detail in Chapter 5.
2. Describe the concept of open system authentication.
Teaching
Tip
Open system authentication is sometimes called SSID filtering.
3. Describe the concept of shared key authentication. Define the term challenge text.
Teaching
Tip
When WEP is used for shared key authentication it is serving a dual function of
encryption and authentication.
Quick Quiz 1
1. True or False: A hacker is a person who violates system security with malicious intent.
Answer: false
2. Access control is intended to guard the ____________________ of information.
Answer: availability
3. The most common type of access control is ____________________ address filtering.
Answer: Media Access Control (MAC)
4. ____________________ is intended to guard confidentiality of information.
Answer: Wired equivalent privacy (WEP)
5. An encryption algorithm is known as a(n) ____________________.
Answer: cipher
6. Using the same (shared) secret key to both encrypt as well as decrypt is called
____________________.
CWNA Guide to Wireless LANs, Second Edition
8-7
Answer: private key cryptography or symmetric encryption
7. True or False: Shared key authentication uses WEP keys.
Answer: True
Vulnerabilities of IEEE 802.11 Security
1. Stress that, despite the fact that the IEEE 802.11 standard provided security mechanisms
for wireless networks, these mechanisms have fallen far short of their goal. Explain that
vulnerabilities exist in the areas of authentication, address filtering, and WEP.
Teaching
Tip
When testing for vulnerabilities a device must maintain its persistent physical
state so that an accurate test can be performed. This is sometimes called the
“state machine.”
Authentication
1. Provide a brief introduction to the vulnerabilities inherent to wireless authentication.
Open System Authentication Vulnerabilities
1. Explain that open system authentication is inherently weak because an attacker only has
to discover the SSID to be authenticated. Explain how an attacker would be able to
discover an SSID.
2. Mention that some APs are configured to not include the SSID in beacon frames.
3. Using the list on page 272 of the text as a guide, discuss some of the open system
authentication vulnerabilities that exist. Use Figures 8-11 and 8-12 to illustrate some of
these points.
Teaching
Tip
A list of default SSIDs can be found at www.cirt.net/cgi-bin/ssids.pl.
4. Mention that there are free utilities available on the Internet that allow people with little
knowledge of WLANs to be able to easily capture SSIDs.
Shared Secret Key Authentication Vulnerabilities
1. Explain that the first vulnerability of shared secret key authentication is based on the
fact that key management can be very difficult when it must support a large number of
wireless devices. Mention that attackers may discover the key by stealing it from an
approved wireless device.
2. Discuss the concept of a brute force attack. Stress that these are automated attacked in
which the password combinations are generated by a program.
CWNA Guide to Wireless LANs, Second Edition
Teaching
Tip
8-8
Brute force password attack programs are readily available on the Internet.
3. Explain that a dictionary attack takes each word from a dictionary and encodes it in the
same way the passphrase was encoded, and that the encoded dictionary words are
compared to the encrypted frame to find a match.
Teaching
Tip
Research has indicated that 64-bit passphrase generators may contain flaws.
Many wireless security experts recommend avoiding passphrase generators
altogether.
4. Mention that the AP sends the challenge text it is sent in plaintext, and explain that an
attacker can capture the challenge text along with the device’s response, which can then
be used to mathematically derive the keystream.
5. Using Table 8-2 as a guide, summarize the different types of authentication attacks
Address Filtering
1. Explain that the sheer number of users with MAC addresses on a network makes it
difficult to manage all of the MAC addresses and thus creates avenues for attackers.
Mention that there are no "guest" users.
2. Explain that MAC addresses are initially exchanged in plaintext, and discuss the
vulnerabilities that this exposes.
3. Discuss the two ways that MAC addresses can be "spoofed".
4. Using Table 8-3 as a guide, summarize all of the types of MAC address attacks.
WEP
1. Stress that it is important to note that the vulnerability in WEP is based on how WEP
and the RC4 cipher are implemented.
2. Explain that the secret key in WEP is either 40 or 104 bits, stressing that the shorter the
key, the easier it is to crack.
3. Explain that the WEP implementation violates the cardinal rule of cryptography, and
describe how WEP's implementation creates a detectable pattern for attackers.
4. Explain how an attacker can detect a collision, and then use this to initiate a keystream
attack. Use Figure 8-13 and 8-14 to illustrate these concepts.
5. Discuss the limitations of the RC4 cipher, and using pseudo-random numbers for
encryption in general.
6. Using Table 8-4 as a guide, summarize all of the WEP vulnerabilities.
CWNA Guide to Wireless LANs, Second Edition
Teaching
Tip
8-9
Security mechanisms for 802.11 WLANs that do provide adequate security are
discussed in Chapter 9.
Other Wireless Attacks
1. Provide an overview of some of the other types of wireless attacks that may be initiated
by attackers.
Man-in-the-Middle Attack
1. Discuss the concept of a man-in-the-middle attack, using Figure 8-15 to illustrate.
Explain the difference between active and passive man-in-the-middle attacks.
2. Explain that on wireless networks, man-in-the-middle attacks are commonly done by
attackers setting up a “fake” access point. Illustrate with Figure 8-16.
Teaching
Tip
Wireless man-in-the-middle attacks are sometimes called TCP/IP hijacking
attacks.
Denial of Service (DoS) Attack
1. Describe the way in which standard DoS attacks are orchestrated.
2. Describe the ways in which wireless DoS attacks may occur. Discuss the concept of
jamming, and explain why it will prevent any wireless device from transmitting.
3. Explain that another type of DoS attack on a wireless device is to continually cause the
device to dissociate and re-associate with the AP.
Teaching
Tip
Although wireless security has serious vulnerabilities as shown in this chapter,
there are sufficient means available to protect a WLAN. These protections are
covered in Chapter 9.
Quick Quiz 2
1. True or False: Open system authentication is considered to be inherently weak.
Answer: True
2. A(n) ____________________ attack is one in which an attacker attempts to create
every possible key combination.
Answer: brute force
3. True or False: MAC addresses are initially exchanged in cipertext.
Answer: False
CWNA Guide to Wireless LANs, Second Edition
8-10
4. A(n) ____________________ attack is a method of determining the keystream by
analyzing two packets that were created from the same IV.
Answer: keystream
5. A(n) ____________________ attack makes it seem that two computers are
communicating with each other, when actually they are sending and receiving data with
a computer between them.
Answer: man-in-the-middle
6. ____________________ is a technique in which an attacker will flood the radio
frequency spectrum with noise that makes it appear that there is legitimate traffic being
transmitted.
Answer: Jamming
Class Discussion Topics
1. Have the students consider that employees of companies are one of the largest threats to
information security within an organization. Have them discuss why this might be, why
employees might be more of a threat than other types of attackers, and what motivations
may influence employees to launch attacks.
2. Have the students compare their understanding of authentication and access control
within wired networks to the concepts presented in this chapter. What basic differences
do they see between wired and wireless network in terms of how authentication and
access control can be applied. Can they think of any other authentication or access
control techniques not presented in this chapter that might apply to WLANs.
Additional Projects
1. There are many types of computer attacks other than the one discussed in this chapter.
Have the students do research online to find descriptions of other types of attacks, and
generate a list of three or four of them. When the students are done, compile their
results into a master list that can be redistributed to the class. Have the students discuss
which of the types of attacks in the list might be applicable specifically to WLANs and
which may not apply directly.
2. One type of wireless security threat is exposed through the practice of "wardriving". In
wardriving, and attacker with a wireless device drives around searching for unsecured
wireless networks. Have the students do research online and develop a list of best
practices and procedures to protect a wireless network from wardriving.
Additional Resources
1. An Executive's Information Security Challenge:
http://www.informit.com/articles/article.asp?p=368647&rl=1
2. Computer System Security: A Primer:
http://www1.us.dell.com/content/topics/global.aspx/power/en/ps1q02_lowery?c=us&=e
n&s=corp
CWNA Guide to Wireless LANs, Second Edition
8-11
3. Security Groups and Organizations:
http://www.alw.nih.gov/Security/security-groups.html
4. MAC Address Filtering:
http://netsecurity.about.com/od/quicktip1/qt/qtwifimacfilter.htm
5. Wireless LAN Security (802.11) Wardriving & Warchalking:
http://www.wardrive.net/
6. 802.11 WEP: Concepts and Vulnerability:
http://www.wi-fiplanet.com/tutorials/article.php/1368661
7. Cryptography:
www.Cryptography.org
8. Encryption Tutorial:
http://webmonkey.wired.com/webmonkey/programming/php/tutorials/tutorial1.html
9. Wireless Authentication, Routing, Traffic control and Accounting:
http://www.hpi.net/whitepapers/warta/
Key Terms
 Access control: Restricting access to authorized users.
 Algorithm: The underlying process or formula for encrypting and decrypting messages.
 Brute force attack: An attack in which an attacker attempts to create every possible
key combination by systematically changing one character at a time in a possible key.
 Cipher: An encryption algorithm.
 Ciphertext: An encrypted message.
 Collision: In wireless security, two packets that were created from the same
initialization vector (IV).
 Computer spy: A person who has been hired to break into a computer and steal
information.
 Cracker: A person who violates system security with malicious intent.
 Cryptography: The science of transforming information so that it is secure while it is
being transmitted or stored.
 Cyberterrorists: Terrorists who attack networks and computer infrastructures in order
to cause panic.
 Cyclic redundancy check (CRC): A checksum value that is based on the contents of
the text.
 Day zero attack: An attack that takes advantage of a previously unknown flaw.
 Decryption: The process of changing a ciphertext into plaintext.
 Default key: A key value that is used to encrypt wireless data transmissions when they
are sent.
 Denial of service ( DoS ) attack: An attack that attempts to make a server or other
network device unavailable by flooding it with requests.
 Dictionary attack: An attack that takes each word from a dictionary and encodes it in
the same way a passphrase was encoded.
 Encryption: The process of changing plaintext into ciphertext.
 Filtering: Restricting access to authorized users.
 Hacker: A person who uses his or her advanced computer skills to attack computers but
not with a malicious intent.
CWNA Guide to Wireless LANs, Second Edition
8-12
 Information security: Protecting the confidentiality, integrity, and availability of
information on the devices that store, manipulate, and transmit the information through
products, people, and procedures.
 Initialization vector (IV): A 24-bit WEP value that changes each time a packet is
encrypted.
 Integrity check value (ICV): The checksum value generated by WEP.
 Jamming: An attack technique that floods the radio frequency spectrum with noise.
 Key: The value that an algorithm uses to encrypt or decrypt a message.
 Keystream: The output from a pseudo-random number generator (PRNG).
 Keystream attack: An attack method to determining the keystream by analyzing two
packets that were created from the same initialization vector (IV).
 Man-in-the-middle attack: An attack that intercepts communication from one device
and sends a substitute communication to the intended receiver.
 Media Access Control (MAC) address filtering: An access control method that
restricts access based on the media access control (MAC) address.
 Plaintext: A message in an unencrypted format.
 Private key cryptography: Using the same shared secret key to both encrypt and
decrypt messages.
 Pseudo-random number generator (PRNG): A part of the process for encrypting
packages using WEP that generates a keystream.
 RC4: A cipher algorithm used in WEP.
 Script kiddies: Unskilled or novice attackers who break into computers to create
damage.
 Steganography: The process of hiding data so that it cannot be discovered.
 Stream cipher: A cipher that takes one character and replaces it with one character.
 Symmetric encryption: Using the same shared secret key to both encrypt and decrypt
messages.
 Weak key: A cryptographic key that creates a repeating pattern.
 Wired equivalent privacy (WEP): An IEEE 802.11 cryptography mechanism.
Download