Teaching Tips

advertisement
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 8
Wireless Network Security
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms
8-1
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-2
Lecture Notes
Overview
Wireless is convenient and in today’s network, it is quickly becoming the standard
connection for many people. There are drawbacks to wireless, especially since the
security of these networks has evolved very slowly. The chapter discusses the various
vulnerabilities of various wireless protocols and some appropriate techniques for
properly securing wireless networks.
Chapter Objectives



Describe the different types of wireless network attacks
List the vulnerabilities in IEEE 802.11 security
Explain the solutions for securing a wireless network
Teaching Tips
Wireless Attacks
1. Note that several attacks can be directed against wireless data systems.
2. Explain that these attacks can be directed against Bluetooth systems and wireless local
area networks.
Attacks on Bluetooth Devices
1. Define Bluetooth, which is the name given to a wireless technology that uses shortrange radio frequency (RF) transmissions and provides for rapid ad hoc device pairings.
2. Explain that Bluetooth technology enables users to connect wirelessly to a wide range
of computing and telecommunications devices.
3. Emphasize that it provides for rapid “on the fly” ad hoc connections between a
Bluetooth-enabled device such as a cellular smartphone or a laptop computer and a set
of Bluetooth headphones or a mouse.
4. Refer to Table 8-1 to discuss different types of blue truth products.
5. Note that Bluetooth is a Personal Area Network (PAN) technology designed for data
communication over short distances.
6. Discuss the two types of Bluetooth network topologies: piconet and scatternets.
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-3
7. Explain that bluejacking is an attack that sends unsolicited messages to Bluetoothenabled devices.
8. Note that bluesnarfing is an attack that accesses unauthorized information from a
wireless device through a Bluetooth connection, often between cell phones and laptop
computers.
Wireless LAN Attacks
1. Discuss the evolution of the IEEE wireless networking standards.
2. Explain that a wireless client network interface card adapter performs the same
functions as a wired adapter with one major exception: there is no external cable RJ-45
connection.
3. Discuss the three parts of an access point (AP):
a. An antenna and a radio transmitter/receiver to send and receive wireless signals
b. Special bridging software to interface wireless devices to other devices
c. A wired network interface that allows it to connect by cable to a standard wired
network
4. Discuss the basic functions of an AP.
5. Explain the purpose of war driving and war chalking.
6. Discuss the attacks that can be mounted through the RF spectrum.
7. Mention the attacks that use access points:
a. Rogue access point
b. Evil twin
Teaching
Tip
Explain that Bluetooth hacking is highly scripted and a routine source of
entertainment for those attending “security” conferences.
Vulnerabilities of IEEE 802.11 Security
1. Mention that the primary vulnerabilities are in the areas of open system authentication,
MAC address filtering, and WEP.
MAC Address Filtering
1. Explain that MAC addresses are initially exchanged in an unencrypted format through
the WLAN. An attacker can easily see the MAC address of an approved device and use
it to join the network.
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-4
2. Mention that managing a large number of MAC addresses can pose significant
challenges.
3. Explain that MAC address filtering does not provide a means to temporarily allow a
guest user to access the network other than manually entering the user’s MAC address
into the access point.
SSID Broadcast
1. Remind students that in a wireless network, each device must be authenticated prior to
being connected to the WLAN (once the wireless device is authenticated, the user may
then be asked to authenticate by entering a username and password).
2. Discuss the ways the SSID can be used to secure the wireless network.
Wired Equivalent Privacy (WEP)
1. Note that Wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol
designed to ensure that only authorized parties can view transmitted wireless
information.
2. Explain that to encrypt packets WEP can use only a 64-bit or 128-bit number, which is
made up of a 24-bit initialization vector (IV) and a 40-bit or 104-bit default key. The
relatively short length of the default key limits its strength.
3. Mention that WEP implementation violates the cardinal rule of cryptography: anything
that creates a detectable pattern must be avoided at all costs. With WEP, IVs would start
repeating in fewer than seven hours.
4. Because of the weaknesses of WEP, it is possible for an attacker to identify two packets
derived from the same IV (called a collision).
Teaching
Tip
Because of its significant security vulnerabilities, it is not recommended to use
WEP.
Quick Quiz 1
1. ____ is the name given to a wireless technology that uses short-range radio frequency
(RF) transmissions and provides for rapid ad hoc device pairings.
Answer: Bluetooth
2. ____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
Answer: Bluejacking
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-5
3. True or False: Open system authentication is weak because authentication is based on
only one factor: a match of SSIDs.
Answer: True
Wireless Security Solutions
1. The wireless security requirements for personal wireless security are most often based
on two models promoted by the Wi-Fi Alliance: WPA Personal Security and WPA2
Personal Security.
Wi-Fi Protected Access (WPA)
1. Explain that the design goal of WPA was to protect both present and future wireless
devices.
2. Note that WPA is a subset of 802.11i and addresses both encryption and authentication.
3. Explain that WPA replaces WEP with an encryption technology called Temporal Key
Integrity Protocol (TKIP).
4. Discuss the advantages of TKIP over WEP.
5. Explain that WPA authentication can be accomplished by using either IEEE 802.1x or
preshared key (PSK) technology.
6. Discuss the vulnerabilities that can result of improper management of the PSK keys
including key management weaknesses and the use of passphrases.
Wi-Fi Protected Access 2 (WPA2)
1. Define Wi-Fi Protected Access 2 (WPA2) as the second generation of WPA security
introduced by the Wi-Fi Alliance in September 2004. WPA2 still uses PSK
authentication but instead of TKIP encryption it uses enhanced data encryption.
2. Explain that encryption under the WPA2 personal security model is accomplished by
AES-CCMP. CCMP is based upon the Counter Mode with CBC-MAC (CCM) of the
Advanced Encryption Standard (AES) encryption algorithm.
3. Mention that CCM is the algorithm providing data privacy, while the Cipher Block
Chaining Message Authentication Code (CBCMAC) component of CCMP provides
data integrity and authentication.
4. Note that WPA2 authentication is accomplished through PSK or by the IEEE 802.1x
standard.
5. Discuss the two common EAP protocols
a. Lightweight EAP
b. Protected EAP
Security+ Guide to Network Security Fundamentals, Fourth Edition
Teaching
Tip
8-6
It is recommended that AES-CCMP encryption and decryption be performed in
hardware because of its computationally intensive nature. Performing AESCCMP encryption in software requires significant processing power. If an AP
performed AES-CCMP encryption/decryption in software while serving several
devices, the AP would not be able to adequately service the devices, especially if
that access point lacked a powerful processor and a large amount of memory.
Other Wireless Security Steps
1. Note that antenna placement, power level controls, and rogue AP discovery tools can be
used to protect a wireless network.
Quick Quiz 2
1. True or False: WPA replaces the Message Integrity Check (MIC) function in WEP with
the Cyclic Redundancy Check (CRC).
Answer: False
2. PSK authentication uses a(n) ____ to generate the encryption key.
Answer: passphrase
3. The AES algorithm processes blocks of ____ bits.
Answer: 128
4. True or False: Wireless VLANs allow a single access point to service different types of
users.
Answer: True
Class Discussion Topics
1. Have students discuss how they would envision the devices that they own working
together and how that might be done in a secure manner.
2. Have students discuss their experiences with Bluetooth hacking or having been hacked
via Bluetooth.
Additional Projects
1. Have students research recent developments from the WiFi Alliance, especially those
related to the simultaneous use of peer-to-peer wireless devices while connected to an
infrastructure mode device.
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-7
2. Have students research the debate over WiMax and LTE and the promise of “mobile
broadband.”
Additional Resources
1. IEEE 802.11 Wireless networks
http://ieee802.org/11/
2. Bluetooth
http://www.bluetooth.com/
3. HIPAA and Wireless
http://www.airtightnetworks.com/home/solutions/industry-solutions/healthcare/hipaacompliance-and-wireless.html
4. WiFi Direct vs Bluetooth 4.0
http://www.pcworld.com/article/208778/wifi_direct_vs_bluetooth_40_a_battle_for_sup
remacy.html
5. WiFi Alliance
http://www.wi-fi.org/
Key Terms
 AES-CCMP The encryption protocol standard for WPA2.
 bluejacking An attack that sends unsolicited messages to Bluetooth-enabled devices.
 bluesnarfing An attack that accesses unauthorized information from a wireless device
through a Bluetooth connection, often between cell phones and laptop computers.
 Bluetooth A wireless technology that uses short-range radio frequency (RF)
transmissions and provides for rapid ad hoc device pairings.
 evil twin An AP set up by an attacker to mimic an authorized AP and capture
transmissions, so a user’s device will unknowingly connect to this evil twin instead.
 Extensible Authentication Protocol (EAP) A framework for transporting
authentication protocols that defines the format of the messages.
 initialization vector (IV) A 24-bit value used in WEP that changes each time a packet
is encrypted.
 keystream attack (IV attack) A method of determining the keystream by analyzing
two packets that were created from the same initialization vector (IV).
 Lightweight EAP (LEAP) A proprietary EAP method developed by Cisco Systems
requiring mutual authentication used for WLAN encryption using Cisco client software.
 Media Access Control (MAC) address filtering A method for controlling access to a
WLAN based on the device’s MAC address.
 preshared key (PSK) A key value that must be created and entered into both the access
point and all wireless devices (“shared”) prior to (“pre”) the devices communicating
with the AP.
Security+ Guide to Network Security Fundamentals, Fourth Edition
8-8
 Protected EAP (PEAP) An EAP method designed to simplify the deployment of
802.1x by using Microsoft Windows logins and passwords.
 rogue access point An unauthorized AP that allows an attacker to bypass many of the
network security configurations and opens the network and its users to attacks.
 Service Set Identifier (SSID) The user-supplied network name of a WLAN; it can
generally be alphanumeric from 2 to 32 characters.
 SSID broadcast The transmission of the SSID from the access point to wireless
devices.
 Temporal Key Integrity Protocol (TKIP) A WPA encryption technology.
 war chalking The process of documenting and then advertising the location of wireless
LANs for others to use. Wireless networks were identified by drawing on sidewalks or
walls around the area of the network.
 war driving Searching for wireless signals from an automobile or on foot using a
portable computing device.
 Wi-Fi Protected Access (WPA) The original set of protections from the Wi-Fi
Alliance in 2003 designed to protect both present and future wireless devices.
 Wi-Fi Protected Access 2 (WPA2) The second generation of WPA security from the
Wi-Fi Alliance in 2004 to address authentication and encryption on WLANs.
 Wired Equivalent Privacy (WEP) An IEEE 802.11 security protocol designed to
ensure that only authorized parties can view transmitted wireless information. WEP has
significant vulnerabilities and is not considered secure.
Download