1 / 33

Risks of Wireless Access Points

Risks of Wireless Access Points. Brian Moeller, CISSP. What is a wireless access point?. A device that uses a radio to allow access to a network. Apple Airport. Apple Airport “in the wild”. Cisco Wireless Access Point. Cisco Wireless Access Point – Front View. Linksys. Netgear.

jorcutt
Télécharger la présentation

Risks of Wireless Access Points

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Risks of Wireless Access Points Brian Moeller, CISSP The Ohio State University Network Security Group

  2. What is a wireless access point? • A device that uses a radio to allow access to a network The Ohio State University Network Security Group

  3. Apple Airport The Ohio State University Network Security Group

  4. Apple Airport “in the wild” The Ohio State University Network Security Group

  5. Cisco Wireless Access Point The Ohio State University Network Security Group

  6. Cisco Wireless Access Point – Front View The Ohio State University Network Security Group

  7. Linksys The Ohio State University Network Security Group

  8. Netgear The Ohio State University Network Security Group

  9. Apple Powerbook Laptop The Ohio State University Network Security Group

  10. Why scan for wireless? • Inventory Access Points and get a rough idea of how they’re secured • Plot their locations • Experiment with new wireless “Scanning” software The Ohio State University Network Security Group

  11. Why scan for wireless? • Get an idea of how wireless is being used on Campus • Prove/disprove that wireless implementations are secure or not secure • Demonstrate scanning technology and methods The Ohio State University Network Security Group

  12. The Scanning process • Laptop • Wireless card (Orinoco/Lucent Silver, in this scan) • Small external antenna • Golf Cart • Map of Campus The Ohio State University Network Security Group

  13. The Scanning process • Added GPS • GPS gives location data via satellite triangulation • Accuracy usually around 15ft. The Ohio State University Network Security Group

  14. The Scanning Process The Ohio State University Network Security Group

  15. The Scanning Process The Ohio State University Network Security Group

  16. The Scanning Process The Ohio State University Network Security Group

  17. The Scanning Process • How the scan works • Software looks for SSID (Service Set Identifier) broadcasts • Polls access point for configuration, names, and any other information it’s willing to share • Does *NOT* request IP address The Ohio State University Network Security Group

  18. So, make your point • Wireless common around Campus • Good system administration practice is questionable • Many appear to be merely unpacked, and plugged in • Most not running authentication or encryption The Ohio State University Network Security Group

  19. Campus Wireless Scan Results • Total of 122 Wireless Access Points found • 45 encrypted (WEP) • 77 Not Encypted The Ohio State University Network Security Group

  20. Campus Wireless Scan Results • 35 Access Points appear to have factory default settings The Ohio State University Network Security Group

  21. The Ohio State University Network Security Group

  22. Conclusion • Many wireless access points on campus • Channel contention may be an issue • No standardized configuration The Ohio State University Network Security Group

  23. Conclusion • Security issues • Authentication • Authorization • Accountability • Integrity • Confidentiality The Ohio State University Network Security Group

  24. Policy Discussion • Ownership of Wireless Frequencies and channels on campus • Centralized Management of Wireless Frequencies and Channels • Authority to assign channels, and approval of frequency/channel usage. The Ohio State University Network Security Group

  25. Policy Discussion • Ownership of Wireless Frequencies and channels on campus • Authority to define which wireless technologies will be authorized for use on campus The Ohio State University Network Security Group

  26. Policy Discussion • Requirement for wireless encryption • Proposed policy outlines requirement for *AT LEAST* WEP, and strongly recommends usage of VPN technology (but does not require VPN) The Ohio State University Network Security Group

  27. Policy Discussion • Requirement for MAC address registration and filtering The Ohio State University Network Security Group

  28. Policy Discussion • Requirement for authentication for all users who use the network (includes wireless) The Ohio State University Network Security Group

  29. Policy Discussion • Network Addressing • Requirement for using campus-assigned network addresses – and specifically disallowing NAT or private addressing. The Ohio State University Network Security Group

  30. Policy Discussion • Wireless Base Station Naming • Campus-wide standardization of access point names, and registration in DNS. • Requirement for contact information for all access points. The Ohio State University Network Security Group

  31. Policy Discussion • Wireless Base Station Naming • Campus-wide standardization of access point names, and registration in DNS. • Requirement for contact information for all access points. The Ohio State University Network Security Group

  32. Policy Discussion • Logging Policy • All wireless access points must employ a logging scheme that logs the IP address and user authentication information (including username, login/logout times and dates) for at least 30 days. The Ohio State University Network Security Group

  33. Policy Discussion • Protection of the wireless and network devices • Configuration must protect wireless access point configuration (i.e. by disabling or changing SNMP settings) • Password protection of all configuration methods The Ohio State University Network Security Group

More Related