100 likes | 219 Vues
This document explores the state of wireless security in the Philippines, highlighting a 2004 discovery of unencrypted Wi-Fi networks in Manila. As homes and small businesses proliferate their use of Wi-Fi, many remain unaware of security risks. We discuss vulnerabilities of old protocols like WEP and improvements with WPA and WPA2. Key tools for assessing wireless security, such as Kismet and Aircrack, are introduced. Effective security measures are recommended, including changing default settings, implementing MAC address filtering, and limiting connections to safeguard against unauthorized access.
E N D
Wireless Security on the Philippine Setting
Introduction: • WHOAMI • What’s this all about?
The Philippine Wee-fee setting • 2004 German hacker finds open Wi-Fi networks in Manila • Sept 2004: Van Hauser discovered that only 15 out of the 66 wireless APs were encrypted • More Wifi networks on Homes and small businesses • Unaware and indifferent • Low or no security (due to cost and convenience) • More direct targets
Wireless Security History • Open Wireless • WEP • - Use of Streaming Algorithm • - Per packet master key re-use • - Group use and sharing of the same PSK • - Lack of Authentication from network to client • - Confidentiality vulnerabilities with header • - Integrity vulnerability and replay attacks • WPA • WPA2
Top Wireless Tools • Kismet • NetStumbler • Aircrack • Airsnort • Kismac • * Pyrit
DEMO Click Me!
How to Secure? • Change the defaults • Long key with wide characters set • MAC Address filtering • Limit connections • Disable DHCP • Hide SSID or a creative SSID • Change your key • Tools • Active security
“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”- Gene Spafford
Credits: • SecurityUncorcked.com • InfosecPhils.wordpress.com • PGHO (Nogie and Aphro)