1 / 9

Wireless Security on the Philippine Setting

This document explores the state of wireless security in the Philippines, highlighting a 2004 discovery of unencrypted Wi-Fi networks in Manila. As homes and small businesses proliferate their use of Wi-Fi, many remain unaware of security risks. We discuss vulnerabilities of old protocols like WEP and improvements with WPA and WPA2. Key tools for assessing wireless security, such as Kismet and Aircrack, are introduced. Effective security measures are recommended, including changing default settings, implementing MAC address filtering, and limiting connections to safeguard against unauthorized access.

lida
Télécharger la présentation

Wireless Security on the Philippine Setting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security on the Philippine Setting

  2. Introduction: • WHOAMI • What’s this all about?

  3. The Philippine Wee-fee setting • 2004 German hacker finds open Wi-Fi networks in Manila • Sept 2004: Van Hauser discovered that only 15 out of the 66 wireless APs were encrypted • More Wifi networks on Homes and small businesses • Unaware and indifferent • Low or no security (due to cost and convenience) • More direct targets

  4. Wireless Security History • Open Wireless • WEP • - Use of Streaming Algorithm • - Per packet master key re-use • - Group use and sharing of the same PSK • - Lack of Authentication from network to client • - Confidentiality vulnerabilities with header • - Integrity vulnerability and replay attacks • WPA • WPA2

  5. Top Wireless Tools • Kismet • NetStumbler • Aircrack • Airsnort • Kismac • * Pyrit

  6. DEMO Click Me!

  7. How to Secure? • Change the defaults • Long key with wide characters set • MAC Address filtering • Limit connections • Disable DHCP • Hide SSID or a creative SSID • Change your key • Tools • Active security

  8. “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”- Gene Spafford

  9. Credits: • SecurityUncorcked.com • InfosecPhils.wordpress.com • PGHO (Nogie and Aphro)

More Related