WLAN 802.11b Security FAQ

WLAN 802.11b Security FAQ

Post by Christopher Klau » Wed, 25 Dec 2002 00:11:33



Wireless LAN Security FAQ

By  Christopher  W.  Klaus  of Internet Security Systems (ISS). Please
send corrections, additions, and new questions to cwkpub...@iss.net.

Version 1.6 - Last Updated September 30th 2002
     _________________________________________________________________

                                   Contents

     * [0]  Where  do  I  get  the  latest  version  of this Wireless LAN
       Security FAQ?
     * [1] What is the overview of Wireless LAN 802.11 technology?
          + [1.1]  When  will 802.11a arrive and how will the security be
            different than 802.11b?
          + [1.2] What is an Access Point?
          + [1.3] How much does the equipment for wireless 802.11b cost?
          + [1.4] Are companies the only wireless targets by attackers?
          + [1.5] Where can you find wireless 802.11 networks?
          + [1.6] How does the antenna affect wireless LAN security?
               o [1.6.1] How do I build a cheap and effective antenna?
          + [1.7]  Can  you spot a laptop with wireless 802.11 capability
            by looking for the antenna?
     * [2] What are the major security risks to 802.11b?
          + [2.1] What are Insertion Attacks?
               o [2.1.1]Plug-in Unauthorized Clients
               o [2.1.2]Plug-In Unauthorized Renegade Base Stations
          + [2.2]  What  are Interception and monitoring wireless traffic
            attacks?
               o [2.2.1] Wireless Sniffer
               o [2.2.2] Hijacking the session
               o [2.2.3] Broadcast Monitoring
               o [2.2.4] ArpSpoof Monitoring and Hijacking
                    # [2.2.4.1]  Hijacking  SSL (Secure Socket Layer) and
                      SSH (Secure Shell) connections
               o [2.2.5] BaseStation Clone (Evil Twin) intercept traffic
          + [2.3] What are AP and Client Misconfigurations?
               o [2.3.1] Server Set ID (SSID)
                    # [2.3.1.1] What are the default SSID's?
               o [2.3.2] What is Secure Access Mode?
               o [2.3.3] Bruteforce Base Station SSID
               o [2.3.4] Can the SSID be encrypted?
               o [2.3.5]  By  turning  off  the  broadcast  of  SSID, can
                 someone still sniff the SSID?
               o [2.3.6] Wired Equivalent Privacy (WEP)
                    # [2.3.6.1] Attacks against WEP
                    # [2.3.6.2] Default WEP Keys
                    # [2.3.6.3] How Large is WEP Keys
               o [2.3.7] SNMP community words
                    # [2.3.7.1] SNMP Vulnerabilities
               o [2.3.8] Configuration Interfaces
               o [2.3.9] Client side security risk
               o [2.3.10] Installation Risk
          + [2.4] What is Jamming?
               o [2.4.1] 2.4 GHz Interfering Technology
          + [2.5] What are Client to Client Attacks?
               o [2.5.1] Filesharing and other TCP/IP service attacks
               o [2.5.2] DOS (Denial of Service)
               o [2.5.3] Hybrid Threats
          + [2.6] War Driving Access Point Maps
          + [2.7] Parasitic Grids
     * [3] What are solutions to minimizing WLAN security risk?
          + [3.1] Wireless Security Policy and Architecture Design
               o [3.1.1] Basic Field Coverage
          + [3.2] Treat BaseStations as Untrusted
          + [3.3] Base Station Configuration Policy
               o [3.3.1] 802.1X Security
          + [3.4] Base Station Discovery
               o [3.4.1] Honeypots - FakeAP
          + [3.5] Base Station Security Assessments
          + [3.6] Wireless Client Protection
     * [4] Who is making 802.11 Security Solutions?
          + [4.1] 802.11 Gateway Infrastructure
          + [4.2] 802.11 Security Analysis Tools
     * [5] About Internet Security System's Wireless 802.11b Solution
     * [6] Acknowledgements
     _________________________________________________________________

Recent Updates

   Version 1.6
     * Added new war driving maps.
     * Updated 802.11a as being now available.
     * Added how large is WEP key information.
     * Added acknowledgements section
     * Added Honeypots - FakeAP
     * Add basic field coverage strategy

   Version 1.5
     * Added all of Netgear's default WEP keys.
     * Added Pringles Can and Waveguide Antenna Info.
     * Added hybrid threats, next-gen virus/worm spread by wireless.
     * Added Parasitic Grids. Free anonymous access for intruders.
     * Added SNMP vulnerabilities.
     * Added 802.1X Security, and its flaws.
     * Added MiniStumbler, Wireless Scanner, BlackICE PC Protection.
     * Added info on Broadcast pings.

   Version 1.3
     * Added Section 1.7 regarding internal antenna.
     * Added  link to Cigital regarding ArpSpoofing. Cigital put together
       a nice diagram of the attack.
     * Added Default WEP key for NetGear AP.
     * Added link to BSD version of AirSnort.

   Version 1.2
     * Added where this WLAN Security FAQ can be found.
     * Cleaned up the formatting
     * Added better indexing, added hyperlinks between index and content
     * Added link to article on wireless LAN antennas

   Version 1.1
     * Added NetStumbler, WEPCrack tools, Added WEP insecurity paper
     * Added Ecutel, BlueSocket, and NetMotion as WLAN Sec. Products
     * Updated  Accuracy  of  WEP description and made it clear that SSID
       not being encrypted.
     * Added Broadcast of SSID turned off can still be circumvented.
     * Added Addtron's default SSID, a popular AP
     * Added War Driving AP maps.
     * Added 802.11 ArpSpoof, a technique used by ISS X-Force Consulting.
     * Added hijacking SSH and SSL connections via wireless.
     * Added 2 X-Force Advisories on Wireless 802.11 flaws

   Version 1.0
     * First draft
     _________________________________________________________________

   [0] Where do I get the latest version of this Wireless LAN Security FAQ?

     * The     most    current    version    is    on    the    Web    at
       http://www.iss.net/wireless
     * It     will    be    regularly    posted    to    issfo...@iss.net
       (http://www.iss.net/maillists).

     * It will be posted to the following Usenet newsgroups:
     * comp.security.misc,comp.security.firewalls,comp.security.unix,
     * comp.std.wireless,comp.dcom.sys.cisco,comp.dcom.sys.nortel,
     * comp.dcom.telecom

          [1] What is the overview of Wireless LAN 802.11 technology?

   Wireless LAN technology standard 802.11b has the strongest momentum to
   becoming  the  main  standard  for  corporate  internal  wireless  LAN
   networks. The bandwidth of 802.11b is 11 mbits and operates at 2.4 GHz
   Frequency.  The  successor of this current 802.11b standard is 802.11a
   and  it  is  designed  to  be  faster speed and operate at a different
   frequency.  While  802.11a  standard  and the technology behind it has
   become  available,  802.11b  is  still  widely  used  today  and  many
   companies  and  individuals are deploying it or deploying dual 802.11b
   and 802.11a devices.

   As   more  wireless  technology  is  developed  and  implemented,  the
   complexity of the types of attacks will increase, but these appear the
   standard main methods used to break and attack wireless systems. These
   attacks  may  be very similar against other wireless type technologies
   and  is not unique to 802.11b. By understanding these risks and how to
   develop   security   solution   for  802.11b,  this  will  be  a  good
   stepping-stone  for  providing  a good secure solution to any wireless
   solution.

[1.1] When will 802.11a arrive and how will the security be different than
802.11b?

   Most manufacturers of wireless technologies have come out with 802.11a
   technology  now.  The  specifications for the protocols of 802.11a are
   very  similar  to  802.11b,  therefore  many of the security risks are
   shared  for  both  802.11a  and  802.11b.  Many of the security issues
   around 802.11b will continue to be an issue with 802.11a, therefore by
   understanding  current issues will help organizations deal with future
   issues as well.

[1.2] What is an Access Point?

   The  AP  (access  point  also known as a base station) is the wireless
   server  that  connects  clients to the internal network. Base stations
   typically  act as a bridge for the clients. There is an IP address for
   management  configuration  of  the  base  station.  The  base stations
   typically have an SNMP agent for remote management.

[1.3] How much does the equipment for wireless 802.11b cost?

   Base  stations have become relatively inexpensive, approximately under
   $300US.  The  802.11  client cards for PDAs, laptops, and desktops are
   approximately  under  $100US.  Because of inexpensive equipment to get
   into wireless, attackers can get easy access to the tools necessary to
   apply  the  attack.  Because  of  the  inexpensive  price, within many
   companies  employees  can purchase wireless equipment without approval
   and deploy this in a rogue fashion, creating additional risk.

[1.4] Are companies the only wireless targets by attackers?

   While  this  FAQ  focuses  on the risk issues from a corporate network
   perspective,   these   same   issues   apply   to  home  networks  and
   telecommuters  that  are using wireless. As the corporate networks are
   allowing  in remote users, these remote users may be using wireless at
   their  end-point  to  connect  in.  In  this  case,  even  if wireless
   capabilities  have  not  been installed on the corporate network, they
   may  still  be  affected  by  the risk that their remote employees are
   using wireless at home or on the road.

[1.5] Where can you find wireless 802.11 networks?

   Airports,  hotels,  and even coffee shops like Starbucks are deploying
   802.11  networks  so  people  can  wirelessly browse the Internet with
   their  laptops.  As these types of networks increase, this will create
...

read more »

 
 
 

WLAN 802.11b Security FAQ

Post by Christopher Klau » Wed, 01 Jan 2003 00:11:32


Wireless LAN Security FAQ

By  Christopher  W.  Klaus  of Internet Security Systems (ISS). Please
send corrections, additions, and new questions to cwkpub...@iss.net.

Version 1.6 - Last Updated September 30th 2002
     _________________________________________________________________

                                   Contents

     * [0]  Where  do  I  get  the  latest  version  of this Wireless LAN
       Security FAQ?
     * [1] What is the overview of Wireless LAN 802.11 technology?
          + [1.1]  When  will 802.11a arrive and how will the security be
            different than 802.11b?
          + [1.2] What is an Access Point?
          + [1.3] How much does the equipment for wireless 802.11b cost?
          + [1.4] Are companies the only wireless targets by attackers?
          + [1.5] Where can you find wireless 802.11 networks?
          + [1.6] How does the antenna affect wireless LAN security?
               o [1.6.1] How do I build a cheap and effective antenna?
          + [1.7]  Can  you spot a laptop with wireless 802.11 capability
            by looking for the antenna?
     * [2] What are the major security risks to 802.11b?
          + [2.1] What are Insertion Attacks?
               o [2.1.1]Plug-in Unauthorized Clients
               o [2.1.2]Plug-In Unauthorized Renegade Base Stations
          + [2.2]  What  are Interception and monitoring wireless traffic
            attacks?
               o [2.2.1] Wireless Sniffer
               o [2.2.2] Hijacking the session
               o [2.2.3] Broadcast Monitoring
               o [2.2.4] ArpSpoof Monitoring and Hijacking
                    # [2.2.4.1]  Hijacking  SSL (Secure Socket Layer) and
                      SSH (Secure Shell) connections
               o [2.2.5] BaseStation Clone (Evil Twin) intercept traffic
          + [2.3] What are AP and Client Misconfigurations?
               o [2.3.1] Server Set ID (SSID)
                    # [2.3.1.1] What are the default SSID's?
               o [2.3.2] What is Secure Access Mode?
               o [2.3.3] Bruteforce Base Station SSID
               o [2.3.4] Can the SSID be encrypted?
               o [2.3.5]  By  turning  off  the  broadcast  of  SSID, can
                 someone still sniff the SSID?
               o [2.3.6] Wired Equivalent Privacy (WEP)
                    # [2.3.6.1] Attacks against WEP
                    # [2.3.6.2] Default WEP Keys
                    # [2.3.6.3] How Large is WEP Keys
               o [2.3.7] SNMP community words
                    # [2.3.7.1] SNMP Vulnerabilities
               o [2.3.8] Configuration Interfaces
               o [2.3.9] Client side security risk
               o [2.3.10] Installation Risk
          + [2.4] What is Jamming?
               o [2.4.1] 2.4 GHz Interfering Technology
          + [2.5] What are Client to Client Attacks?
               o [2.5.1] Filesharing and other TCP/IP service attacks
               o [2.5.2] DOS (Denial of Service)
               o [2.5.3] Hybrid Threats
          + [2.6] War Driving Access Point Maps
          + [2.7] Parasitic Grids
     * [3] What are solutions to minimizing WLAN security risk?
          + [3.1] Wireless Security Policy and Architecture Design
               o [3.1.1] Basic Field Coverage
          + [3.2] Treat BaseStations as Untrusted
          + [3.3] Base Station Configuration Policy
               o [3.3.1] 802.1X Security
          + [3.4] Base Station Discovery
               o [3.4.1] Honeypots - FakeAP
          + [3.5] Base Station Security Assessments
          + [3.6] Wireless Client Protection
     * [4] Who is making 802.11 Security Solutions?
          + [4.1] 802.11 Gateway Infrastructure
          + [4.2] 802.11 Security Analysis Tools
     * [5] About Internet Security System's Wireless 802.11b Solution
     * [6] Acknowledgements
     _________________________________________________________________

Recent Updates

   Version 1.6
     * Added new war driving maps.
     * Updated 802.11a as being now available.
     * Added how large is WEP key information.
     * Added acknowledgements section
     * Added Honeypots - FakeAP
     * Add basic field coverage strategy

   Version 1.5
     * Added all of Netgear's default WEP keys.
     * Added Pringles Can and Waveguide Antenna Info.
     * Added hybrid threats, next-gen virus/worm spread by wireless.
     * Added Parasitic Grids. Free anonymous access for intruders.
     * Added SNMP vulnerabilities.
     * Added 802.1X Security, and its flaws.
     * Added MiniStumbler, Wireless Scanner, BlackICE PC Protection.
     * Added info on Broadcast pings.

   Version 1.3
     * Added Section 1.7 regarding internal antenna.
     * Added  link to Cigital regarding ArpSpoofing. Cigital put together
       a nice diagram of the attack.
     * Added Default WEP key for NetGear AP.
     * Added link to BSD version of AirSnort.

   Version 1.2
     * Added where this WLAN Security FAQ can be found.
     * Cleaned up the formatting
     * Added better indexing, added hyperlinks between index and content
     * Added link to article on wireless LAN antennas

   Version 1.1
     * Added NetStumbler, WEPCrack tools, Added WEP insecurity paper
     * Added Ecutel, BlueSocket, and NetMotion as WLAN Sec. Products
     * Updated  Accuracy  of  WEP description and made it clear that SSID
       not being encrypted.
     * Added Broadcast of SSID turned off can still be circumvented.
     * Added Addtron's default SSID, a popular AP
     * Added War Driving AP maps.
     * Added 802.11 ArpSpoof, a technique used by ISS X-Force Consulting.
     * Added hijacking SSH and SSL connections via wireless.
     * Added 2 X-Force Advisories on Wireless 802.11 flaws

   Version 1.0
     * First draft
     _________________________________________________________________

   [0] Where do I get the latest version of this Wireless LAN Security FAQ?

     * The     most    current    version    is    on    the    Web    at
       http://www.iss.net/wireless
     * It     will    be    regularly    posted    to    issfo...@iss.net
       (http://www.iss.net/maillists).

     * It will be posted to the following Usenet newsgroups:
     * comp.security.misc,comp.security.firewalls,comp.security.unix,
     * comp.std.wireless,comp.dcom.sys.cisco,comp.dcom.sys.nortel,
     * comp.dcom.telecom

          [1] What is the overview of Wireless LAN 802.11 technology?

   Wireless LAN technology standard 802.11b has the strongest momentum to
   becoming  the  main  standard  for  corporate  internal  wireless  LAN
   networks. The bandwidth of 802.11b is 11 mbits and operates at 2.4 GHz
   Frequency.  The  successor of this current 802.11b standard is 802.11a
   and  it  is  designed  to  be  faster speed and operate at a different
   frequency.  While  802.11a  standard  and the technology behind it has
   become  available,  802.11b  is  still  widely  used  today  and  many
   companies  and  individuals are deploying it or deploying dual 802.11b
   and 802.11a devices.

   As   more  wireless  technology  is  developed  and  implemented,  the
   complexity of the types of attacks will increase, but these appear the
   standard main methods used to break and attack wireless systems. These
   attacks  may  be very similar against other wireless type technologies
   and  is not unique to 802.11b. By understanding these risks and how to
   develop   security   solution   for  802.11b,  this  will  be  a  good
   stepping-stone  for  providing  a good secure solution to any wireless
   solution.

[1.1] When will 802.11a arrive and how will the security be different than
802.11b?

   Most manufacturers of wireless technologies have come out with 802.11a
   technology  now.  The  specifications for the protocols of 802.11a are
   very  similar  to  802.11b,  therefore  many of the security risks are
   shared  for  both  802.11a  and  802.11b.  Many of the security issues
   around 802.11b will continue to be an issue with 802.11a, therefore by
   understanding  current issues will help organizations deal with future
   issues as well.

[1.2] What is an Access Point?

   The  AP  (access  point  also known as a base station) is the wireless
   server  that  connects  clients to the internal network. Base stations
   typically  act as a bridge for the clients. There is an IP address for
   management  configuration  of  the  base  station.  The  base stations
   typically have an SNMP agent for remote management.

[1.3] How much does the equipment for wireless 802.11b cost?

   Base  stations have become relatively inexpensive, approximately under
   $300US.  The  802.11  client cards for PDAs, laptops, and desktops are
   approximately  under  $100US.  Because of inexpensive equipment to get
   into wireless, attackers can get easy access to the tools necessary to
   apply  the  attack.  Because  of  the  inexpensive  price, within many
   companies  employees  can purchase wireless equipment without approval
   and deploy this in a rogue fashion, creating additional risk.

[1.4] Are companies the only wireless targets by attackers?

   While  this  FAQ  focuses  on the risk issues from a corporate network
   perspective,   these   same   issues   apply   to  home  networks  and
   telecommuters  that  are using wireless. As the corporate networks are
   allowing  in remote users, these remote users may be using wireless at
   their  end-point  to  connect  in.  In  this  case,  even  if wireless
   capabilities  have  not  been installed on the corporate network, they
   may  still  be  affected  by  the risk that their remote employees are
   using wireless at home or on the road.

[1.5] Where can you find wireless 802.11 networks?

   Airports,  hotels,  and even coffee shops like Starbucks are deploying
   802.11  networks  so  people  can  wirelessly browse the Internet with
   their  laptops.  As these types of networks increase, this will create
...

read more »