Download Chapter 4

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Cyberwarfare wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cross-site scripting wikipedia , lookup

Unix security wikipedia , lookup

Denial-of-service attack wikipedia , lookup

Malware wikipedia , lookup

Cyberattack wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Password strength wikipedia , lookup

Computer security wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime wikipedia , lookup

Wireless security wikipedia , lookup

Mobile security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
ITSY 2417 – Wireless Security Development
Chapter 4
Active Wireless Attacks
Outline

Overview

Objectives

Tech Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms

Technical Notes for Hands-On Projects
4-1
ITSY 2417 – Wireless Security Development
4-2
Notes
Overview
Chapter 4 explains active wireless attacks. You will learn the basic vulnerabilities of a
WLAN. Next, You will learn how malware and spyware can infect wireless networks.
Chapter 4 also lists the vulnerabilities involved with implementing unsecured wireless
LANs. Finally, You will review the different types of wireless infrastructure attacks.
Objectives




Describe the basic vulnerabilities of a WLAN
Tell how malware and spyware can infect wireless networks
List the vulnerabilities involved with implementing unsecured wireless LANs
Explain the different types of wireless infrastructure attacks
Tech Tips
Security Vulnerability
1. Security Vulnerability is a weakness or flaw in an information system that could be
exploited to cause harm. Security vulnerability describes the points of risk regarding the
penetration of a security defense.
2. Describe the basic security vulnerability categories, including:
a. Basic vulnerabilities
b. Vulnerabilities when using a public-access WLAN
c. Vulnerabilities associated with implementing an unsecured wireless network
Basic Vulnerabilities
1. Authentication is the process of asking users to prove that they are who they claim to be
based on what they have, know, or are.
2. A password is a secret combination of letters and numbers that serves to validate or
authenticate a user by what he knows. Passwords are used with user names to log on to
a computer.
3. Describe the problems of using default passwords to protect network equipments as
explained in this section.
Tech
Tip
Read more about passwords at: http://en.wikipedia.org/wiki/Password.
ITSY 2417 – Wireless Security Development
4-3
4. Passwords should never be written down but instead must be committed to memory.
Passwords must also be of a sufficient length and complexity. This creates the following
password paradox: although lengthy and complex passwords should be used and never
written down, it is very difficult to memorize these types of passwords.
5. Describe the characteristics of weak passwords, including:
a. A common word used as a password
b. Not changing passwords unless forced to do so
c. Passwords that are short
d. Personal information in a password
e. Using the same password for all accounts
f. Writing the password down
6. Weak passwords can be exploited using password guessing attacks, such as brute force
or dictionary attacks.
Tech
Tip
Read more about dictionary attacks at:
http://en.wikipedia.org/wiki/Dictionary_attack.
7. Describe the minimum criteria for creating good passwords, including:
a. Password must be at least eight characters long
b. Password contains characters from at least three of the following five categories:
 English uppercase characters (A–Z)
 English lowercase characters (a–z)
 Base 10 digits (0–9)
 Non-alphanumeric (For example: !, $, #, or %)
 Extended ASCII characters
c. Password does not contain three or more characters from the user’s account
name
8. Explain some additional settings for creating good passwords, including:
a. Enforce password history
b. Maximum password age
c. Minimum password age
d. Minimum password length
9. Use Table 4-1 to show some of the most common password settings for wireless
equipment.
10. Describe the use of community strings in SNMP as explained in this section. There are
two types of community strings: read-only strings allow information from the agent to
be viewed, and read-write strings allow settings to be changed.
11. Describe the Vulnerabilities introduced by using SNMP community strings, including:
a. Default SNMP community strings for read-only and read-write were public and
private
ITSY 2417 – Wireless Security Development
4-4
b. Administrators used weak strings
c. Community strings are transmitted in cleartext
Tech
Tip
For more information about the security vulnerabilities of SNMP, visit:
www.cert.org/tech_tips/snmp_faq.html.
12. An improper device configuration can often result in easy access to a system.
13. Universal Plug and Play (UPnP) allows devices on a network to discover other devices
and determine how to work with them. Use Table 4-2 to show Windows operating
systems support.
14. Describe some of the vulnerabilities related to UPnP, including:
a. Can enable an attacker to gain complete control over an affected device
b. Can enable an attacker to prevent an affected system from performing its
intended service
15. Remote access allows for the wireless gateway to be configured remotely over the
Internet. It also allows an attacker to attempt to break into the wireless gateway or
access point since a wireless gateway will permit an unlimited number of attempts to
break the password.
16. Use Figure 4-2 to show how to configure UPnP and remote access in a Linksys WRT54G access point.
Tech
Tip
For more information about UPnP, visit: www.upnp.org/.
Vulnerabilities Associated with Using Public WLANs
1. Malware is computer programs designed to break into and create havoc on portable or
desktop computers. The most common types of malware are viruses, worms, and logic
bombs.
Tech
Tip
Read more about malware at: http://en.wikipedia.org/wiki/Malware.
2. A virus is a program that secretly attaches itself to another document or program and
executes when that document or program is opened. On average, one new virus is
written and released every hour.
3. Describe some of the actions performed by viruses, besides showing annoying messages
like the one in Figure 4-3, including:
a. Cause a computer to repeatedly crash
b. Erase files from a hard drive
ITSY 2417 – Wireless Security Development
4-5
c. Install hidden programs, such as stolen (“pirated”) software, which is then
secretly distributed or even sold from the computer
d. Make multiple copies of itself and consume all of the free space in a hard drive
e. Reduce security settings and allow intruders to remotely access the computer
f. Reformat the hard disk drive
4. Various symptoms that indicate a virus has infected a computer are:
a. A program suddenly disappears from the computer
b. New icons appear on the screen
c. New programs do not install properly
d. Out-of-memory error messages appear
e. Programs stop responding
f. The computer sometimes starts normally, but at other times it stops responding
before it finishes loading
g. Unusual dialog boxes or message boxes appear
h. Sounds or music play from the speakers unexpectedly
i. The computer runs very slowly and takes a long time to start
j. There is a significant amount of modem activity
k. The computer restarts unexpectedly
l. Error messages appear listing “critical system files” that are missing and the
operating system refuses to load
5. A worm is similar to a virus, but differs in the following two aspects:
a. Can travel by itself
b. Does not always require action by the computer user to begin its execution
Tech
Tip
Read more about viruses and worms at:
http://en.wikipedia.org/wiki/Computer_virus.
6. A logic bomb is a computer program that lies dormant until it is triggered by a specific
logical event. Once triggered, the program can perform any number of malicious
activities. Logic bombs are extremely difficult to detect before they are triggered since
they are often embedded in large computer programs.
7. Spyware is a general term used to refer to software that violates a user’s personal
security and impairs a user’s control over the use of system resources. Describe some of
the functions performed by spyware, including:
a. Advertising
b. Collecting personal information
c. Changing computer configurations
8. Beyond being a nuisance to computer users, spyware is a tool attackers employ to
gather personal information about users. After attackers have obtained this personal
information, they can perform identity theft.
9. Explain that identity theft occurs when an individual uses the personal information of
someone else.
ITSY 2417 – Wireless Security Development
4-6
10. Adware is software that delivers advertising content in a manner or context that is
unexpected and unwanted by the user. Adware can also be a security risk because
adware programs perform a tracking function.
Tech
Tip
Learn more about spyware at: http://en.wikipedia.org/wiki/Spyware.
Quick Quiz 1
1. A(n) ____________________ is a secret combination of letters and numbers that serves
to validate or authenticate a user by what he knows.
Answer: password
2. ____________________ are devices that combine access point, router, and network
address translation features.
Answer: Wireless gateways
3. A(n) ____________________ is a computer program that lies dormant until it is
triggered by a specific logical event.
Answer: logic bomb
4. ____________________ is software that delivers advertising content in a manner or
context that is unexpected and unwanted by the user.
Answer: Adware
Vulnerabilities Associated with Implemented Unsecured WLANs
1. Explain how an unsecured WLAN can lead to information theft problems. Emphasize
the point that after breaking into an unsecured WLAN, an attacker can gain access to
any folder set with file sharing enabled.
2. Describe how an attacker can exploit an unsecured WLAN and set up storage space on
a file server or a home computer and fill it with illegal content. An attacker can also set
up a Web site to promote this information.
3. Spam is unsolicited e-mail messages. Emphasize the point that approximately half of
the number of e-mail messages is considered spam.
4. Describe how spammers often build their own lists of e-mail addresses using special
software that rapidly generates millions of random e-mail addresses from well-known
ISPs. Spammers often swap or buy lists of valid e-mail addresses from other spammers
as well.
5. Spam is a lucrative business. Spam may also be dangerous and entitled to legal charges.
Use Table 4-3 to summarize CAN-SPAM law.
ITSY 2417 – Wireless Security Development
Tech
Tip
4-7
Read more about SPAM at:
http://en.wikipedia.org/wiki/Spam_%28electronic%29.
Wireless Infrastructure Attacks
1. This section describes the following two types of attacks to wireless infrastructures:
a. Direct attacks
b. Denial-of-service attacks
Direct Attacks Through Rogue Access Points
1. A rogue access point is an AP installed by an employee without the approval or
supervision of the IT staff. A rogue access point bypasses all of the network security
and opens the entire network and all users to direct attacks.
2. A rogue AP is behind the company’s firewall, opening a clear way to perform peer-topeer attacks. Use Figure 4-4 to illustrate your explanation.
Denial-of-Service Attacks (DoS)
1. A denial-of-service (DoS) attack is designed to prevent a device from performing its
intended function. DoS attacks are common against wired network servers.
2. Use Figure 4-5 to describe how to perform a SYN flood attack.
3. Wireless DoS attacks are designed to deny wireless devices access to the access point
itself. There are two categories of attacks:
a. Physical layer attacks
b. MAC layer attacks
4. Physical layer attacks flood the RF spectrum with enough radiomagnetic interference to
prevent a device from effectively communicating with the AP. Use Figure 4-6 to
illustrate your explanation.
5. Physical layer attacks are generally rare because sophisticated and expensive equipment
is necessary. It is also possible to identify the location of the transmitter.
6. Describe some of the devices that also use the ISM band and can cause interference to
WLAN devices, including:
a. Cordless telephones
b. Microwave ovens
c. Baby monitors
d. Bluetooth personal area network devices
7. MAC layer attacks exploit the way the wireless medium is shared among all devices.
ITSY 2417 – Wireless Security Development
4-8
8. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) attempts to
prevent multiple wireless devices from transmitting at the same time. CSMA/CA uses
slot times and explicit frame acknowledgement. Use Figure 4-7 to describe how
CSMA/CA works.
9. Use Figure 4-8 to describe how an attacker who has already become associated with the
WLAN can download an extremely large file, effectively “tying up” the network.
10. Another type of MAC layer attack consists of using a packet generator to create fake
packets and flood the wireless network. Use Figure 4-9 to illustrate your explanation.
11. Use Figure 4-10 to explain how an attacker can use disassociation frames to perform a
MAC layer wireless DoS attack.
Quick Quiz 2
1. Once an attacker’s wireless device has entered the network and focused its attacks at
other similar devices, this is known as a(n) ____________________ attack.
Answer: peer-to-peer
2. A(n) ____________________ attack is designed to prevent a device from performing
its intended function.
Answer: denial-of-service (DoS)
denial-of-service (DoS)
DoS
3. With wireless CSMA/CA, the amount of time that a device must wait after the medium
is clear is called the ____________________.
Answer: slot time
4. A(n) ____________________ program creates fake packets that flood the wireless
network.
Answer: packet generator
Class Discussion Topics
1. What are the minimum criteria for creating good passwords?
2. What is a denial-of-service (DoS) attack?
ITSY 2417 – Wireless Security Development
4-9
Additional Resources
1. List of Default Passwords for Network Equipment by Vendors:
www.vulnerabilityassessment.co.uk/passwordsL.htm
2. Dictionary Attack:
www.webopedia.com/TERM/D/dictionary_attack.html
3. CERT® Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations of
the Simple Network Management Protocol (SNMP) :
www.cert.org/advisories/CA-2002-03.html
4. Universal Plug and Play (UPnP):
http://en.wikipedia.org/wiki/UPNP
5. Logic Bomb:
http://en.wikipedia.org/wiki/Logic_bomb
6. Adware:
http://en.wikipedia.org/wiki/Adware
7. CAN-SPAM Act of 2003:
http://en.wikipedia.org/wiki/Can_Spam_Act_of_2003
8. CAN-SPAM:
www.fcc.gov/cgb/consumerfacts/canspam.html
Technical Notes for Hands-On Projects
Project 4-1: This project requires a Web browser and an Internet connection.
Project 4-2: This project requires a Web browser and an Internet connection.
Project 4-3: This project requires a Linksys wireless gateway.
Project 4-4: This project requires a Web browser, an Internet connection, and any antivirus
software.
Project 4-5: This project requires a Web browser, an Internet connection, and Microsoft Word.
ITSY 2417 – Wireless Security Development
4-10
Key Terms
 adware — A software program that delivers advertising content in a manner or context
that is unexpected and unwanted by the user.
 authentication — The process of providing proof that a user is “genuine” or authentic.
 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) — A
procedure used by IEEE WLANs to prevent multiple wireless devices from transmitting
at the same time.
 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003
 (CAN-SPAM) — A U.S. law passed in 2003 to limit the effect of spam.
 default password — A standard password that is configured on all equipment.
 denial-of-service (DoS) — An attack designed to prevent a device from performing its
intended function.
 frame acknowledgment — A method in which CSMA/CA reduces collisions using
explicit acknowledgment.
 identity theft — The theft of an individual’s personal information to impersonate that
individual with the intent to commit fraud or other crimes.
 logic bomb — A computer program that lies dormant until it is triggered by a specific
logical event.
 packet generator — A program that creates fake packets that flood the wireless
network.
 password — A secret combination of letters and numbers that serves to validate or
authenticate a user by what the user knows.
 password guessing — A technique used by attackers to exploit weak passwords.
 password paradox — The paradox of needing lengthy and complex passwords, yet
such passwords are difficult to memorize.
 peer-to-peer attack — Attacks directed at other similar devices.
 Plug and Play (PnP) — A service that allows the Windows operating system to
automatically detect new hardware when it is installed on a computer.
 security vulnerability — A weakness or flaw in an information system that could be
exploited to cause harm.
 slot time — The amount of time that a device must wait after the medium is clear.
 spam — Unsolicited e-mail.
 spyware — A general term used to describe software that violates a user’s personal
security.
 Universal Plug and Play (UPnP) — A service that allows devices on a network to
discover other devices and determine how to work with them.
 virus — A program that secretly attaches itself to another document or program and
executes when that document or program is opened.
 weak passwords — Passwords that compromise security.
 wireless gateways — Devices that combine an access point, router, and network
address translation features.
 worm — A malicious program that does not attach to a document to spread, but can
travel by itself.