Your Ad Here Your Ad Here
Results 1 to 5 of 5

Thread: The six dumbest ways to secure a wireless LAN

  1. #1
    Yoga's Avatar \ ( ^ 0 ^ ) / BT Rep: +8BT Rep +8
    Join Date
    May 2005
    Location
    In my yellow submarine
    Posts
    426
    An old but interesting article, I was just wondering what you guys think


    For the last three years, I've been meaning to put to rest once and for all the urban legends and myths on wireless LAN security...Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. To help you avoid the these schemes, I've created the following list of the six dumbest ways to secure your wireless LAN.

    Wireless LAN security hall of shame

    MAC filtering: This is like handing a security guard a pad of paper with a list of names. Then when someone comes up to the door and wants entry, the security guard looks at the person's name tag and compares it to his list of names and determines whether to open the door or not. Do you see a problem here? All someone needs to do is watch an authorized person go in and forge a name tag with that person's name. The comparison to a wireless LAN here is that the name tag is the MAC address. The MAC address is just a 12 digit long HEX number that can be viewed in clear text with a sniffer. A sniffer to a hacker is like a hammer to a carpenter except the sniffer is free. Once the MAC address is seen in the clear, it takes about 10 seconds to cut-paste a legitimate MAC address in to the wireless Ethernet adapter settings and the whole scheme is defeated. MAC filtering is absolutely worthless since it is one of the easiest schemes to attack. The shocking thing is that so many large organizations still waste the time to implement these things. The bottom line is, MAC filtering takes the most effort to manage with zero ROI (return on investment) in terms of security gain.

    SSID hiding: There is no such thing as "SSID hiding". You're only hiding SSID beaconing on the Access Point. There are 4 other mechanisms that also broadcast the SSID over the 2.4 or 5 GHz spectrum. The 4 mechanisms are; probe requests, probe responses, association requests, and re-association requests. Essentially, youre talking about hiding 1 of 5 SSID broadcast mechanisms. Nothing is hidden and all youve achieved is cause problems for Wi-Fi roaming when a client jumps from AP to AP. Hidden SSIDs also makes wireless LANs less user friendly. You dont need to take my word for it. Just ask Robert Moskowitz who is the Senior Technical Director of ICSA Labs in his white paper Debunking the myth of SSID hiding.

    LEAP authentication: The use of Cisco LEAP authentication continues to be the single biggest mistake that corporations make with their wireless LAN because they leave themselves wide open to attack. Cisco still tells their customers that LEAP is fine so long as strong passwords are used. The problem is that strong passwords are an impossibility for humans to deal with. If you doubt this, try a password audit of all the users in your organization and see how long it takes to crack 99% of all passwords. 99% of organizations will flunk any password audit for most of their users within hours. Any attempt to enforce strong passwords will result in passwords written on sticky notes. Since Joshua Wright released a toolthat can crackLEAP with lighting speed, Cisco was forced to come out with a better alternative to LEAP and they came up with an upgradeto LEAP calledEAP-FAST. Unfortunately, EAP-FAST still falls short in security with its default installation. Although Cisco makes LEAP and EAP-FAST freely available to partners for the client end, the same is not true for Access Points.LEAP and EAP-FAST are essentially two proprietary protocolsthat Cisco employs as a strategy to monopolize the Access Point market. There are open standards based EAP mechanisms like EAP-TLS, EAP-TTLS, and PEAP which are all much more secure than either LEAP or EAP-FAST and they work on all Access Points and client adapters, not just Cisco. Cisco does support open standard EAPs just like everyone else so you should always use open EAP standards to get better security and avoid the hardware lock-in.

    Disable DHCP: This is much more of waste of time than it is a security break. DHCP allows the automatic assignment of IP addresses and other configurations. Disabling DHCP has zero security value and just wastes time. It would take a hacker about 10 seconds to figure out the IP scheme of any network and simply assign their own IP address. Anyone who tells you that this is a way to secure your wireless LAN doesn't know what they're talking about.

    Antenna placement: I've heard the craziest thing from so called security experts that actually tell people to only put their Access Points in the center of their building and put them at minimal power. Antenna placement does nothing to deter hackers. Remember, the hacker will always have a bigger antenna than you which can home in on you from a mile away. Making a wireless LAN so weak only serves to make the wireless LAN useless. Antenna placement and power output should be designed for maximum coverage and minimum interference. It should never be used as a security mechanism.

    Just use 802.11a or Bluetooth: Fortunately, I haven't heard this one for a while. There were so called security experts that went around telling people that they simply needed to switch to 802.11a or Bluetooth to secure their wireless LAN. 802.11a refers to a physical transport mechanism of wireless LAN signals over the air, it does not refer to a security mechanism in any way.

    Dishonorable mention: Some of you might be wondering why I didn't put WEP in as one of the six dumbest ways to secure a wireless LAN. In light of recent developments within the last 6 months, it takes only a few minutes to break a WEP based network which makes WEPcompletely ineffective and a good potential future candidate for the wireless LAN security hall of shame. Where it currently fails to be in the hall of shame is that it still holds up for a few minutes, requires a little skill to launch the packet injection attacks, and isn't propagated as an urban legend for a secure wireless LAN. The top six require no skills, takes less than a minute to crack, and are propagated asurban legend. However, that doesn't mean you should use WEP in any form or shape.

    This blog wasn't just meant to be funny, it's serious business that so many organizations waste their time and money on worthless security schemes that give them a dangerous false sense of security. If you fall in to any of these six categories, it's time to wake up and implement some real wireless LAN security. For those interestested in some simple advice for their homes and small offices, check out my last blog.

    http://blogs.zdnet.com/Ou/index.php?p=43

  2. Software & Hardware   -   #2
    Seedler's Avatar T__________________T
    Join Date
    Oct 2005
    Location
    Canada
    Posts
    4,644
    : borly? you can crack a WEP in a few minutes??

    How? I gotta know. I've a 82% signal from my neighbor with WEP. Imagine the sweet BT speeds I'll get from that.
    Biostar XE T5
    i5-750 @ 4.0 GHZ stable (CM Hyper 212)
    2 x 2GB Cosair XMS3 DDR3 1600MHZ
    Radeon 5850 @ 866/1254MHZ
    Intel X25-M in RAID 0
    WD Caviar Black 2TB in RAID 0
    3 x Asus 25.5" VW266H LCD [Eyefinity]

  3. Software & Hardware   -   #3
    fkdup74's Avatar Pneuberator.
    Join Date
    Sep 2003
    Posts
    3,616
    Quote Originally Posted by Seedler
    : borly? you can crack a WEP in a few minutes??

    How? I gotta know. I've a 82% signal from my neighbor with WEP. Imagine the sweet BT speeds I'll get from that.
    go subscribe to an ISP you leeching douchebag

    besides, if your adapter is connected to a WEP encrypted AP, then it has the key already
    I am just a worthless liar. I am just an imbecile.
    I will only complicate you. Trust in me and fall as well.
    I will find a center in you. I will chew it up and leave.
    I will work to elevate you just enough to bring you down.

  4. Software & Hardware   -   #4
    maebach's Avatar Team FST Captain
    Join Date
    May 2005
    Location
    burlington, Ontario
    Posts
    5,341
    IF wEP sucks, whats a better way to encrypt

  5. Software & Hardware   -   #5
    Yoga's Avatar \ ( ^ 0 ^ ) / BT Rep: +8BT Rep +8
    Join Date
    May 2005
    Location
    In my yellow submarine
    Posts
    426
    wpa

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •