20131204 wireless sec

13
Wireless Security in the cruel world Kitisak Jirawannakool E-Government Agency (Public Organization) [email protected] 1 Agenda About EGA and myself Wireless technology Threats Protections 2 Agreement Turn off your mobile phone or keep silent Stop me anytime, if you want to ask or share something Relax and feel free to discuss Keep in touch and keep sharing after class Be Aware, but Do not Panic 3 Contact me Name : Kitisak Jirawannakool Facebook : http://www.facebook.com/kitisak.note Email : [email protected] Weblog : http://foh9.blogspot.com Twitter : @kitisak 4

description

 

Transcript of 20131204 wireless sec

Page 1: 20131204 wireless sec

!!

Wireless Security in the cruel world

Kitisak Jirawannakool E-Government Agency (Public Organization)

!

[email protected]

!1 !!

Agenda❖ About EGA and myself ❖ Wireless technology ❖ Threats ❖ Protections

!2

!!

Agreement❖ Turn off your mobile phone or keep silent ❖ Stop me anytime, if you want to ask or share

something ❖ Relax and feel free to discuss ❖ Keep in touch and keep sharing after class

!

❖ Be Aware, but Do not Panic

!3 !!

Contact me

Name : Kitisak Jirawannakool !

Facebook : http://www.facebook.com/kitisak.note !

Email : [email protected] !

Weblog : http://foh9.blogspot.com !!

Twitter : @kitisak

!4

Page 2: 20131204 wireless sec

!!

About me

❖ Education ❖ Bachelor : Comp. Eng. KKU ❖ Master : Comp. Sci. CU

❖ Certification and Award ❖ COMTIA Security+ ❖ Asia Pacific Information Security Leader Achievements

2011 (ISLA) by (ISC)2

❖ Membership ❖ APWG, ShadowServer, OWASP, MSCP, CSA Thailand

Chapter, MedSec

!5 !!

About me (Experience)❖ Almost 11 years in IT Security at NECTEC

❖ Incidents response ❖ Research ❖ Speaker and writer ❖ …

❖ Working as a Security Specialist at EGA ❖ Looking for our collaborations

❖ OWASP Thailand Chapter Leader

!6

!!

About EGA❖ First established in 1997 as Government

Information Technology Services (GITS) ❖ ~ 190 staffs ❖ Services

❖ Government Information Network (GIN) ❖ Government Cloud Services (G-Cloud) ❖ MailgoThai service ❖ e-Gov portal ❖ e-CMS 2.0

❖ More details : http://www.ega.or.th

!7 !!

E-Government services

!824x7 Helpdesk and Contact CenterEGA Contact

Other Government’s services

ServicesGovernment Security Monitoring (GovMon)

Incident

Informati

Response

Risk Cloud

Cloud

Cloud Inter SaaS PaaS IaaS

Government GINGovernment

Page 3: 20131204 wireless sec

!!

Situation is changing

!9 !!

Important points

!10

Incident ResponseTechnical Training

CollaborationAwareness Training

!!

❖ C (Confidentiality) ❖ I (Integrity) ❖ A (Availability)

!11

What is Security?

!

Wireless Technology - Big picture

!12

Internet Backbone

2G,3G Cellular Network • GSM, GPRS, WCDMA, cdma2000

Wireless Personal Area Network (WPAN) • Bluetooth, Zigbee

Wireless Local Area Network (WLAN) • Wi-Fi

Wireless Metropolitan Area Network (WMAN) • WiMAX

Satellite Network

Page 4: 20131204 wireless sec

!!

Connection technology❖ 3G, 4G or EDGE ❖ Wifi, WiMax ❖ NFC - Near Field Communication ❖ DLNA - Digital Living Network Alliance ❖ Bluetooth

!13 !!

NFC

!14

!!

DLNA

!15 !!

Mobile devices

!16

Page 5: 20131204 wireless sec

!!

Simple Questions❖ Do you Lock your mobile device? ❖ Do you have Anti-malware installed? ❖ How many Apps in your device? ❖ Are them all Trustworthy? ❖ Have you ROOTED/Jail-broken your device?

!17 !!

Recent mobile devices❖ Truly handheld computer ❖ Connectivity everywhere ❖ Apps for everything ❖ Cheap

!18

!!

Mobile and Smart devices❖ Laptop/Notebook ❖ Mobile phone ❖ Tablet ❖ Other

❖ Smart, Android and Apple TV ❖ GPS ❖ Cars ❖ Game consoles ❖ Medical devices

!19 !!

Smart phone activities in Thailand

!20

https://www.facebook.com/imcinstitute

Page 6: 20131204 wireless sec

!! !21 !!

The Common Fails!❖ Lost ❖ Stolen ❖ Free WiFi lovers ❖ Lots of apps (Trusted/Untrusted) ❖ No passcode protected ❖ Location services ❖ Left unattended ❖ Just click ❖ Full time WiFi on and with “Auto connect”

!22

!

Simple Questions (2)❖ Do you surf the internet via public wifi? ❖ Have you removed SSID from your list? ❖ Have you ever transferred money online by using

public wifi?

!23 !!

Threat Examples❖ WiFi attacks

❖ War Driving and WiFi Sniffing ❖ Rouge Access points ❖ Man in the Middle Attacks ❖ Flood/ DDoS

!24

Page 7: 20131204 wireless sec

!!

WLAN Security: Why it matter?❖ International concerns

❖ Access point ≈ Wireless Hub ❖ Difficult to trace attackers

❖ Low cost hacking equipment

❖ Typical insecure WLAN deployments

❖ Lack of user/admin security awareness

❖ Technology limitations & vulnerabilities

!25 !!

WLAN Security Threats❖ Passive data sniffing

❖ AiroPeek, Kismet ❖ Username/password ❖ Credit card number ❖ Email messages ❖ Company Info.

!26

Stealth sniffer !

!!

WLAN Security Threats❖ Unauthorized access

!27

! Wardriving ! Internet attack ! MAC spoofing ! Company backdoor ! Client-to-client attack ! Spam mail

Stealth Attacker!

!!

War Driving❖ War driving is when people

drive around with high-gain antennas on their cars with special software to detect wireless networks

!28

http://www.gugli.it/modules/gallery/photos/wardriving1/1.jpg

Page 8: 20131204 wireless sec

!!

Wireless Networks in LA

!29 !!

Toys for Hackers

!30

!!

A Dual-Use Product

!31

Cantenna

!

Easy and Cheap to buy

!32

Page 9: 20131204 wireless sec

!!

WLAN Security Threats❖ Jamming or denial of service attack

!33

! 2.4 GHz RF jamming ! Packet flood

RF Jamming unsolvable!

!!

WLAN Security Threats❖ User hijacking & Man-in-the-middle attack

!34

! Inverse Wardriving ! Sniff & Modify ! Fake server and AP ! Https hack ! SSL Strip ! Faked Certification ! Password stealing ! “Phishing”

User

HackerRogue AP

Jam & Roam

!!

WLAN Security Threats❖ Man-in-the-middle attack

!35

!! Inverse Wardriving

AP

Internet

A Company

Traffic analysis

Rogue APInternet

Hacker

!!

Man In The Middle attack

!36

Page 10: 20131204 wireless sec

!!

HTTPS attacks!❖ SSL Strip (HTTPS -> HTTP) ❖ Faked Certification

❖ HTTPS (without awareness) = HTTP

!37

https://surajonunix.wordpress.com/2012/02/24/man-in-the-middle-using-ssl-strip/

!!

WLAN Security Countermeasures❖ Data encryption

!

❖ Authentication (e.g., Login Username/Password, Smart card)

!

❖ Authorization (e.g., Access Control)

!

❖ Monitoring (e.g., IDS)

!38

@sdo#$%ks!*ss&^)d:;s@#$ae&*

!!

How to use WiFi securely?❖ Use only trusted WiFi network (access point) ❖ Look carefully at the access point name ❖ Remove the unused access point name from list ❖ Select to connect to only the encrypted

connection (WPA and WEP) ❖ Install “HTTPS Everywhere” extension for

Chrome and Firefox ❖ Do not share files and folders ❖ Turn on personal firewall

!39

Details in Thai : http://foh9.blogspot.com/2012/09/blog-post.html

!!

Network-connected system

!40

Page 11: 20131204 wireless sec

!!

New generation❖ PC liked ❖ Connect to the internet ❖ Many apps provided ❖ Not many people concern about security

!41 !!

What will we do, if ...❖ Malware is infected on TV or Refrigerator ❖ TVs are hacked ❖ Spam are sent to show on our TV ❖ Game consoles break down because of malware

or hacker ❖ We need to investigate TV or other non-PC

devices for finding criminals

!42

!!

Endpoint Protection❖ Do not Root or Jailbreak ❖ Install Anti-malware software ❖ Lock the phone with the secure pincode ❖ Finding our phone

❖ iPhone and Galaxy have their own software ❖ For other, use Anti-malware software (aka. Avast,

and Sophos security and antivirus) ❖ Wiping our phone remotely ❖ Do not post our phone number publicly ❖ Browse the webs securely -> next page

!43 !!

Do not use these pincodes❖ Do not use these pincodes ❖

!44

http://nakedsecurity.sophos.com/2011/06/14/the-top-10-passcodes-you-should-never-use-on-your-iphone/

Page 12: 20131204 wireless sec

!!

Securing a mobile for web browsing❖ Do not click on suspicious links ❖ Consider URLs carefully and beware short URLs ❖ Use 3G rather than free WiFi ❖ Use a VPN ❖ Be selective with your browsing ❖ Keep your device secure ❖ Download from trusted sources ❖ Keep your OS and apps up-to-date

!45 !!

Cyber Terrorists❖ Mobile weaponing

❖ Bot on Mobile ❖ DDoS

❖ PwnPad

!46

!

Conclusion❖ Wireless technology is growing fast ❖ More convenience, but easier to attack ❖ Protection need to do on providers and users ❖ Security awareness is the most important

!47 !!

Contact me

Name : Kitisak Jirawannakool !

Facebook : http://www.facebook.com/kitisak.note !

Email : [email protected] Weblog : http://foh9.blogspot.com !

Twitter : @kitisak

!48

Page 13: 20131204 wireless sec

!!

Contact me

!49

Contact me

[email protected]

[email protected]

http://www.ega.or.th