0% found this document useful (0 votes)
10 views16 pages

KFA-SCT-115-Security Computing-Week 14 - Wireless Network Security

The document discusses wireless network security, outlining types of wireless networks, including LAN, MAN, WAN, and PAN, and the role of Wi-Fi technology. It highlights vulnerabilities such as weak encryption, rogue access points, and wardriving, while explaining the importance of the CIA triad (Confidentiality, Integrity, Availability) in Wi-Fi security. Additionally, it compares WEP and WPA2 protocols, emphasizing the need for robust security measures against threats like evil twin attacks.

Uploaded by

Prashant Sapkota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views16 pages

KFA-SCT-115-Security Computing-Week 14 - Wireless Network Security

The document discusses wireless network security, outlining types of wireless networks, including LAN, MAN, WAN, and PAN, and the role of Wi-Fi technology. It highlights vulnerabilities such as weak encryption, rogue access points, and wardriving, while explaining the importance of the CIA triad (Confidentiality, Integrity, Availability) in Wi-Fi security. Additionally, it compares WEP and WPA2 protocols, emphasizing the need for robust security measures against threats like evil twin attacks.

Uploaded by

Prashant Sapkota
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

SECURITY

COMPUTING
WEEK 14: WIRELESS NETWORK SECURITY
DELIVERED BY:

Yojan Dhakal | Lead IS Auditor Aaditya Khati| SOC Manager

IS Audit Practitioner @CryptoGen Nepal Team Lead @CryptoGen Nepal

ISO 27001 | CEH Practical| AZ 900 | CSFPC CEH | CPISI | AZ 900 | LRSA | LRPA | LRSE
NSE 1 | NSE 2 | LogPoint Certified Admin & LRDE | LogPoint Certified Admin | CCNA CyberOps
Analyst CPE | F5 Delivery Engineer | Tenable Certified

AP @KFA Practical Contributor @KFA


WIRELESS NETWORK
• A wireless network refers to a computer network that makes use of Radio Frequency (RF) connections between nodes in
the network. Wireless networks are a popular solution for homes, businesses, and telecommunications networks.
• There are four main types of wireless networks:

• Wireless Local Area Network (LAN): Links two or more devices using a wireless distribution method, providing a
connection through access points to the wider Internet.
• Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
• Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and cities.
• Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally within a person’s reach.
WIRELESS FIDELITY (WI-FI)
• Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and desktops), mobile devices
(smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
• Internet connectivity occurs through a wireless router. When you access Wi-Fi, you are connecting to a wireless router
that allows your Wi-Fi-compatible devices to interface with the Internet.
• IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and specifications of wireless networks.
CIA TRIAD IN WIFI
• Confidentiality: Weak Encryption in WiFi
• Integrity: Loss of data due to disruption, weak encryption leads to compromise
• Availability: De-auth attacks
CIA TRIAD IN WIFI
• Confidentiality: Weak Encryption in WiFi
• Integrity: Loss of data due to disruption, weak encryption leads to compromise
• Availability: De-auth attacks
VULNERABILITIES IN WIRELESS
NETWORK
• Weak Encryption
• Default Credentials
• Rouge Access Point
• Wardriving
VULNERABILITIES IN WIRELESS
NETWORK
WEP (Wired Equivalent Privacy)
• WEP stands for Wired Equivalent Privacy. The 802.11 designers intention was to provide wireless users with a level
of security equivalent to that achievable on a wired network. Unfortunately WEP has turned out to be much less
secure than intended.
• WEP uses secret keys to encrypt data. Both AP and the receiving stations must know the secret keys.
• Replaced in 2004 due to numerous security flaws by WPA
• Static Keys: Prone to brute force attack
VULNERABILITIES IN WIRELESS
NETWORK
WPA2 (Wi-Fi Protected Access 2)
• WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected Access wireless security protocol.
• WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network
password have access to it.
• A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more
vulnerable TKIP system used in the original WPA protocol.
VULNERABILITIES IN WIRELESS
NETWORK
Default Credentials
VULNERABILITIES IN WIRELESS
NETWORK
Rouge Access Point
• A rogue access point (rogue AP) is any wireless access point that has been installed on a network's wired
infrastructure without the consent of the network's administrator or owner.
• Another, and perhaps more common, example of a rogue access point is what is sometimes referred to as an "evil
twin.“
VULNERABILITIES IN WIRELESS
NETWORK
Rouge Access Point: Evil Twin
• An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point
that mimics a legitimate network.
• Once a user is connected to an “evil twin” network, hackers can access everything from their network traffic to
private login credentials.
• Evil twin attacks get their name from their ability to imitate legitimate Wi-Fi networks to the extent that they are
indistinguishable from one another.
VULNERABILITIES IN WIRELESS
NETWORK
Protection against Rouge Access Point: Evil Twin | Cisco Meraki Air Marshall
VULNERABILITIES IN WIRELESS
NETWORK
War Driving (Access Point Mapping)
• Process of mapping access points, which involves attackers finding vulnerable or unsecured Wi-Fi networks.
• This can give them the foundation to install malware on the user’s network and steal information from devices
connected to the network, such as bank or credit card data and private documents and files.
• Wardriving involves attackers searching for wireless networks with vulnerabilities while moving around an area in a
moving vehicle.
• They use hardware and software to discover unsecured Wi-Fi networks then gain unauthorized access to the
network by cracking passwords or decrypting the router.
• The attacker then records vulnerable network locations on digital maps, known as access point mapping, and may
share that information with third-party applications and websites.
WI-FI PENETRATION TESTING TOOL
https://www.aircrack-ng.org/
WEEK 14
END OF SLIDE

You might also like