Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Wireless Hotspots and Your Corporate Secrets an...

Wireless Hotspots and Your Corporate Secrets and Launch of 'The Asia-Pacific Internet Handbook Episode IV: Emerging Powerhouses

A talk covering two unrelated topics: about wireless hotspots and security and a second part about a book launch.

Harish Pillay

November 29, 2002
Tweet

More Decks by Harish Pillay

Other Decks in Technology

Transcript

  1. Harish Pillay CEO/CTA Maringo Tree Technologies Pte Ltd November 29th,

    2002 Wireless Hotspots and Your Corporate Secrets and Launch of 'The Asia-Pacific Internet Handbook Episode IV: Emerging Powerhouses'
  2. Agenda The Wireless Alphabet Soup Some Wireless basics What are

    your exposures? How to mitigate your risks. Recommendations Wardriving/Foxhunting Demo
  3. Cellular Widespread deployment of cellular systems - with the GSM

    most widely deployed globally 3G promises a maximum data rate of 384Kbps 3G will not roll out for another 3 years - at least in Singapore 3G could be sidelined and not actually happen inspite of success of NTT DoCoMo's iMode in Japan
  4. Data Wireless local area networks are an answer to need

    to untethered access to the corporate network IEEE 802.11 is one of the answers to this demand HiperLAN is the European answer to this 802.11 built upon the Ethernet standards, while HiperLAN was on ATM Looks like 802.11 has won the battle with slowing developments in HiperLAN (HiperLAN2 notwithstanding)
  5. IEEE 802.11 Wireless LANs Works in the license-free Industrial, Scientific

    and Medical frequency bands - 2.4GHz (83.5 MHz bandwidth) and 5.8GHz (125Mhz bw) No need for licensing of the spectrum before use 802.11 has defined three lettered standards: 11a runs at 5.8Ghz giving 54Mbps data rate (OFDM) 11b runs at 2.4Ghz giving 11Mbps data rate (DSSS) 11g runs at 2.4Ghz giving 54Mbps data rate (DSSS and OFDM combo)
  6. Why is the CIA In this? Confidentiality, Integrity and Authentication

    are very important in any coporate communication Enforcing that on the network (wired) is fairly easy On a wireless network, it is doable, but the standards for that have now been shown to be flawed Authentication based on MACHINE not user
  7. Wireless Access Issues The 802.11 networks provide two means to

    authenticate and encrypt (confidentiality) of the data SSID and WEP SSID is the name of the wireless access point WEP 'wired eqivalent privacy' is a means to encrypt the data giving some sense of confidentiality WEP defines a 40-bit and 104-bit encryption key added to a non-secret 24-bit 'initialization vector' (IV) giving 64 and 128 bit 'key'
  8. Wireless Access Issues The problem we have today is that

    the way the WEP has been implemented is flawed and has been effectively broken. Dependency on WEP for confidentiality is not a good idea.
  9. WEP Flaws IV Collision The IV repeats rapidly (possible in

    5 hours on busy networks) giving opportunities for collisions to happen IV Initialization by some NICs start at 0 and increment by 1 for each new packet Secret Key updates: assumed to be done regularly but in practise, very rarely because of the lack of a codified and automated key distribution mechanism
  10. Some Solutions IEEE 802.1x: Port-based Network Access Control From rr.sans.org/wireless/80211.php

    Only provides authentication and upto vendors to determine what type of authentication
  11. More Solutions VPNs IPSec (example, FreeSWan) Extensible Authentication Protocol (EAP)

    based on the IETF standards A lot of work being done in this space Cisco has a good implementation of it called LEAP Tunneling all of your connections via a Secure Shell (ssh) link. Strong network security policy - social engineering
  12. War Driving/Fox Hunting Because an Access Point sends out beacons

    approximately every 100ms, any appropriately equipped device can hear it. This information is needed for associating with the AP Similar to the cellular phone being able to scan for different cellular phone networks You can gather a lot of information by just passively listening/sniffing the air!
  13. Tools for Fun Many tools exist and all are freely

    downloadable Kismet (Linux, Zaurus) ¡ Passive, no beacons sent out by the client NetStumbler (Windows) ¡ Non-passive, beacons are sent out by the client MacStumbler (Mac) Interestingly, commercial products do not even come close to these open source versions Demo
  14. The Asia Pacific Internet Handbook Episode IV: Emerging Powerhouses Six

    Chapters plus a References section covering Japan, South Korea, Greater China, India, Australia and Singapore Overall author is Madanmohan Rao, PhD, based in India. Each chapter authored by an individual living and working in those respective countries.
  15. Chapter 1: Japan Chapter 1: Japan This chapter covers the

    Internet market in Japan, with special emphasis on Japan's unique contributions in Internet-related devices, the explosive growth of NTT Docomo's wireless Internet service, and global venture capital powerhouses like Softbank.
  16. Chapter 2: South Korea Chapter 2: South Korea This chapter

    will cover the Internet market in South Korea, with special emphasis on Korea as the world's largest broadband Internet market, the world's leading online stocktrading nation, its national IT strategy, and a major player in the Internet device industry.
  17. Chapter 3: Greater China Chapter 3: Greater China This chapter

    will focus on the close relationship between the Internet markets in China, Hong Kong and Taiwan, as well as the Chinese diaspora in the U.S. and other parts of Asia. The interplay between the massive market size and the authoritarian political culture makes for an interesting story.
  18. Chapter 4: India Chapter 4: India This chapter will highlight

    India's progress as a major destination of online-driven outsourced software development, the Bangalore phenomenon, its strong content industries, and the pull of the diaspora - while also raising the challenge of the digital divide.
  19. Chapter 5: Australia Chapter 5: Australia This chapter will focus

    on Australia's role in the Asia-Pacific Internet market, especially the progressive Internet legislation, Internet infrastructure players like Telstra, and media heavyweights like Murdoch and Packer.
  20. Chapter 6: Singapore Chapter 6: Singapore, by Harish Pillay This

    chapter highlights Singapore's role as a powerful regional e-hub; it will cover topics like broadband/wireless Internet, e-government services, alliance strategies with companies in the region, the sometimes-controversial regulatory climate, and business culture.