41
Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Pen-test Lab Initiative ➤ Wireless Security 101Jon Williams, CISSP

June 15, 2017

Page 2: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Introductions

• OWASP • About me

• About you: who you are, where you’re from, what you’re looking to learn

Page 3: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Pen-testing initiative

OWASP

Page 4: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Mission• Create capability within CT chapter that

would allow our members to learn and practice ethical hacking skills in a safe environment

• Create forum for practitioners to share techniques and mentor peers in this space

Page 5: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Jon Williams

Page 6: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Jon Williams• Security Administrator

Banktivityiggsoftware.com

Page 7: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Jon Williams• Security Administrator

Banktivity

• Security Researcher

iggsoftware.com

braindead-security.blogspot.com github.com/braindead-sec

Page 8: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

…and you?

Page 9: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

ObjectiveTo raise awareness about threats to wi-fi users and techniques for defending against those threats.

Page 10: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Agenda

• Overview: wireless security concepts • Demonstration: wireless attacks • Review: risks to remote workers • Game time: defensive techniques

Page 11: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless security concepts

Overview

Page 12: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

The Million-Dollar Question

“What is my most valuable asset?”

Page 13: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless Internet Access

(simplified)

Page 14: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless Internet Access

(simplified)

Page 15: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Company IT

Wireless Internet Access

(simplified)

Page 16: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless Internet Access

(simplified)

Page 17: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

You (and your IT)

Wireless Internet Access

(simplified)

Page 18: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless Internet Access

(simplified)

Page 19: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

ISPs

Wireless Internet Access

(simplified)

Page 20: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Wireless Internet Access

(simplified)

Page 21: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

???

Wireless Internet Access

(simplified)

Page 22: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Local Network - No Encryption

Page 23: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Local Network - With Encryption

Page 24: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Threats facing remote workers

Wireless Attacks

Page 25: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Radio Monitoring

Unencrypted Wireless Network

Page 26: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Radio Monitoring

Unencrypted Wireless Network

Page 27: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Rogue Access Point

Legit-WiFi

Page 28: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Rogue Access Point

Legit-WiFi

Page 29: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Rogue Access Point

Legit-WiFi“Legit”-WiFi

Page 30: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Rogue Access Point

Legit-WiFi“Legit”-WiFi

Page 31: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Man-in-the-Middle

Page 32: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Man-in-the-Middle

Page 33: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Man-in-the-Middle

• Monitor

• Intercept

• Inject

Page 34: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Session Hijacking

1. Log in to website, get cookie

2. Browse site using cookie for authentication

3. Log out, remove cookie

Page 35: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Session Hijacking

1. Log in to website, get cookie

2. Browse site using cookie for authentication

3. Log out, remove cookie

2.5. Steal cookie, plant in browser, pretend to be authenticated user without logging in

Page 36: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Credential Theft

• Rogue access point • Captive portal • Fake login form

Page 37: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Credential Theft

• Rogue access point • Captive portal • Fake login form

• Looks legit • Login fails • Pwnd

Page 38: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Risk Review

• Unencrypted wifi • Rogue access point • Passive connections • Evil twin ➤ man-in-the-middle • Unencrypted login forms • Password reuse • Insecure cookies ➤ session hijacking

Page 39: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Mitigating risks

Game Time!

Page 40: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Any questions?

Page 41: OWASP Wireless Security 101 · Pen-test Lab Initiative Wireless Security 101 Jon Williams, CISSP June 15, 2017

Thank you!Stay safe out there.