Providing an inexpensive and flexible way to establish communications, wireless security must be a concern. Challenges,
along with security include providing a single that is reliable and allowing for privacy. Wireless technologies operate on
Layer 1 of the OSI and often do incorporate protocols from Layer 2 as well. This is for framing and management needs.
Here are some of the broader categories of wireless technologies in use:
- Infrared, Microwave & RF (Legacy Technologies)
- Wireless Fidelity (WiFi)
- Cell Phone Technologies (CMDA & GSM)
- Blue tooth
- RFID Devices
Clients connect to wireless networks via an infrastructure configuration or in an ad hoc fashion. With an
infrastructure configuration, a group of clients work together and can share resources. The ad hoc method of networks
are usually designed for temporary connections between two hosts.
WiFi Network Types
WiFi refers to a series of different protocols and versions. The Institute of Electronics and Electrical Engineers
(IEEE) and also known as the "I-triple-E", have assigned certain designations for different WiFi specifications. These are:
IEEE |
Distance (Meters / Feet) |
Speed |
Frequency Range |
802.11a |
20 / ~98 |
54 Mbps |
5 Ghz |
802.11b |
100 / ~328 |
11 Mbps |
2.4 Ghz |
801.11g |
100 / ~328 |
54 Mbps |
2.4 Ghz |
802.11n |
+125 / +410 |
+600 Mbps |
2.4 Ghz |
Here are some important facts regarding the different WiFi protocols.
802.11a networks are not as resilient to noise and signal degradation as 802.11b.
802.11b offered the best of both in regards to speed and reliability.
802.11i was a rewrite of the WEP protocols that upgraded the security of WPA(2).
802.11e included extensions that allowed for quality of service (QoS) for data streams like
multimedia. WiFi Multimedia (WMM) is a subset of 802.11e.
802.11n was an upgrade that focused on reliability and distance. The original speed was 108 Mbps
in the pre-draft version. Devices that are "n" ready have increased the speeds, however the distance of 125 Meters
(401 Feet) is in debate. Notably, some devices have demonstrated reliable signals at a distance of up to 500 Meters
(1,640 Feet.)
802.11x was an authentication extension that allowed technologies such as RADIUS or EAP and LEAP.
These are used to authenticate the clients to the network. Though somewhat difficult to setup and maintain, many
commercial tools have made it easier and the approach can be extremely effective.
WiFi Network Setup
Having similar characteristics as a wired network, WiFi networks use a hub as the concentrator. This is also known
as a "star wired, logical bus" architecture, only more dangerous. Anyone within radio distance of he signal will be
able to see it without requiring a physical access to wiring. The hardware equivalent of the concentrator is known
as the Access Point (AP). Clients must wirelessly first associate themselves to an AP in order to participate in
the network.
Since the same signal space is shared by everyone in the signal range, everyone has access to multiple APs and peers.
A logical group of participants is bound by a shared string. This string is known as the Service Set Identifier
(SSID); the group of participants is known as the Service Set. Part of the associating with an AP involves
presenting this string in a management frame.
If it is wanted to have the network easy to find and join, the SSID is broadcast by the AP at a periodic rate in
beacon frames. This notification of the SSID is know to be an open network. When the SSID is not broadcast
by the AP, it is known as a closed network. In this case, the client nees to know the string in advance
before associating with this network.
Though not a secret, the SSID is considered a shared password. The SSIDs are sent in clear text, even on a closed
network when a client associates. An attacker armed with a wireless card is capable of sniffing these management
frames to discover this information.
After a client has associated, there are additional agreements made with the AP in regards to collision avoidance
as well as other management parameters. At this point the client is ready to send traffic. The OSI upper Layers
3 - 7 come into play in the same manner as in any wired network.
In a typical infrastructure consisting of both wired and wireless networks, all clients participate in the same Layer
3 network segment. Clients associating with the AP via their SSID string are using a different Layer 2 technology
than those on a wired network. Wireless routing products, for the most part incorporate a Layer 2 translation bridge
to allow 802.3 and 802.11 devices to seem as if they are on the same network. Nothing else is different at this
point. Each device must have or lease an IP configuration and must be able to communicate common protocols.
For an attacker, the best way to access wireless machines is to have a physical connection to the router if possible
and then bypass the wireless altogether. Successfully associating with the AP is pretty much the same thing as
plugging into a drop even if the attacker is in the parking lot. With this said, proper segmentation is critical
in the terms of defense. Consider higher layer authentication techniques whenever wireless access is going to be
provided.
Antenna Types
An attacker must understand the type of wireless antenna used to execute a successful attack. There are two
major types of antennas used.
- Directional (or Unidirectional)
- Omni-directional
Directional Antennas
A Directional antenna aims the signal in a more specific pattern. There are several types of these
antennas.
Yagi Antenna
A Yagi antenna is a directional antenna consisting of a driven element such as dipole or folded dipole and
additional parasitic elements which are typically a reflector and one or more directors. It radiates in only one
direction and is most commonly used in point-to-point communications.
A Yagi antenna is also known as "beam antenna" or "parasitic array". It is very widely used as a high-gain
antenna on the HF, VHF and UHF bands.
It is used for communications in a medium range of three to five miles between two points and can also be used as
a bridge antenna to connect clients to an access point.
Diapole Antenna
A Dipole antenna consists of two straight rods or wires oriented end to end on the same axis
with the feed-line connected to the two adjacent ends, however Dipoles may be fed anywhere along their length.
Dipoles are frequently used as resonant antennas. As the feed-point of such an antenna is shorted, it will be able
resonate at a particular frequency similar to a string instrument being plucked.
The most common Diapole antenna is the half-wave dipole. This design incorporates two rod elements approximately
1/4 wavelength long so the whole antenna is a half-wavelength long.
Reflector Antenna
A Reflector antenna is an antenna device that reflects electromagnetic waves. Reflector antennas
can exist as a standalone device for redirecting radio frequency (RF) energy or can be integrated as part of an
antenna assembly. Its efficiency is measured in terms of its effectiveness ratio.
The primary advantage of a Reflector antenna is that it has high directivity. It's functionality similar to a
searchlight or flashlight reflector. It directs the radio waves in a narrow beam or receive radio waves from one
particular direction only.
Omnidirectional Antennas
Omnidirectional Antenna
An Omnidirectional Antenna radiates radio wave power uniformly in all directions in one plane
with the radiated power decreasing with elevation angle above or below the plane dropping to zero on the antenna's
axis. This radiation pattern is often described as "dough-nut shaped".
A few of the common types of omnidirectional antennas are the whip antenna, "Rubber Ducky" antenna, ground plane
antenna, vertically oriented dipole antenna, discone antenna, mast radiator, horizontal loop antenna, also known
as a 'circular aerial' because of the shape and the halo antenna.
The fortunate fact for an attacker is that many network are omnidirectional units that are located in the ceiling
tiles drawing little attention. Even a laptop can be turned into an AP and would create little to no suspicion.
Sniffing Wireless Traffic
It is more difficult to sniff a wireless network than it is a wired network. Though hardware NICs can be placed
into promiscuous mode by using drivers, there is no such universal driver for this on a wireless card. The only
equivalent term for this would be "monitor mode" and some wireless card do not support it at all.
If your intention is to only sniff your own traffic, sniffers such as Wireshark work well. All you have to do is
to uncheck the option for sniffing in promiscuous mode. On a final note, some attacks require packet injection
and just being in monitor mode does not mean your wireless NIC will achieve this either.
Security Considerations
Signal leakage exposes data or provides greater exposure to possible connectivity from unauthorized clients. MAC
address filters can be configured but spoofed as well.By adding additional layers of protection can help, encryption
being one of them, however all of these best practices come with the price of additional administrative overhead.
The attacker constantly looks for a network that has not been given the proper attention.
You can use the settings in an AP itself to create either an open or closed network. If the closed network turns
out to be greater trouble than necessary, the change of the default SSID of the AP is recommended. AP manufactures
default SSIDs are easily recognized and indicate to an attacker an AP is not likely administered properly in
other ways as well. Also, if additional authentication is not in use, this could result in associating with the
wrong network.
Regular audits of surrounding areas are recommended and important. Establishing a baseline of existing SSIDs is
a good first step. It is even better to develop signal profiles so that rogue APs might at least be detected.
A De-auth (De-authentication) flood involves a rouge access point that is spoofing a MAC address of a
connected client and then sending a de-auth packet to the access point. At the same time it acts to have the
same SSID so that the same client will reconnect with the attacker if it has a stronger signal. The hijacking
exploit involves understanding how the disruption at lower layers of the network can lead to the taking of higher
layers.
When a wireless client connects to an AP, only a hardware association exists. There is no association with user
accounts and no way to who is operating the hardware that has joined the service set. Without securing any
network at the lower layer possible, the higher layer authentication services are at risk. If attackers can
see the network and transmit traffic, they can attack it.s