Using Kismet to enhance the security level in enterprise 通訊所 曹爾凱 Outline



Yüklə 445 b.
tarix26.10.2017
ölçüsü445 b.


Using Kismet to enhance the security level in enterprise

  • 通訊所 曹爾凱


Outline

  • Introduction

  • Attack scenarios

  • Implement

  • Future work

  • Reference



Introduction

  • Why?

    • 100% security is
  • Where happened?

    • More than 60% attack is start from
  • What can I do?



Attack Scenarios: Monkey-Jack

  • MITM Attack

    • Taking over connections at layer 1 and 2
    • Insert attack machine between victim and access point


Attack Scenarios: Monkey-Jack

  • Management frames

    • Deauthenticate victim from real AP
      • Send Deauthenticate frames to the victim using the access point’s MAC address as the source
    • Victim’s 802.11 card scans channels to search for new AP
    • Victim’s 802.11 card associates with fake AP on the attack machine
      • Fake AP is on a different channel than the real one
      • Attack machine’s fake AP is duplicating MAC address and ESSID of real AP
    • Attack machine associates with real AP
      • Attack machine duplicates MAC address of the victim’s machine.


Attack Scenarios: Monkey-Jack



Attack Scenarios: From Internal



Attack Scenarios: From Internal



Attack Scenarios: From Internal



Implement

  • Platform

    • IXP 425
  • OS

    • MontaVista Linux
  • Software

    • Kismet
    • Snort
  • Develop environment

    • IXPD 425


Steps



Defence Scenarios



Future works

  • Future works

    • Combine Network Management system
    • Form passive mode to active mode
    • Locate attacker
    • Honey pot


Reference

  • WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

  • Kismet website

    • http://www.kismetwireless.net
  • AirJack

    • http://802.11ninja.net/airjack/




My suggest in Wireless LAN security

  • MAC Filtering.

  • Disable SSID Broadcasting.

  • Configure Power output.

  • Connection with VPN.

  • Using WPA!!




Yüklə 445 b.

Dostları ilə paylaş:




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2020
rəhbərliyinə müraciət

    Ana səhifə