19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

170<br />

Part III: Hacking Network Hosts<br />

Countermeasures against<br />

encrypted traffic attacks<br />

The simplest solution to the WEP problem is to migrate to WPA, or ideally,<br />

WPA2, for all wireless communications. You can also use a VPN in a Windows<br />

environment — free — by enabling Point-to-Point Tunneling Protocol (PPTP)<br />

for client communications. You can also use the IPSec support built into<br />

Windows, as well as Secure Shell (SSH), Secure Sockets Layer/Transport<br />

Layer Security (SSL/TLS), and other proprietary vendor solutions, to keep<br />

your traffic secure. Just keep in mind that there are cracking programs for<br />

PPTP, IPSec, and other VPN protocols as well, but overall, you’re pretty safe.<br />

Newer 802.11-based solutions exist as well. If you can configure your wireless<br />

hosts to regenerate a new key dynamically after a certain number of packets<br />

have been sent, the WEP vulnerability can’t be exploited. Many AP vendors<br />

have already implemented this fix as a separate configuration option,<br />

so check for the latest firmware with features to manage key rotation. For<br />

instance, the proprietary Cisco LEAP protocol uses per-user WEP keys that<br />

offer a layer of protection if you’re running Cisco hardware. Again, be careful<br />

because cracking programs exist for LEAP, such as asleap (http://source<br />

forge.net/projects/asleap).<br />

The 802.11i standard from the IEEE (also called WPA2) integrates the WPA<br />

fixes and more. This standard is an improvement over WPA but is not compatible<br />

with older 802.11b hardware because of its implementation of the<br />

Advanced Encryption Standard (AES) for encryption.<br />

If you’re using WPA with a pre-shared key (which is more than enough for<br />

small WLANs), ensure that the key contains at least 20 random characters so<br />

it isn’t susceptible to the offline dictionary attacks available in such tools as<br />

Aircrack-ng and Elcomsoft Wireless Security Auditor.<br />

Keep in mind that although WEP and weak WPA pre-shared keys are crackable,<br />

it’s still much better than no encryption at all. Similar to the effect that<br />

home security system signs have on would-be home intruders, a wireless<br />

LAN running WEP or weak WPA pre-shared keys is not nearly as attractive to<br />

a criminal hacker as one without it. Many intruders are likely to move on to<br />

easier targets unless they really, really want to get into yours.<br />

Wi-Fi Protected Setup<br />

Wi-Fi Protected Setup (WPS) is a wireless standard that enables simple connectivity<br />

to “secure” wireless APs. The problem with WPS is that its implementation<br />

of registrar PINs make it easy to connect to wireless and can facilitate<br />

attacks on the very WPA/WPA2 pre-shared keys used to lock down the overall<br />

system. As I’ve learned over the years with security, everything’s a tradeoff.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!