SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
AirTight Networks           WHITEPAPER




Windows 7 Virtual Wi-Fi:
The Easiest Way to Install a Rogue AP on Your Corporate Network


A Whitepaper by AirTight Networks, Inc.


339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043
www.airtightnetworks.com




                                                             © 2010 AirTight Networks, Inc. All rights reserved.
AirTight Networks          WHITEPAPER




Windows 7 Virtual Wi-Fi:
The Easiest Way to Install a Rogue AP on Your Corporate Network




                                   Introduction
                                   Last few years have seen a sweeping commoditization of IT, more so in the mobile
                                   wireless space, with hardware and software vendors innovating to make their
                                   devices and applications easy and convenient for end-users.
                                   Virtual WiFi, one of the many cool features in Windows 7, is a great example of this
                                   shift. With Virtual Wi-Fi, users can now turn their Windows 7 laptops into a Wi-Fi
                                   access point (AP). Free utilities such as Connectify and Intel MyWiFi make it very
                                   easy to set up a personal Virtual Wi-Fi hotspot in less than a minute in two simple
                                   steps.




                                   This is not the first time that a laptop can be converted into a “Soft AP.” But it is the
                                   first time that a laptop can be used both as a Client and as a Soft AP simultaneously.
                                   In other words, while staying connected to an AP, a Windows 7 laptop can now
                                   share that connection, using Virtual Wi-Fi, with other Wi-Fi devices and users. Using
                                   this personal Wi-Fi hotspot, users can now easily synch up music files on their
                                   laptop with a Zune or iPod, transfer photos from their iPhone onto their laptop, and
                                   share their Wi-Fi Internet connection.


                                   What does this mean for enterprise security?
                                   Using Virtual WiFi, Windows 7 laptops can now be connected to your enterprise


                                          © 2010 AirTight Networks, Inc. All rights reserved.                                  2
AirTight Networks          WHITEPAPER




Windows 7 Virtual Wi-Fi:
The Easiest Way to Install a Rogue AP on Your Corporate Network




                                   Wi-Fi network while sharing their enterprise network access with other
                                   unauthorized Wi-Fi devices or users.
                                   This means that every Windows 7 laptop is a potential Rogue AP1 that can be
                                   used to bypass your wired security and access your private enterprise LAN. Using
                                   a Rogue AP, an attacker could compromise your servers, access sensitive data, and
                                   launch network reconnaissance and disruption attacks2 .
                                   As Windows 7 becomes the de-facto standard for PC users in the near future,
                                   a typical enterprise security administrator may have to deal with tens if not
                                   hundreds of Rogue APs every day! Yet without the right security tools, a security
                                   administrator will have no visibility and control over how many of these Rogue
                                   APs are present on the corporate network and how many unauthorized devices or
                                   users are connecting to them.
                                   Interestingly, not much has been written about this issue yet. Robert Graham of
                                   Errata caught it right away and discussed it back in November of 2009 noting that
                                   users could previously set up Ad-hoc Wi-Fi and connection sharing, but that the
                                   Windows Virtual Wi-Fi capability will cause “rogue access points to proliferate in
                                   companies.”




                                   A Virtual Wi-Fi Soft AP operates similar to a Network Address Translation (NAT)
                                   Wi-Fi router. All Wi-Fi devices that are part of the Virtual Wi-Fi hosted network are
                                   assigned private IP addresses. All traffic from these devices bound to the enterprise
                                   network or the Internet is tunneled using the IP and MAC addresses of the Virtual
                                   1
                                       All You Want to Know About Rogue APs
                                   http://www.rogueap.com/rogue-ap-docs/RogueAP-FAQ.pdf
                                   2
                                       Rogue AP: 5 Ways to (Mis)Use It
                                   http://blog.airtightnetworks.com/wifi-rogue-ap-5-ways-to-%e2%80%9cuse%e2%80%9d-it/



                                            © 2010 AirTight Networks, Inc. All rights reserved.                            3
AirTight Networks          WHITEPAPER




Windows 7 Virtual Wi-Fi:
The Easiest Way to Install a Rogue AP on Your Corporate Network




                                   Wi-Fi Soft AP. This means that all traffic entering the wire is seen as coming from
                                   the authorized Windows 7 laptop. Naturally, all wired security measures such as
                                   network access control (NAC), 802.1x, firewall, wired IDS/IPS, and content filters are
                                   rendered useless.


                                   What can security administrators do about it?
                                   Windows user group policy
                                   Turning ON Virtual Wi-Fi on a Windows 7 laptop requires local administrative
                                   privileges. By defining user group policies in Active Directory, you can shutdown
                                   this privilege for your users. However, the ability to do this is currently supported
                                   only in Windows 2008 server R2. Further, this approach lacks flexibility. You may
                                   want to disallow Virtual Wi-Fi when a Windows 7 laptop is connected to your
                                   enterprise network (via Wi-Fi or Ethernet), but allow users to take advantage of
                                   the convenience when they are travelling or at home. This is not possible using
                                   Windows user group policy.

                                   Wireless endpoint security agent
                                   A wireless endpoint security agent such as AirTight’s SpectraGuard SAFE can
                                   enable flexibility in enforcing your security policies on client devices. SAFE allows
                                   you to define granular laptop security policies, for instance, disallow use of Wi-Fi
                                   when laptop is connected to the wired enterprise network, or disallow Virtual
                                   Wi-Fi at work and allow when laptop is away, or allow WiFi hotspot connections
                                   only using VPN, and so on. It also saves you the trouble of configuring individual
                                   laptops. You can simply push your policies to all enterprise laptops from a central
                                   server.

                                   Wireless intrusion prevention system (WIPS)
                                   A WIPS can proactively protect your enterprise network from wireless threats by
                                   scanning the airspace 24x7. However, when it comes to Rogue AP detection, most
                                   WIPS solutions including those integrated into your WLAN infrastructure, rely on
                                   wire-side scanning. It cannot be stressed enough that wire-side scanning alone is
                                   incapable3 of detecting Virtual WiFi Rogue APs because of the NAT operation and
                                   given that this new type of Rogue APs can connect to your enterprise network via
                                   Wi-Fi.
                                   The ability to correlate traffic in the air with that on the wire is the key for accurately
                                   3
                                       Wireside-only rogue detection: Inadequate for both security and compliance
                                   http://blog.airtightnetworks.com/rogue-ap-detection-pci-compliance/



                                            © 2010 AirTight Networks, Inc. All rights reserved.                                  4
AirTight Networks                        WHITEPAPER




Windows 7 Virtual Wi-Fi:
The Easiest Way to Install a Rogue AP on Your Corporate Network




                                                               and automatically detecting the presence of a Virtual Wi-Fi Soft AP on your
  About
                                                               enterprise network. SpectraGuard Enterprise, powered with AirTight’s
  AirTight Networks
                                                               patented Marker Packet technology, is the only WIPS that has visibility
  AirTight Networks is the global                              on both the wired and wireless sides. Unsurprisingly then, SpectraGuard
  leader in wireless security and                              Enterprise is able to instantly detect a Soft AP, pinpoint its physical location,
  compliance solutions providing                               and automatically block it over the air.
  customers best-of-breed
  technology to automatically
  detect, classify, locate and                                 Summary
  block all current and emerging
  wireless threats. AirTight offers                               • Windows 7 Virtual Wi-Fi enables a laptop to operate as a client and
  both the industry’s leading                                       as an AP simultaneously, making it very easy to deploy Rogue APs on
  wireless intrusion prevention
                                                                    enterprise networks
  system (WIPS) and the world’s
  first wireless vulnerability
                                                                  • This is the first time that a Rogue AP can connect to your enterprise
  management (WVM) security-                                        network using Wi-Fi
  as-a-service (SaaS). AirTight’s                                 • Wire-side security measures such as 802.1X, NAC, wired IDS/IPS and
  award-winning solutions are
                                                                    firewall cannot protect you against this and other wireless threats
  used by customers globally in
  the financial, government, retail,
                                                                  • WIPS solutions that rely on wire-side scanning alone are equally
  manufacturing, transportation,                                    ineffective in detecting Virtual Wi-Fi Rogue APs
  education, healthcare, telecom,                                 • A WIPS that correlates wired and wireless traffic can automatically detect
  and technology industries.
                                                                    the presence of Virtual Wi-Fi Rogue APs
  AirTight owns the seminal patents
  for wireless intrusion prevention
  technology with 12 U.S. patents
  and two international patents
  granted (UK and Australia), and
  more than 20 additional patents
  pending. AirTight Networks is a
  privately held company based
  in Mountain View, CA. For more
  information please visit
  www.airtightnetworks.com




The Global Leader in Wireless Security Solutions
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043
T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com
© 2010 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and
AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are
properties of their respective owners. Specifications are subject to change without notice.

Más contenido relacionado

Más de AirTight Networks

AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution briefAirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsAirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesAirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseAirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?AirTight Networks
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksAirTight Networks
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi ScanAirTight Networks
 

Más de AirTight Networks (20)

AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Financial Districs Wi Fi Scan
Financial Districs Wi Fi ScanFinancial Districs Wi Fi Scan
Financial Districs Wi Fi Scan
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

  • 1. AirTight Networks WHITEPAPER Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com © 2010 AirTight Networks, Inc. All rights reserved.
  • 2. AirTight Networks WHITEPAPER Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network Introduction Last few years have seen a sweeping commoditization of IT, more so in the mobile wireless space, with hardware and software vendors innovating to make their devices and applications easy and convenient for end-users. Virtual WiFi, one of the many cool features in Windows 7, is a great example of this shift. With Virtual Wi-Fi, users can now turn their Windows 7 laptops into a Wi-Fi access point (AP). Free utilities such as Connectify and Intel MyWiFi make it very easy to set up a personal Virtual Wi-Fi hotspot in less than a minute in two simple steps. This is not the first time that a laptop can be converted into a “Soft AP.” But it is the first time that a laptop can be used both as a Client and as a Soft AP simultaneously. In other words, while staying connected to an AP, a Windows 7 laptop can now share that connection, using Virtual Wi-Fi, with other Wi-Fi devices and users. Using this personal Wi-Fi hotspot, users can now easily synch up music files on their laptop with a Zune or iPod, transfer photos from their iPhone onto their laptop, and share their Wi-Fi Internet connection. What does this mean for enterprise security? Using Virtual WiFi, Windows 7 laptops can now be connected to your enterprise © 2010 AirTight Networks, Inc. All rights reserved. 2
  • 3. AirTight Networks WHITEPAPER Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network Wi-Fi network while sharing their enterprise network access with other unauthorized Wi-Fi devices or users. This means that every Windows 7 laptop is a potential Rogue AP1 that can be used to bypass your wired security and access your private enterprise LAN. Using a Rogue AP, an attacker could compromise your servers, access sensitive data, and launch network reconnaissance and disruption attacks2 . As Windows 7 becomes the de-facto standard for PC users in the near future, a typical enterprise security administrator may have to deal with tens if not hundreds of Rogue APs every day! Yet without the right security tools, a security administrator will have no visibility and control over how many of these Rogue APs are present on the corporate network and how many unauthorized devices or users are connecting to them. Interestingly, not much has been written about this issue yet. Robert Graham of Errata caught it right away and discussed it back in November of 2009 noting that users could previously set up Ad-hoc Wi-Fi and connection sharing, but that the Windows Virtual Wi-Fi capability will cause “rogue access points to proliferate in companies.” A Virtual Wi-Fi Soft AP operates similar to a Network Address Translation (NAT) Wi-Fi router. All Wi-Fi devices that are part of the Virtual Wi-Fi hosted network are assigned private IP addresses. All traffic from these devices bound to the enterprise network or the Internet is tunneled using the IP and MAC addresses of the Virtual 1 All You Want to Know About Rogue APs http://www.rogueap.com/rogue-ap-docs/RogueAP-FAQ.pdf 2 Rogue AP: 5 Ways to (Mis)Use It http://blog.airtightnetworks.com/wifi-rogue-ap-5-ways-to-%e2%80%9cuse%e2%80%9d-it/ © 2010 AirTight Networks, Inc. All rights reserved. 3
  • 4. AirTight Networks WHITEPAPER Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network Wi-Fi Soft AP. This means that all traffic entering the wire is seen as coming from the authorized Windows 7 laptop. Naturally, all wired security measures such as network access control (NAC), 802.1x, firewall, wired IDS/IPS, and content filters are rendered useless. What can security administrators do about it? Windows user group policy Turning ON Virtual Wi-Fi on a Windows 7 laptop requires local administrative privileges. By defining user group policies in Active Directory, you can shutdown this privilege for your users. However, the ability to do this is currently supported only in Windows 2008 server R2. Further, this approach lacks flexibility. You may want to disallow Virtual Wi-Fi when a Windows 7 laptop is connected to your enterprise network (via Wi-Fi or Ethernet), but allow users to take advantage of the convenience when they are travelling or at home. This is not possible using Windows user group policy. Wireless endpoint security agent A wireless endpoint security agent such as AirTight’s SpectraGuard SAFE can enable flexibility in enforcing your security policies on client devices. SAFE allows you to define granular laptop security policies, for instance, disallow use of Wi-Fi when laptop is connected to the wired enterprise network, or disallow Virtual Wi-Fi at work and allow when laptop is away, or allow WiFi hotspot connections only using VPN, and so on. It also saves you the trouble of configuring individual laptops. You can simply push your policies to all enterprise laptops from a central server. Wireless intrusion prevention system (WIPS) A WIPS can proactively protect your enterprise network from wireless threats by scanning the airspace 24x7. However, when it comes to Rogue AP detection, most WIPS solutions including those integrated into your WLAN infrastructure, rely on wire-side scanning. It cannot be stressed enough that wire-side scanning alone is incapable3 of detecting Virtual WiFi Rogue APs because of the NAT operation and given that this new type of Rogue APs can connect to your enterprise network via Wi-Fi. The ability to correlate traffic in the air with that on the wire is the key for accurately 3 Wireside-only rogue detection: Inadequate for both security and compliance http://blog.airtightnetworks.com/rogue-ap-detection-pci-compliance/ © 2010 AirTight Networks, Inc. All rights reserved. 4
  • 5. AirTight Networks WHITEPAPER Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network and automatically detecting the presence of a Virtual Wi-Fi Soft AP on your About enterprise network. SpectraGuard Enterprise, powered with AirTight’s AirTight Networks patented Marker Packet technology, is the only WIPS that has visibility AirTight Networks is the global on both the wired and wireless sides. Unsurprisingly then, SpectraGuard leader in wireless security and Enterprise is able to instantly detect a Soft AP, pinpoint its physical location, compliance solutions providing and automatically block it over the air. customers best-of-breed technology to automatically detect, classify, locate and Summary block all current and emerging wireless threats. AirTight offers • Windows 7 Virtual Wi-Fi enables a laptop to operate as a client and both the industry’s leading as an AP simultaneously, making it very easy to deploy Rogue APs on wireless intrusion prevention enterprise networks system (WIPS) and the world’s first wireless vulnerability • This is the first time that a Rogue AP can connect to your enterprise management (WVM) security- network using Wi-Fi as-a-service (SaaS). AirTight’s • Wire-side security measures such as 802.1X, NAC, wired IDS/IPS and award-winning solutions are firewall cannot protect you against this and other wireless threats used by customers globally in the financial, government, retail, • WIPS solutions that rely on wire-side scanning alone are equally manufacturing, transportation, ineffective in detecting Virtual Wi-Fi Rogue APs education, healthcare, telecom, • A WIPS that correlates wired and wireless traffic can automatically detect and technology industries. the presence of Virtual Wi-Fi Rogue APs AirTight owns the seminal patents for wireless intrusion prevention technology with 12 U.S. patents and two international patents granted (UK and Australia), and more than 20 additional patents pending. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com The Global Leader in Wireless Security Solutions AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2010 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.