SlideShare a Scribd company logo
1 of 29
Download to read offline
Webinar held on 02 Sept, 2009
    *Webinar Press Release URL : http://digg.com/d3130SK




!   "              !
In the News


              Cisco wireless LAN vulnerability could
              open ‘back door’


              Cisco wireless LANs at risk of attack,
              ‘skyjacking’



              Newly discovered vulnerability could
              threaten Cisco wireless LANs
What Cisco says


 Severity = Mild

 “No risk of data loss or interception”

 “Could allow an attacker to cause a
 denial of service (DoS) condition”




   It’s not a big deal!
Hmm…



                         How severe is the exploit?
What exactly is skyjacking?
                              ?
                ?
                                    Do I need to worry about it?


                                       ?
What you will learn today


The risk from skyjacking vulnerability is much bigger
than stated


How to assess if you are vulnerable



Countermeasures for skyjacking and other zero-day
attacks
Five ways a LAP can discover WLCs




             Subnet-level broadcast
             Configured
             Over-the-air provisioning (OTAP)
             DNS
             DHCP
Three criteria a LAP uses to select a WLC




        Step 1   Primary, Secondary, Tertiary
        Step 2   Master mode
        Step 3   Maximum excess capacity
Over-the-air provisioning (OTAP)
OTAP exploited for “skyjacking”
Skyjacked LAP denies service to
wireless users
Secure WLAN enterprise access

                                                                   Before




          SSID   Security   VLAN   Comment
          Corp   WPA2        20    Internal to corporate network
          AP Physically      30    Internal to corporate network
          Connected To
Authorized LAP skyjacked – DoS

                                                                   Before




          SSID   Security   VLAN   Comment                         DoS
          Corp   WPA2        20    Internal to corporate network
          AP Physically      30    Internal to corporate network
          Connected To
Authorized LAP turned into Open Rogue AP

                                                                     Before




                                                                   Rogue on
          SSID   Security   VLAN   Comment                         Network
          Corp   OPEN        30    Internal to corporate network
          AP Physically      30    Internal to corporate network
          Connected To
Camouflaged Rogue LAP:
a backdoor to your
enterprise network!
Wolf in Sheep Clothing

                                                                      Before




                                                                    Rogue on
           SSID   Security   VLAN   Comment                         Network
           Corp   WPA2        30    Internal to corporate network
           AP Physically      30    Internal to corporate network
           Connected To
Wolf in Sheep Clothing – Scenario 2

                                                                         Before




         SSID    Security   VLAN   Comment
                                                                   DoS
         Corp    WPA2        20    Internal to corporate network
         Guest   OPEN        30    Internal to corporate network
                                                                   Rogue on
         AP Physically       30    Internal to corporate network   Network
         Connected To
SpectraGuard® Enterprise WLAN policy set-up




                                   Guest WLAN SSID




                                  Allowed Subnet (VLAN)
                                  for Guest SSID
Normal WLAN operation

 Device list displayed on SpectraGuard Enterprise console




           Authorized SSIDs are seen in “Green” color and are
           detected with VLAN identifier to which they connect
Skyjacking on guest access




                         1   Change in the VLAN is detected


                             SSID marked as “misconfigured”
                         2
                             (Background changes to amber)

                             Automatic Prevention started
                         3   ( Shield icon appears )
Summary

                                                            AirTight’s unique wireless-
             Type of Skyjacking attack     Only over-air    wired correlation based
Open rogue
                                         threat detection   threat detection


             Authorized SSID as Open
             Rogue AP

WPA2 rogue
             Authorized SSID as
             “Privileged” Rogue AP             X
             (Wolf in Sheep clothing)


Open guest   Guest access as Open
rogue        Rogue AP
             (Wolf in Sheep clothing –
                                               X
             scenario 2)
AirTight’s SpectraGuard Enterprise




The only WIPS that can provide zero-day protection
against the most potent form of skyjacking attack


Thanks to patented marker packet technology for
accurate wired connectivity detection and unique
VLAN Policy Mapping™ architecture
Which LAPs can be skyjacked?


               Type of Cisco LAP            Vulnerable?

      LAPs using auto discovery                 Yes


      Configured with “preferred” WLCs
?     (primary, secondary, tertiary)
                                             Mostly No


      Configured with locally significant
                                                No
      certificates (LSC)
Countermeasures


Turn off OTAP on WLC                     Ineffective!



Manually configure LAPs with preferred   Primarily HA and load
WLCs (primary, secondary, tertiary)      balancing feature



Manually configure LAPs with LSCs        Impractical



Block outgoing traffic from UDP ports    Not a common
12222 and 12223 on your firewall         practice
Practical difficulties:
Do you know

 If all LAPs are configured with primary,
 secondary and tertiary WLC?

 If all LAPs are indeed connected to
 configured WLCs?

 If your outgoing UDP ports on the firewall are blocked? Did you test it
 today?

 How many VLANs do you have authorized for wireless access?

 Are all SSIDs mapped to the correct VLANs?

 When was the last time your LAPs rebooted?

 When was the last time your WLC taken down for maintenance?

 If all your APs are compliant with your security policies? How do you
 know?
One mistake and you
could be exposed!
Adding second, independent layer of
     WIPS protection

                                               Zero-day attacks
                                   Misconfigurations       Undesirable
                                                           connections

           Zero-day attacks
                     Undesirable
Misconfigurations    connections
                                                                      Designed for
                                                                        security




                                                                  Designed for
                                                                  WLAN access
AirTight’s SpectraGuard product
family




Complete Wireless Intrusion Prevention   Industry’s Only Wireless Security Service




   Wireless Security for Mobile Users     WLAN Coverage & Security Planning
About AirTight Networks




                                For more information on wireless security
                                risks, best practices, and solutions, visit:
                                http://www.airtightnetworks.com
The Global Leader in Wireless
   Security and Compliance
                                Visit our blog to read the root cause
                                analysis of
                                “Skyjacking: What Went Wrong?”
                                http://blog.airtightnetworks.com

More Related Content

What's hot

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
Irsandi Hasan
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
nooralmousa
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
Irsandi Hasan
 
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
Justrassity996
 

What's hot (20)

Feb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-SecurityFeb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-Security
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
Ccna security comparison
Ccna security comparisonCcna security comparison
Ccna security comparison
 
Aircrack
AircrackAircrack
Aircrack
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
SonicWall
SonicWallSonicWall
SonicWall
 
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any sizeAccelerating incident response in organizations of any size
Accelerating incident response in organizations of any size
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Routers
RoutersRouters
Routers
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Jatinder Singh
Jatinder SinghJatinder Singh
Jatinder Singh
 
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
 

Similar to Skyjacking A Cisco WLAN - What it means and how to protect against it?

Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
vfmindia
 
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Yury Chemerkin
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
phanleson
 
ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_final
Abhishek Singh
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?
Tũi Wichets
 
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Advantec Distribution
 

Similar to Skyjacking A Cisco WLAN - What it means and how to protect against it? (20)

Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
Gaweł mikołajczyk. holistic identity based networking approach – an irreducib...
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
ht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_finalht-f02-inside-the-world-of-java-applets_final
ht-f02-inside-the-world-of-java-applets_final
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
FIREWALL
FIREWALLFIREWALL
FIREWALL
 
Wlan security
Wlan securityWlan security
Wlan security
 
Fudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to InternalsFudcon 2015...Wireless: From Basics to Internals
Fudcon 2015...Wireless: From Basics to Internals
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?
 
physical and hardware security(http://4knet.ir)
physical and hardware security(http://4knet.ir)physical and hardware security(http://4knet.ir)
physical and hardware security(http://4knet.ir)
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3
 
609 618
609 618609 618
609 618
 
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...
 

More from Samir Palnitkar

Order confirmation email
Order confirmation emailOrder confirmation email
Order confirmation email
Samir Palnitkar
 
Facebook shopping community_app
Facebook shopping community_appFacebook shopping community_app
Facebook shopping community_app
Samir Palnitkar
 

More from Samir Palnitkar (7)

Palnitkar - JMT, 230 miles (370 km) - Aug 11-30, 2021
Palnitkar - JMT, 230 miles (370 km) - Aug 11-30, 2021Palnitkar - JMT, 230 miles (370 km) - Aug 11-30, 2021
Palnitkar - JMT, 230 miles (370 km) - Aug 11-30, 2021
 
Social login scenarios
Social login scenariosSocial login scenarios
Social login scenarios
 
Order confirmation page
Order confirmation pageOrder confirmation page
Order confirmation page
 
Order confirmation email
Order confirmation emailOrder confirmation email
Order confirmation email
 
Facebook shopping community_app
Facebook shopping community_appFacebook shopping community_app
Facebook shopping community_app
 
Social analytics module
Social analytics moduleSocial analytics module
Social analytics module
 
Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?Skyjacking A Cisco WLAN - What it means and how to protect against it?
Skyjacking A Cisco WLAN - What it means and how to protect against it?
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Skyjacking A Cisco WLAN - What it means and how to protect against it?

  • 1. Webinar held on 02 Sept, 2009 *Webinar Press Release URL : http://digg.com/d3130SK ! " !
  • 2. In the News Cisco wireless LAN vulnerability could open ‘back door’ Cisco wireless LANs at risk of attack, ‘skyjacking’ Newly discovered vulnerability could threaten Cisco wireless LANs
  • 3. What Cisco says Severity = Mild “No risk of data loss or interception” “Could allow an attacker to cause a denial of service (DoS) condition” It’s not a big deal!
  • 4. Hmm… How severe is the exploit? What exactly is skyjacking? ? ? Do I need to worry about it? ?
  • 5. What you will learn today The risk from skyjacking vulnerability is much bigger than stated How to assess if you are vulnerable Countermeasures for skyjacking and other zero-day attacks
  • 6. Five ways a LAP can discover WLCs Subnet-level broadcast Configured Over-the-air provisioning (OTAP) DNS DHCP
  • 7. Three criteria a LAP uses to select a WLC Step 1 Primary, Secondary, Tertiary Step 2 Master mode Step 3 Maximum excess capacity
  • 9. OTAP exploited for “skyjacking”
  • 10. Skyjacked LAP denies service to wireless users
  • 11.
  • 12. Secure WLAN enterprise access Before SSID Security VLAN Comment Corp WPA2 20 Internal to corporate network AP Physically 30 Internal to corporate network Connected To
  • 13. Authorized LAP skyjacked – DoS Before SSID Security VLAN Comment DoS Corp WPA2 20 Internal to corporate network AP Physically 30 Internal to corporate network Connected To
  • 14. Authorized LAP turned into Open Rogue AP Before Rogue on SSID Security VLAN Comment Network Corp OPEN 30 Internal to corporate network AP Physically 30 Internal to corporate network Connected To
  • 15. Camouflaged Rogue LAP: a backdoor to your enterprise network!
  • 16. Wolf in Sheep Clothing Before Rogue on SSID Security VLAN Comment Network Corp WPA2 30 Internal to corporate network AP Physically 30 Internal to corporate network Connected To
  • 17. Wolf in Sheep Clothing – Scenario 2 Before SSID Security VLAN Comment DoS Corp WPA2 20 Internal to corporate network Guest OPEN 30 Internal to corporate network Rogue on AP Physically 30 Internal to corporate network Network Connected To
  • 18. SpectraGuard® Enterprise WLAN policy set-up Guest WLAN SSID Allowed Subnet (VLAN) for Guest SSID
  • 19. Normal WLAN operation Device list displayed on SpectraGuard Enterprise console Authorized SSIDs are seen in “Green” color and are detected with VLAN identifier to which they connect
  • 20. Skyjacking on guest access 1 Change in the VLAN is detected SSID marked as “misconfigured” 2 (Background changes to amber) Automatic Prevention started 3 ( Shield icon appears )
  • 21. Summary AirTight’s unique wireless- Type of Skyjacking attack Only over-air wired correlation based Open rogue threat detection threat detection Authorized SSID as Open Rogue AP WPA2 rogue Authorized SSID as “Privileged” Rogue AP X (Wolf in Sheep clothing) Open guest Guest access as Open rogue Rogue AP (Wolf in Sheep clothing – X scenario 2)
  • 22. AirTight’s SpectraGuard Enterprise The only WIPS that can provide zero-day protection against the most potent form of skyjacking attack Thanks to patented marker packet technology for accurate wired connectivity detection and unique VLAN Policy Mapping™ architecture
  • 23. Which LAPs can be skyjacked? Type of Cisco LAP Vulnerable? LAPs using auto discovery Yes Configured with “preferred” WLCs ? (primary, secondary, tertiary) Mostly No Configured with locally significant No certificates (LSC)
  • 24. Countermeasures Turn off OTAP on WLC Ineffective! Manually configure LAPs with preferred Primarily HA and load WLCs (primary, secondary, tertiary) balancing feature Manually configure LAPs with LSCs Impractical Block outgoing traffic from UDP ports Not a common 12222 and 12223 on your firewall practice
  • 25. Practical difficulties: Do you know If all LAPs are configured with primary, secondary and tertiary WLC? If all LAPs are indeed connected to configured WLCs? If your outgoing UDP ports on the firewall are blocked? Did you test it today? How many VLANs do you have authorized for wireless access? Are all SSIDs mapped to the correct VLANs? When was the last time your LAPs rebooted? When was the last time your WLC taken down for maintenance? If all your APs are compliant with your security policies? How do you know?
  • 26. One mistake and you could be exposed!
  • 27. Adding second, independent layer of WIPS protection Zero-day attacks Misconfigurations Undesirable connections Zero-day attacks Undesirable Misconfigurations connections Designed for security Designed for WLAN access
  • 28. AirTight’s SpectraGuard product family Complete Wireless Intrusion Prevention Industry’s Only Wireless Security Service Wireless Security for Mobile Users WLAN Coverage & Security Planning
  • 29. About AirTight Networks For more information on wireless security risks, best practices, and solutions, visit: http://www.airtightnetworks.com The Global Leader in Wireless Security and Compliance Visit our blog to read the root cause analysis of “Skyjacking: What Went Wrong?” http://blog.airtightnetworks.com