Chapter 7:
Wireless Network Threats
& Vulnerabilities
Learning Outcomes 2
After this module, a student will be able to:
Describe different types of attackers
Describe the vulnerabilities of WLAN in general
Describe WEP, WPA and WPA2 and their vulnerabilities.
Explain what’s passive attack and what’s active attack. List
two examples of each types attack.
Describe confidentiality, access control, availability,
authentication and integrity attacks on WLAN.
Discuss Bluetooth security features
Describe Bluetooth vulnerabilities and threats
Describe the threat models of the Ad Hoc wireless network
WLAN Vulnerabilities 3
WLAN-Flexibility, cost-effectiveness, & easy of installation
Use of Radio Frequency
Difficult to contain the signals
Vulnerabilities in security standards
Easy to setup often means more network not properly configured
for secure access
Security Standards 4
WEP (Wired Equivalent Privacy)
Created in 1999 by IEEE 802.11b
Provide same level of privacy as that of wired LAN
40/104 bit key are static & IV is short
No effective key management
Encryption algorithm (RC4) Known flaws
Easy target for cryptanalysis
Shouldn’t be used in today’s WLAN
Wi-Fi Protected Access (WPA) 5
Developed in 2004 by 802.11i to address issues of WEP
Use 48bits TKIP
Add Integrity protection
Enterprise and personal mode
Enterprise mode use EAP and 802.1x for access control
and authentication
Backward compatible with old device employs WEP
Still uses RC4
Vulnerable to dictionary, brute force, and DoS attacks
WPA2 6
Successor to WPA, ratified by IEEE 11i in
2004
Most secure security standard available
Replace RC4 & TKIP with AES and CCMP
for encryption and authentication
More seamless roaming
Still have vulnerability
Enterprise Mode Vs. Personal Mode 7
Exist in WPA & WPA2
Same encryption algorithms
Different authentication method
Enterprisemode – 802.1x, designed for
organizations
Personal
mode – pre-shared keys, designed for
home use
Wireless security cheat sheet 8
http://searchnetworking.techtarget.com/feature/Wireless-encryption-
basics-Understanding-WEP-WPA-and-WPA2
Attacks to WLAN 9
Passive attack
Traffic analysis
Active attack
Unauthorized access
Rogue access point
Confidentiality Attacks 10
Traffic analysis
Eavesdropping
Man-in-the-Middle attack
Evil Twin AP
Access Control Attacks 11
War driving
Rogue access point
MAC address spoofing
Unauthorized access
Integrity Attack 12
Session hijacking
Reply attack
802.11 frame injection attack
802.11 data replay attack
802.11 data deletion
Availability Attacks 13
DoS/ Queensland DoS
RF Jamming
802.11 beacon flood
802.11 association flood
802.11 de-authentication
Fake SSID
EAPOL flood
AP theft
Authentication Attack 14
Dictionary & brute force
Shared key guessing
PSK cracking
Application login theft
Etc.
Bluetooth Security 15
Security mode 1
Security mode 2
Security mode 3
Security mode 4
Bluetooth Threats & Vulnerabilities 16
Vulnerabilities
Encryption key length negotiate
No user authentication
Much more
Threats
Bluesnarfing
Bluejacking
Bluebugging
Etc.
Ad Hoc Wireless Network Threats 17
Internal threats
External threats
Routing threats
Reference 18
Praphul Chandra, Bulletproof Wireless Security: GSM, UMTS,
802.11, and Ad Hoc Security, ELSEVIER, 2005.
Jim Doherty, Wireless and Mobile Device Security, Jones &
Bartlett Learning, 2016.
https://www.walshcollege.edu/upload/docs/CyberSpring/
Profile%20of%20a%20Cyber%20Attacker%20Presentation.pd
f
https://thesai.org/Downloads/Volume5No1/Paper_25-
Wireless_LAN_Security_Threats_Vulnerabilities.pdf
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpubli
cation800-121r1.pdf
https://www.utc.edu/center-information-security-
assurance/pdfs/course-paper-5620-ad-hoc-security.pdf