CWNP CWSP – Module 02 – Legacy Security

  1. Demo – Security Associations Part A

So what we’re going to do right now is look at some of the options that we have for the types of security. And the two that we talked about in this module was the open authentication and the use of Web. And so I would like to demonstrate both of those. So what we see here is I’m going to go into the well, I guess I have to log back in. Let me open this back up again. So I’m going to go to the security options. None. That should be the open authentication. I’ll apply it. It’ll take a couple of seconds for the settings to be updated as it’s updating our wireless access point, as you can see here, updating the settings and then when that’s done, we’re going to see what it takes to associate with that particular card or I should say with that access point, which shouldn’t be anything. So once we get those updated settings now one you’re going to see is I’ve named the SSID for this particular access point is just plain old netgear. So that’s the one I’m going to connect to.

And with the none setting, as you saw, I should be able to get right on there right away. Now here, let’s see, there is the netgear. So notice as I put this up here and hover over it, it says the signal strength is excellent. It should it’s about 3ft from me. Security type tells you that it is unsecured and that’s part of the management frames that are going back and forth between my computer and the access point where they talk about what security settings that they want. Now I don’t know if I want to try to connect just yet. I’m waiting for the settings to finish updating and sometimes it does take a little bit of work for these to come back. There we go, security options. So I’ll click on Connect and there you can see that it asked me for no passwords whatsoever and let me make that connection. And just to make sure if I go to attached devices, you can see that there’s actually I have a wired and wireless connection. This 1003 IP address is the wireless network card and that’s the Mac address for the wireless network card. So we made it there. We got to that point of the security. The next one we talked about was Web. Now with Web, remember what it does is it creates up to four separate passwords.

I don’t even want to call them passwords, but encryption keys. And as long as you use one of those keys when you make the connection, we should be good. In fact, just to double check, let me disconnect from that gear as far as the passphrase, it can be anything that you want. So we’ll just make the saying security is good and generate some of these random again hexadecimal values and I’m going to just highlight it and copy it so I don’t have to write this down and remember what it is. And I do have to apply my changes again. So one more time, it’s going to go through the updating of the settings to use Web, the wired equivalency protocol, and when it’s done with that, I will try to reassociate with that particular wireless network. But I should be prompted for putting in the encryption key and I have to have, of course, the right key, otherwise I’m going to fail. Now remember, as we said in this module, that is not a type of authentication.

It really is just about encrypting the data that’s going back and forth from me to that access point. And when that’s done, I’m actually going to type it in wrong just so you can see the error message. And then I’ll type it in correctly so you can see that it shows up as successful as we’re going through trying to use WEP. And I really only need to have one of those four keys. As we said, everybody can use the same key. The weakness, of course, with Wet, besides it being easy to crack, the weakness is that some people may share that key with others that are in the office or nearby. And they would have, I don’t say unauthorized connections, but as far as the access point is concerned, it would be authorized because they knew the key. So couple more seconds here while I wait for it to finish updating the settings.

  1. Demo – Security Associations Part B

All right, so we have the security options as being WEP I copied this key and what I’m going to try to do is connect to Netgear and we don’t want to connect automatically. And from that we’re going to do a little paste. And like I said, I’m going to put the wrong value in. I’m just going to get rid of that last character and click on over. Okay. Hoping to get a message that says that was not the right one. At least a little pop up that says couldn’t connect to that network. And if that’s the case, I’ll put the other one yes. Couldn’t connect to negatives. All right, so let’s try it again. Now remember that these values for Web are hexadecimal, which means that they are not case sensitive. So if you wanted to make a lowercase B, that would have been fine. It looks like.

I didn’t like that one primarily. Let’s try one more time. Oh, and by the way, if you are ever worried about somebody eavesdropping and watching you over your shoulder, you can always do this little hide characters and type it in so they can’t see what you’re doing. And it looks like now we’re successful in having Internet access to Netgear. Now one of the things to remember is that in the way I’m playing around with this is that as I’m going through this, these settings are remembered by Windows.

And if I start doing some of these other security options that you see over here and making the changes, I very well could have a problem with Windows telling me that the credentials that they had before don’t work. So one of the things you can do is you can go over to Control Panel actually, that’s not Control Panel or you can right click on your network card, go to the Open Network and Sharing Center, and go over here to manage wireless networks. And if you have any that are saved, they’d be in a list right here. And you could basically obviously I don’t have any because I didn’t do a connect automatically, but if I did, then you could click on it in this list and delete it.

And that sometimes gets rid of those previous settings. That’s a little bit of annoyance. That’s an issue with, obviously with Windows and what they’re doing. So here if I disconnect and then come back here and put this connect automatically, let’s see if it’s going to now, right, let us do it and then we’ll go take a look and see if it saved that network. All right, so I’m connected and I come back over here, go to my managed wireless networks. There you go. That’s what I was getting at is that you can then just remove it as you need to so you don’t have to keep it in there forever. So that’s just a side note. Now remember with Web, we did say that they have the option of 64 bit to 128 bit keys. If I’m doing 128 bit key, let’s see what happens if I put in security as good. Again, generate and see if that change step. See, so now we have a much longer key to have to put in there.

And again, it’s hexadecimal. So every two well, every number represents four bits. So if you were to see how many of these you have and probably do the math, you’d come up with 128 bit. So those are the options that we talked about early on, which was the no security and the web security and how we generate these keys. And everything I said, of course, about web is something to remember. It’s not the best choice, not as secure as you’d like it to be. Still comes in with the 6428 bit, in this case, authentication types as auto. I could have done a shared key, I suppose, but right now I just wanted to present how we could do the open authentication. The none. Looks like it’s going to ask me to reauthenticate myself to this thing. There we go. I’m or like I said, we could have done the web. And those are the two types that we covered when we went through this module of some of the legacy types of security or maybe no security.

  1. Demo – MAC Spoofing

So we’re going to do is talk about Mac spoofing and how that can defeat your attempt to do Mac filtering. Two topics that we talked about in this module. To start with, what I’m going to do is go to the Start button. Those of you winning Windows Eight, you probably missed your Start button. Type in CMD to bring up my command prompt. You can do that on windows eight. If you go over to the far right of your screen and go to the Search Charm and the command Ipconfig All is what I’m going to use. What we can see when we do that Ipconfig All is we are seeing all of the settings. For example, with the Ethernet wired connection, we see I had to do a right click, by the way, here, to be able to copy and paste you right click and click on Mark, and then you highlight it, hit Enter. But we can see the Mac address for the local area connection two card.

And if I continue on here to the wireless connection two, you can also see that particular address for the wireless card. And what you would do is at least here on this netgear under Advanced Wireless Settings, I click on Set up Access Control. I could turn on Access Control, and if I clicked Add, I could say, well, in fact, there you can already see that it found my wireless card. So I could just click on that and say, that’s the one I want to block. But to be safe, because I don’t want to lose all my connections, I’m going to put it in with the information I have from the wired card. And it looks like I’m missing the last digit on the wired card. So let me go back and see what it was. E. I probably didn’t copy and paste the right way. And if I add that in there, oh, yeah, invalid Mac address because it is a wired Ethernet card and there are some restrictions with Windows when it comes to what the Mac address looks like. All right, so you can see that this is what I wanted to do was just show you that we could block it. Same thing with this Mac address, right? I could block that as well.

So I’m going to hit cancel and turn off the access control. But the goal was that once I know that Mac address, then my access point, when somebody with that Mac address tries to make an association, my access point would block it. It would say, no, you can’t do that and make that connection. So what I wanted to do was show you why it’s maybe not the most effective, because again, we can sit there and block them. But let me just as an example, on the wired card, the local area connection, too, when I right click it and I go to its properties and then under the name of the actual network card, click on Configure, come over to Advanced, and then go over to Network Address. Now, not present means that it hasn’t been set, but I can set it to be anything I want to. So if I decided to make it Face Feed, by the way, you can always have fun when you’re doing Exadcimal, right? Oh, that’s too big. Hold on a second. We can only have six bytes.

  1. All right. Five, six bytes. And I click on OK. Now, when I did that, the local card disconnects reconnects. All right, so we’re back. And if I come over here to again and type my Ipconfigall and take myself back to that card see, it is now Face Feed. So that’s just easy to change your Mac address. Now, the wired cards are much easier than the wireless cards. There are some problems with the wireless cards, at least in Windows. Windows demands that I think the second character be one of four values. Otherwise, it doesn’t work. It also depends on the driver of your card.

So, as an example, if I right click on this card and go to its properties, and I click on Configure again, and I go to Advanced, I don’t have the option to change the Mac address. Windows is pretty picky about what it does with WiFi. So what I wanted to show you is that you can download a tool like Spoof Mac. Oh, didn’t like what I was doing there. Insufficient Mac recurring full control permissions. Oh, I do have full control of the permissions. Let me reset this. Reinstall this software should only take a second to reinstall it, and then it should hopefully open it up, because I was just running it a little bit ago. There we go. And I’ll proceed with the trial. So this is a trial version, and what it’s designed to do is where I can’t make the change. Maybe I can make it in the Registry, but I don’t want to search for the Registry.

And there’s plenty of tools like this evaluation mode. You can pick which card it is. You could type in the new Spoof Mac address. You can see I’ve got this Face Feed 101 that I wanted to do here. But the problem is that with the wireless card and with this particular tool, it will only allow me to use this specific Spoof Mac address. It won’t actually let me use the one I want to type in. So if you paid for this tool, you could actually type it in, click on the update Mac, and then what it would do is actually reboot your network card and let you have a new Spoof Mac address anyway.

And it’s just letting you know that, again, if you turn on this access control, like I said, and once you turn on the access control, you don’t see the card right now because it’s rebooting. But when you turn that on and you start filtering. It doesn’t take much for me to listen to those Mac addresses that are transmitting and then just spoof my Mac address to one of those that are approved. So there’s many ways to spoof and to defeat the Mac filtering, but still it is one more step. When we think of security maybe I haven’t said this enough, but we think of security in depth, meaning that we add many little things that might be easily defeated. But what we’re trying to do is make everything difficult for a hacker to be able to break in to our systems and hopefully just give up and go to somebody who might not have put in as much thought about security.

  1. Module 02 Review

All right, so in this module, we covered a lot of legacy information. We talked about some of the authentication, open system authentication. We talked about web encryption, shared key authentication. We talked a lot more about what WEP has, especially the attacks and its weaknesses. We talked about VPNs and how the VPN tunneling protocols back then were a good solution over Web. We also talked about some of the other little tricks of security like Mac filters, SSID cloaking, and then SSID segmentation. Still very important for today’s world. But it does fall back into the old legacy things that we were doing before we started moving into things like WPA two.

img