Description: IEEE 802.11 is a suite of standards which govern WiFi protocols. In the original draft of IEEE 802.11, only WEP security mechanism was mentioned. WEP was inherently flawed with many problems like bad key management, no good integrity and replay check, weak encryption, small IV space and so on. The 11i amendment was a major security ammendmant to the standard which used WPA-2 AES mechanisms for robust security. But 802.11i was applicable to data packets only and management and control packets were still clear text. <p> With the inception of 802.11h, 802.11k, 802.11e etc. lot of sensitive information like fast handoffs, network resource management, block acks etc flows over management frames esp. action management frames. The denial of service attacks like De-Authentication and Dis-Association attacks are also based on management frames, which even more increased the need of providing some security to management frames. The IEEE 802.11w is a standard for providing security to management frames. </p> <p> The IEEE 802.11w TG has several challenges to overcome, however. To protect the confidentiality of management traffic, IEEE 802.11w assumes that the client and the access point have exchanged dynamic key content. This precludes the protection of any management frames prior to the delivery of key content, thus exposing network name (SSID) information and other capability information needed for clients to connect to the network. Maintaining backward compatibility for non-IEEE 802.11w-compliant wireless devices will also be challenging for organisations, limiting the protection afforded by 802.11w until all hardware has been upgraded to support the required functionality.</p> <p> Cisco has come up with its proprietary pre-standard solution called Management Frame Protection (MFP) which is supported in WLC-4.1 and higher. The video tutorial will concentrate on the exact implementation of the standard along with introduction to Cisco-MFP protocol. I along with my 2 friends have submitted the vulnerability with Cisco-MFP for this years Defcon16 hackers conference. I will upload the Defcon16 video on Cisco-MFP vulnerability as it is available. </p>Proper functioning of Enterprise and operator-deployed 802.11 APs and STAs requires that the management frames are transmitted with certain security properties. For instance, guarantees of source authentication, which ensures that the receiver can detect forgery attacks; confidentiality, which prevents eavesdropping attacks; and integrity protection, which prevents against in-flight modification of messages, are very important. Without these assurances, multiple attacks can be launched against the IEEE 802.11 WLANs, for instance:
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.