Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

WAYS OF STEALING AND

SECURING SCIENTIFIC DATA.


DEFECTS AND GOOD SOLUTIONS IN NETWORK
SECURITY SYSTEMS.

Primary author:
Mateusz Zaborski (Warsaw University of Technology)
Co-authors:
Krystian Roson (Warsaw University of Technology)
Adam Kozakiewicz (Warsaw University of Technology)

Plan
Hospital in Hollywood why protect data?
Ransomware

WiFi (un)security
Attacks
Open source sollution
Unsolved problems

Secure connection via Internet


IPsec
Attacks

Hospital in Hollywood
Ransomware

Inteligent malware

zero-day

Disks, pendrives, dropbox , etc. encrypted

Hollywood Presbyterian Medical Center

Februar 2016
17000 $ ransom
Source: www.trendmicro.com

WiFi (un)security
802.11

WEP

WPA

AES 128/192/256 encryption


No vulverabilities (serious)

WPA2

WiFi (un)security
802.11

WEP

WPA

WPA2

More comfrotable standard


In each common router
PIN method highly vulnerable
Security improvments publicated in 2014

WPS

WiFi (un)security

WiFi (un)security
Kali linux 2.0

Alfa AWUS05NH

Tests
TP-LINK MR3420 v1.2

Tests
Many routers to hack under 10h (online attack)
Some routers to hack in few minutes (offline attack)
Only few routers are secure with default configuration

Secure router- openWRT


TP-LINK MR3420 v1.2

OpenWRT Chaos Calmer 15.05 (modified by me)

Secure router- openWRT

Stronger than recommended security issues (WPS off)


Security features implemened BEFORE official standard
Good entropy of pseudorandom generator
Still no automatic update
Still ARP has no encryption

Secure connection
via Internet (VPN)

IPsec
Standard described by protocols
Many methods, modes
Many implementations
Included in IPv6

IPsec tunnel mode

IP
header

data

IPsec tunnel mode

IP
header

ESP
header

IP
header

secret data

ESP
trailer

ESP
auth

IPsec tunnel mode

IP
header

ESP
header

xxxxxxxxxxxxxxxxxxxx

ESP
trailer

ESP
auth

Man in the middle attack

data

xxxx
data
xxxx

Man in the middle attack


xxxx

data

xxxx
data
xxxx

data

data

xxxx

Relay attack

Increase speed

xxxxxx

Relay attack

Increase speed

xxxxxx

xxxxxx

xxxxxx
xxxxxx

Secure connection
via Internet (VPN)
Random numbers
Sequence
Key negotiation
Performance
Cipher

Packet fragmentation

MITM attack

Certificates

HMAC functions

Collisions

Backdoor

Tunnel or transport mode

IPsec or SSL

Thank you for attention

You might also like