Overview
This lecture covers common network threats such as rogue DHCP servers, rogue access points, and on-path attacks, along with methods to detect and protect against them.
DHCP Vulnerabilities and Protection
- DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and network configuration to devices.
- DHCP lacks built-in security; any device can respond to DHCP requests.
- Rogue DHCP servers can assign duplicate or invalid IP addresses, disrupting network communication.
- DHCP snooping on enterprise switches only allows DHCP responses from authorized servers.
- Microsoft Active Directory can restrict DHCP server authorization.
- Removing rogue DHCP servers and renewing network IP addresses restores legitimate network access.
Rogue Access Points and Wireless Threats
- Rogue access points are unauthorized Wi-Fi devices connected to the network, sometimes installed innocently by users.
- These can create security risks by enabling unauthorized network access.
- Devices with wireless sharing features can turn themselves into access points.
- Network scans and wireless analyzers can help detect unauthorized access points.
- 802.1X (Network Access Control) requires authentication before network access, preventing unauthorized access points from joining the network.
Wireless Evil Twin and On-Path Attacks
- A wireless evil twin mimics legitimate access points to trick users into connecting.
- Evil twins may use similar SSIDs, security settings, or captive portals, and often have higher signal strength.
- Encrypted traffic (VPN or HTTPS) reduces the risk if you connect to an evil twin.
- Evil twins enable on-path (man-in-the-middle) attacks, intercepting and possibly altering communications between devices.
- Other on-path attacks include ARP poisoning, session hijacking, and Wi-Fi eavesdropping.
- Encrypting all network traffic helps protect against on-path attacks.
Key Terms & Definitions
- DHCP (Dynamic Host Configuration Protocol) — Protocol that assigns IP addresses and network information to devices automatically.
- Rogue DHCP Server — Unauthorized server assigning incorrect or duplicate network settings.
- DHCP Snooping — Security feature that blocks DHCP responses from unauthorized servers.
- Rogue Access Point — Unauthorized wireless device providing network access.
- 802.1X / Network Access Control — Authentication method restricting network access to authorized users/devices.
- Wireless Evil Twin — Malicious access point imitating a legitimate one to intercept traffic.
- On-Path (Man-in-the-Middle) Attack — Attacker secretly intercepts or changes communications between two parties.
- ARP Poisoning — On-path attack method that tricks devices about network addresses.
Action Items / Next Steps
- Regularly scan for rogue DHCP servers and access points.
- Enable DHCP snooping and 802.1X on network devices.
- Always use VPN or HTTPS to encrypt network traffic, especially on public or unknown Wi-Fi networks.