• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • JBL Flip 6 Portable Bluetooth Speaker (Open Box) for $74

    JBL Flip 6 Portable Bluetooth Speaker (Open Box) for $74
  • Navee V25 300W Foldable e-Scooter for $299

    Navee V25 300W Foldable e-Scooter for $299
  • Smart Tracker Includes Key Ring – Works with Apple Find My App (2-Pack) for $34

    Smart Tracker Includes Key Ring – Works with Apple Find My App (2-Pack) for $34
  • Harmony Premium Plan Lifetime Subscription for $99

    Harmony Premium Plan Lifetime Subscription for $99
  • Lenovo 11.6" 100e Chromebook 2nd Gen (2019) MediaTek MT8173C 4GB RAM 16GB eMMC (Refurbished) for $54

    Lenovo 11.6" 100e Chromebook 2nd Gen (2019) MediaTek MT8173C 4GB RAM 16GB eMMC (Refurbished) for $54
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Having Confidence in Your Wireless Security

Sep 22, 2021 by iHash Leave a Comment


As each day passes, wireless security becomes even more critical to the day-to-day operations of organizations. Several factors contribute to the growing need for reliable security. With the introduction of Wi-Fi 6, many organizations are shifting from a primarily wired infrastructure to one that focuses on worker mobility through wireless connectivity. While the CAPEX and OPEX savings are compelling, increasing wireless traffic provides a larger attack surface – and greater opportunity – for hackers.

The Challenges of Wireless Security

As might be expected, there has been a significant increase in the number and complexity of cyberattacks. Distributed Denial of Service (DDoS) attacks alone are up 33% from last year, with a 37% increase in attack bandwidth.

One of the challenging aspects of wireless security is that communications can be captured passively. For example, when a client connects to an access point utilizing WPA, there is a 4-way handshake that takes place. Because the handshake occurs wirelessly, an attacker can passively listen in and capture this handshake. Due to the nature of wireless communications, there is no way to detect or prevent passive capture.

The next stage for the attacker is to use offline resources to attempt to brute force or wordlist attack the handshake to determine the passphrase. The attacker can then use this passphrase to de-authenticate the original client and connect with the access point in its place.

Advanced Security for Advanced Threats

Cisco’s Advanced Wireless Intrusion Prevention System (aWIPS) and Rogue Management is a fully infrastructure-integrated solution that constantly monitors radio spectrum to detect, analyze, and thwart attacks. By incorporating signature-based techniques, traffic analysis, and anomaly detection, the aWIPS and Rogue Management solution is able to provide an intuitive Wi-Fi threat detection and prevention system designed to solve the critical security needs of modern networks. Together, Cisco’s aWIPS and Rogue Management provides security against a plethora of attacks like DoS attacks, management frame attacks, tool-based attacks, and more (see Figure 1).

System overview of Cisco Advanced Wireless Intrusion Prevention System (aWIPS) and Rogue management.
Figure 1: System overview of Cisco Advanced Wireless Intrusion Prevention System (aWIPS) and Rogue management.

While it is not possible to detect or prevent the passive capture of a handshake, the system is able to detect when an attacker tries to use a passphrase to de-authenticate an already connected client. At this point, aWIPS identifies the de-authentication attack and creates an alert so IT and the network can take action. For example, the Cisco Identity Services Engine (ISE) could apply policies for downgrading the trust score of the device launching the de-authentication attack to prevent access to the network and minimize its impact on operations.

Independent PEN Testing and Certification by Synopsys

The wireless team at Cisco has extensive experience understanding, identifying, and preventing wireless attacks. Our security solutions are tested to the latest threat standards. However, we have not relied solely on our own internal testing to verify that aWIPS and Rogue Management provide best-in-class wireless security.

Recently we engaged Synopsys to perform a wireless network penetration test to assess the functionality of aWIPS and Rogue Management. The test system consisted of Cisco C9130 and Cisco C9120 access points connected to a Cisco Catalyst 9800 Wireless LAN controller.

Synopsys assessed how the aWIPS and Rogue Management system identified common attack vectors over a three-week period. The test used a timeboxed approach of passive reconnaissance, active exploitation, and targeted manual penetration. The test assessed how the Rogue and aWIPS systems identified a wide range of attacks, including:

  • WPA2/WPA3 attacks
  • De-authentication attacks
  • AP spoofing attacks
  • Authentication attacks

Among its findings, Synopsys verified that Cisco’s Rogue Management was successful at preventing other access points from operating in the vicinity of the access points under test. This was achieved reliably by sending de-auth packets to the other access points’ clients and effectively preventing multiple access points and multiple clients from communicating simultaneously.

Synopsys also showed that Cisco’s aWIPS technology triggered an alert whenever a de-auth packet was sent against an aWIPS-enabled access point by another station (i.e., an unauthenticated client). Again, the passive nature of these attacks makes it impossible to prevent them. However, aWIPS successfully identified attacks so that risks to the network would not pass unnoticed.

Securing the Future

The shift to an increasingly mobile workforce continues to increase the complexity – and the necessity – of keeping the network secure. To keep peace of mind now and into the future, organizations need a security solution they have confidence in.

Learn more about how Cisco’s aWIPS and Rogue Management solution can protect Wi-Fi and wireless security for your organization. For a comprehensive demo, reach out to your Cisco sales representative.

 

Check out our Intent-Based Networking video channel.

Subscribe to the Networking blog

Share:



Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Confidence, security, Wireless

Special Offers

  • JBL Flip 6 Portable Bluetooth Speaker (Open Box) for $74

    JBL Flip 6 Portable Bluetooth Speaker (Open Box) for $74
  • Navee V25 300W Foldable e-Scooter for $299

    Navee V25 300W Foldable e-Scooter for $299
  • Smart Tracker Includes Key Ring – Works with Apple Find My App (2-Pack) for $34

    Smart Tracker Includes Key Ring – Works with Apple Find My App (2-Pack) for $34
  • Harmony Premium Plan Lifetime Subscription for $99

    Harmony Premium Plan Lifetime Subscription for $99
  • Lenovo 11.6" 100e Chromebook 2nd Gen (2019) MediaTek MT8173C 4GB RAM 16GB eMMC (Refurbished) for $54

    Lenovo 11.6" 100e Chromebook 2nd Gen (2019) MediaTek MT8173C 4GB RAM 16GB eMMC (Refurbished) for $54

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Apple introduces News+ Food – Apple

Feb 22, 2025 By iHash

Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

Feb 21, 2025 By iHash

Tags

* Apple attack attacks Cisco cloud computer security Critical cyber attacks cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber updates data data breach Elastic google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware Secure security security vulnerabilities software vulnerability the hacker news Threat update video vulnerability

Latest

Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack

Feb 22, 2025Ravie LakshmananFinancial Crime / Cryptocurrency Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. “The incident occurred when our ETH multisig cold wallet […]

What to do if your WhatsApp is hacked: a step-by-step guide

What to do if your WhatsApp is hacked: a step-by-step guide

Your messaging-app account might be of interest to more than just jealous spouses or nosy coworkers. Stolen WhatsApp accounts fuel large-scale criminal activity — ranging from spam distribution to complex scam schemes. That’s why cybercriminals are constantly on the lookout for WhatsApp accounts — using various methods to hijack them. Here are eight signs your […]

Will AI start taking cybersecurity jobs?

Will AI start taking cybersecurity jobs?

No, but it’s fundamentally changing them. Generative AI (GenAI) is quickly becoming an essential part of everyday security workflows. So … is it a partner or competitor? The wide-ranging implementation of GenAI technologies into virtually every aspect of the security stack has, on the whole, helped security teams work more efficiently to mitigate threats. GenAI […]

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. “The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ‘linked devices’ […]

Build Custom Apps to Solve Tough Security Challenges

Solving for Exponential Data Growth in Next-Gen SIEM

Do you ever feel overwhelmed by the number of data sources you manage with your SIEM? How do you piece together different pieces of the puzzle like SOAR, threat intelligence, and security tools for endpoint, cloud, or identity? Do you actually know which tools are strengthening your security posture, and which are just adding more […]

Major League Soccer kicks off 30th season this weekend on MLS Season Pass

February 18, 2025 UPDATE Major League Soccer kicks off 30th season this weekend on MLS Season Pass on Apple TV Major League Soccer kicks off its 30th season this Saturday on MLS Season Pass on Apple TV, with all 30 teams taking the pitch for MLS is Back weekend. Fans in more than 100 countries and regions can […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2025
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT