Conduct a Security Audit on a Personal WLAN Infrastructure
As the junior member of the Just Ducky network security team, you want to make sure you apply your wireless security knowledge to protect your home wireless network.
• Create your own version of a comprehensive Wireless Security Audit Checklist.
• Select a Personal WLAN infrastructure and obtain written permission to conduct a Security Audit.
• Write your conclusions providing a description of the security posture of the selected WLAN and include recommendations.
Wireless Security Audit Checklist
Wireless Security Audit Checklist
Introduction
Performing a comprehensive security audit on a personal WLAN infrastructure is crucial to ensure the protection of sensitive data and prevent unauthorized access. This checklist provides a systematic approach to assess the security posture of a selected WLAN. The audit should be conducted with written permission from the owner of the WLAN.
Checklist
Network Configuration
Change default SSID and disable broadcasting
Enable network encryption (WPA2 or higher) with a strong passphrase
Disable WPS (Wi-Fi Protected Setup) if not needed
Disable remote management and administration access
Set up a guest network for visitors, separate from the main network
Access Control
Change default admin credentials for the router
Use a strong and unique password for the admin account
Disable unnecessary services and ports
Enable MAC address filtering for authorized devices
Regularly review and update the list of authorized devices
Wi-Fi Protected Setup (WPS)
Disable WPS if not required
If WPS is enabled, ensure it uses a long and strong PIN code
Encryption and Authentication
Use WPA2 or higher encryption protocol for Wi-Fi security
Implement AES encryption instead of TKIP
Use a strong and unique Wi-Fi passphrase
Consider implementing 802.1X authentication for enterprise-grade security
Firmware and Software Updates
Ensure the router firmware is up to date
Regularly check for firmware updates from the manufacturer’s website
Update devices connected to the WLAN to the latest software versions
Firewall and Intrusion Prevention
Enable the built-in firewall on the router
Configure firewall rules to only allow necessary incoming and outgoing traffic
Consider using an additional software-based firewall on connected devices
Physical Security
Place the router in a secure location, away from public view
Restrict physical access to the router by unauthorized individuals
Consider using tamper-evident seals or locks to protect the router
Logging and Monitoring
Enable logging on the router to track potential security events
Regularly review router logs for any suspicious activity or unauthorized connections
Conclusions and Recommendations
Based on the security audit conducted on the selected WLAN infrastructure, the following conclusions and recommendations can be made:
Network Configuration: The network is properly configured with a changed SSID, disabled broadcasting, and enabled WPA2 encryption. These measures provide a basic level of security.
Recommendation: Regularly change the Wi-Fi passphrase to enhance security.
Access Control: Default admin credentials have been changed, and unnecessary services are disabled. However, MAC address filtering is not implemented.
Recommendation: Enable MAC address filtering to restrict access to authorized devices.
Wi-Fi Protected Setup (WPS): WPS is disabled, which is a good practice.
Recommendation: None.
Encryption and Authentication: WPA2 encryption with AES is implemented, ensuring strong security. However, 802.1X authentication is not in use.
Recommendation: Consider implementing 802.1X authentication for enhanced security in an enterprise environment.
Firmware and Software Updates: The router firmware should be regularly updated to patch any vulnerabilities. It is essential to update connected devices as well.
Recommendation: Routinely check for firmware updates from the manufacturer’s website and update devices to the latest software versions.
Firewall and Intrusion Prevention: The built-in firewall on the router is enabled, but specific rules should be configured to allow only necessary traffic.
Recommendation: Review and configure firewall rules to restrict unnecessary incoming and outgoing traffic.
Physical Security: The router is placed in a secure location, but additional measures such as tamper-evident seals or locks could provide extra protection.
Recommendation: Consider implementing physical security measures to prevent unauthorized access to the router.
Logging and Monitoring: Logging is enabled on the router, allowing potential security events to be tracked. Regular review of logs is necessary to detect any suspicious activity.
Recommendation: Establish a regular log review process to identify and respond to any security incidents.
Overall, the selected WLAN infrastructure demonstrates basic security measures, but there are areas for improvement. By implementing the recommended measures, the security posture of the WLAN can be significantly enhanced, reducing the risk of unauthorized access and ensuring the protection of sensitive data.