Skip to main content

Wireless and Cellular Networks

Wireless Networks:

  • Li-Fi: Uses light for communication, boasting speeds that surpass Wi-Fi.

  • Zigbee: A low-energy wireless protocol tailored for IoT devices.

  • Satellite: Leverages orbiting satellites for communication.

Zigbee Personal Area Network Devices

(PAN)
  • Description: A short-range wireless PAN technology tailored for automation, machine-to-machine communication, remote control, and IoT device monitoring.

  • Security Features:

    • Supports both centralized and decentralized security models.
    • Relies on securely transmitted symmetric keys (typically encrypted in-transit).
  • Potential Vulnerability: During the pre-configuration phase, there's a brief window when a single key might be transmitted without protection.

  • Use Cases: Commonly found in IoT and smart home hubs (Amazon Echo, Philips Hue Lights)

FirewallsBluetooth & IEEE 802.15

Definition: Bluetooth falls under the IEEE 802.15 standard, commonly known as a Personal Area Network security devices that monitor and filter incoming and outgoing network traffic based on an organization's previously established security policies.(PAN).

FunctionUsage:

  • Bluetooth connects devices such as cell phone headsets, mice, keyboards, GPS, and many other gadgets.
  • Bluetooth has historically been a target for various exploits, making it a significant wireless security concern. Bluetooth's many vulneraries can be seen with a quick "Bluetooth exploit" Google search.

Connection Setup:

  • FiltersDevices trafficconnect basedvia pairing, where a primary device scans for other devices on predefinedthe security2.4GHZ rules.radio frequency.

  • Help

    Pairing typically uses a 4-digit code. This is not primarily a security feature, but rather to protectingprevent networkedaccidental systemsconnections.

    from
  • unauthorized
access.

Mobile System Attacks: Bluetooth Vulnerabilities


Bluejacking (Annoyance)

Definition: Bluejacking is akin to a digital prank, similar to the real-world "ding-dong-ditch."

How it works:

  • Tech-savvy individuals push unsolicited messages to other Bluetooth users within proximity.

  • CanThe beintent hardware-based,is software-based,often to annoy or playfully engage them.

  • This exploits a combinationloophole ofin both.Bluetooth's messaging options.

Firewalls, being the cornerstone of network security, come in various flavors. Let's delve into each type mentioned and address your specific questions:

Types of Firewalls:

  1. Static Packet-Filtering Firewalls: Operate primarily on OSI layer 3 (Network Layer) and look at packet headers to determine whether to allow or drop a packet based on predefined rules.

  2. Application-Level Firewall (Proxy Firewall): Operates on OSI layer 7 (Application Layer) and inspects the content of the traffic. It can block specific applications or services.

  3. Circuit-level Firewall: Operates at the session layer (OSI layer 5) and determines if a sessionBluejacking is legitimate.more Anabout examplemischief isthan thecausing SOCKS protocol.harm.


  4. Stateful Inspection Firewall: Monitors the entire communication process and makes decisions based on the context or state of the communication.

  5. Deep Packet Inspection

    Bluesnarfing (DPI)Data Firewalls: Inspects both header and payload content of each packet. It can detect non-compliance with protocols and block malware, spam, or intrusions.

  6. Stateless Firewalls: These make decisions based on static values and are unaware of traffic patterns or data flow.

  7. Stateful Firewalls: They monitor traffic streams from end to end and are capable of recognizing and remembering previous traffic.

  8. Web Application Firewall (WAF): Specifically designed to protect web applications. Examples with pre-configured OWASP rule sets include Cloudflare, ModSecurity, and AWS WAF.

  9. Next-Generation Firewall (NGFW): Incorporates traditional firewall capabilities with advanced functionalities like DPI, intrusion detection, and real-time threat intelligence.

  10. Unified Threat Management (UTM): All-in-one security solutions that include multiple security features. They're best suited for SMBs.

  11. NAT Gateway: Used to enable devices in a private subnet to initiate outbound IPv4 traffic to the internet or other AWS services.

  12. Content/URL Filter: Filters web content based on categories or specific sites, preventing users from accessing harmful or inappropriate content.

Open Source vs. Proprietary Firewalls:

Open Source: Tools like pfSense and iptables are open-source, meaning you can inspect the code. They might lack official support, but communities and third parties might offer help.

Proprietary: Companies like Cisco, Fortinet, or Palo Alto Networks offer proprietary firewalls. These often come with advanced functionalities, support, and integrations, but at a cost.

Hardware vs. Software Firewall:

Hardware Firewall: Physical devices designed specifically for filtering network traffic. They can handle large volumes of traffic and are positioned between a local network and its connection point to the outside world.

Software Firewall: Installed on individual devices, like computers or servers. A host-based firewall is a type of software firewall. They are more susceptible to attack vectors due to the vulnerabilities of the underlying OS or software. Malware or attackers that compromise the host can potentially disable or alter the firewall.

Application vs. Host-Based vs. Virtual:

Application: Often catered to a specific type of traffic. NGFWs can sometimes be classified here. 

Host-Based: Installed directly on a device. Windows Firewall, Whonix (the gateway specifically), or ufw on Linux are examples.

Virtual Firewalls: Deployed as virtual appliances in virtualized environments or cloud platforms. Both Cloud Service Providers (CSPs) and traditional firewall vendors may offer these.

Switch

Theft)

Definition: A deviceserious thatthreat connectswhere unauthorized users wirelessly connect to early Bluetooth devices togetherto onillicitly a computer networkaccess and usesmanipulate packet switching to forward data to its destination.data.

FunctionHow it works:

  • EfficientlyThe deliversattacker trafficstealthily connects to specificthe devices.device without the owner's knowledge.

  • OperatesOnce primarilyconnected, onthey OSIcan Layerdownload 2and (sometimeseven Layeralter 3).data.

Bluesnarfing directly jeopardizes user data and privacy.


Bluebugging

Definition: A more advanced form of Bluesnarfing where attackers gain comprehensive remote control over a Bluetooth device.

How it works:

  • The attacker exploits vulnerabilities to control various features and functionalities.

  • CreatesThis separatecan collisioninvolve domains,activating optimizingmicrophones, datausing throughput.the phone as a surveillance tool, or manipulating device settings.

UnlikeBluebugging hubsprovides thatattackers broadcastwith toan allalarming ports,amount switchesof targetcontrol specific MAC addresses.


Routers

Devices that forward data packets between computer networks.

  • Directs traffic between different networks.
  • Uses static or dynamic routing tables to determineover the bestvictim's path for data.

Gateways

Devices that connect two different networks using different protocols.device.

  • Often termed "protocol translators".
  • Operate at OSI Layer 3.
  • Can be standalone hardware, software services, or both.

Repeaters, Concentrators, & Amplifiers

Devices designed to extend the reach of or strengthen a communication signal over a network segment.

  • Enhances the signal over cable segments.
  • Operates at OSI Layer 1.

Bridges

Devices that connect two or more network segments, making them function as a single network.

  • Can connect networks with different topologies or cabling types.
  • Operates at OSI Layer 2.

Hubs

Basic networking devices that connect multiple devices in a LAN.

  • Broadcasts data to all connected devices.

  • Essentially acts as a multiport repeater.

  • Operates at OSI Layer 1.

More commonly found in home networks than in business settings due to their limited efficiency.


LAN Extenders

Devices that facilitate the connection of distant LANs over WAN links. Enables LANs to span larger geographic distances.