802.11 Exploits Data Communications Benjamin W. Siegel VCU Information Systems.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
SSL Man-in-the-Middle Attack over Wireless Vivek Ramachandran
7/31/2002Black Hat 2002, Las Vegas NV Advanced Attack Mike Lynn & Robert Baird.
Basic Network Security Perimeter devices – Firewall – Intrusion Detection/Prevention System – URL Filter/Web proxy – Spam filter If an attacker successfully.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Time Passes, Security Changes… Christian Huitema Monday, August 1, 2005 IETF, Application Area Meeting.
How To Not Make a Secure Protocol WEP Dan Petro.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Protected Extensible Authentication Protocol
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Configuring the Wireless on Your Configurator Computer.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
WiFiProfiler: Cooperative Diagnosis in Wireless LANs Ranveer Chandra, Venkat Padmanabhan, Ming Zhang Microsoft Research.
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Ch. 2 – and NICs Part 2 – MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Detecting and Responding to Data Link Layer Attacks With Scapy TJ OConnor September.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
9: Troubleshooting Your Network
Penetration Testing: Bypassing UNCW NetReg Vince Tran & Howard Kleinberg 1.
SkyJacker Theft from Above Imagine RIT Service Set Identifier (SSID) o human readable “network name” Devices store past SSID connections Wireless.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Kindergarten Sight Words. Yes I can! Come here Look at me.
1 Radius Vulnerabilities in Wireless Overview Randy Chou - Merv Andrade - Joshua Wright -
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Chapter-7 Basic Wireless Concepts and Configuration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
7/31/2002Black Hat 2002, Las Vegas NV Advanced Attack Michael Lynn & Robert Baird.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Wi-Fi Networking Security in the Age of Mobile Devices and Internet-of-Things Dr. Cliff (Changchun) Zou Associate Professor Department of Computer Science.
Module 48 (Wireless Hacking)
Network security Vlasov Illia
Rogue Access Points attacks
NodeJS Security Using PassportJS and HelmetJS:
Instructor Materials Chapter 6 Building a Home Network
Wireless II.
CSE 4905 Network Security Overview
CompTIA Security+ Study Guide (SY0-501)
Wireless LAN Security 4.3 Wireless LAN Security.
Raleigh issa – back to basics wi-fi pineapple
Presentation transcript:

Exploits Data Communications Benjamin W. Siegel VCU Information Systems

Overview Information Systems Exploits 2/24

Beaconing I am online!! online!! I am online!! Exploits 3/24

Probe Requests and Responses Are you my Access Point? Exploits 4/24

Probe Requests and Responses Yes Exploits 5/24

Wireless Authentication Here is my authentication Exploits 6/24

Wireless Authentication That Checks out Exploits 7/24

Wireless Authentication Can we connect Exploits 8/24

Wireless Authentication Yes here is your ID Exploits 9/24

Wireless Authentication ~DATA~ Exploits 10/24

Probe and Authentication Summary Probe Request “ SSID” Probe Response “ SSID” Authentication Request Authentication Success Association Request Association Response Data Exploits 11/24

Deauthentication Attack What is does? Denial of Service Attack “Jams” all Traffic in range How it works unencryptedUtilizes unencrypted management frames against an access point to kick clients off- line Why first stageUsually the first stage of a man in the middle attack Will redirect traffic to the attackers machine Exploits 12/24

Deauthentication Attack Association Request Data Association Response Deauthenticate Deauthenication Management Frame Exploits 13/24

Deauthentication Management Frame Exploits 14/24

Live example Yes Always! Exploits 15/24

Application Layer Vulnerability ‘remembers’Operating system ‘remembers’ your home or last access point Convenience ‘remembered’Accepts any affirming probe requests with a ‘remembered’ BSSID Connects to the strongest signal Vulnerability Exploits 16/24

Evil Access Point and Application Layer Vulnerability Exploits 17/24 Evil Access Point ServicesWhat they do

Are you my access point? probe request I am online!! online!! Point? Are you my Access Point? Access Point? Exploits 18/24 Evil Access Point

Yes, I am. response Yes Yes, I am your AP Exploits 19/24 Evil Access Point

Application Layer Vulnerability Yes Here is my authentication Exploits 20/24 Evil Access Point

Application Layer Vulnerability Yes Cool, I don’t care Exploits 21/24 Evil Access Point

Application Layer Vulnerability Yes Can we connect? Exploits 22/24 Evil Access Point

Probe Requests and Responses Yes Always! Exploits 23/24 Evil Access Point

Application Layer Vulnerability Yes Always! ~Data~ Exploits 24/24 Evil Access Point

Questions? VCU Information Systems