Wireless LAN Security CSE 6590.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
Module 48 (Wireless Hacking)
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
History and Implementation of the IEEE 802 Security Architecture
Authentication and handoff protocols for wireless mesh networks
OSA vs WEP WPA and WPA II Tools for hacking
Wireless Protocols WEP, WPA & WPA2.
Security in the layers 8: Network Security.
Wireless Security.
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Advanced Penetration testing
Wireless Security Ian Bodley.
Wireless LAN Security 4.3 Wireless LAN Security.
Hacking Wi-Fi Beyond Script Kiddie and WEP
Advanced Penetration testing
IEEE i Dohwan Kim.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Breaking into Wi-Fi Networks
Security Issues with Wireless Protocols
IT4833/6833 WiFi Security Building Blocks (I).
Presentation transcript:

Wireless LAN Security CSE 6590

Outline Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) first security protocol defined in 802.11 Wi-Fi Protected Access (WPA) defined by Wi-Fi Alliance WPA2 802.11i

History In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802 In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks) At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps)

IEEE 802.11 WLAN Standard In 1997, the IEEE approved the IEEE 802.11 WLAN standard Revisions IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n IEEE 802.11ac IEEE 802.11ad (WiGig)

Controlling Access to a WLAN Access is controlled by limiting a device’s access to the access point (AP) Only devices that are authorized can connect to the AP One way: Media Access Control (MAC) address filtering Easily breakable!

Controlling Access

MAC Address Filtering

MAC Address Filtering Usually implemented by permitting instead of preventing Some universities does this: YorkU does it for LAN users 

MAC Address Filtering Weaknesses MAC addresses are transmitted in the clear An attacker can just sniff for MACs Managing a large number of MAC addresses is difficult MAC address filtering does not provide a means to temporarily allow a guest user to access the network Other than manually entering the user’s MAC address into the access point

Wired Equivalent Privacy (WEP) Designed to ensure that only authorized parties can view transmitted wireless information Uses encryption to protect traffic WEP was designed to be: Efficient and reasonably strong 10 10

WEP Keys WEP secret keys can be 64 or 128 bits long The AP and devices can hold up to four shared secret keys One of which must be designated as the default key

Device Authentication Before a computer can connect to a WLAN, it must be authenticated Types of authentication in 802.11 Open system authentication Lets everyone in Shared key authentication Only lets computers in if they know the shared key

WEP Encryption Process

Transmitting with WEP

Pre-Shared Key (PSK) Method A 64-bit WEP key is a string of 10 hexadecimal + 24 bits Initial Vector (IV): That is 40 bits PSK key (10x4bits) + 24 bits IV A 128-bit WEP key a string of 26 hexadecimal characters + 24 bits IV: That is 26x4 + 24 bits = 128

WEP Weakness 24 bits of IV are sent in plaintext Recycled almost in 224 frames That is 4 reuse in every 5,000 packets We can create large number of packets and thus compare two cipher text with the same IV and Key Using packet injection we can achieve this goal: C1 xor C2 = (P1 xor K) xor (P2 xor K) = P1 xor P2 Know P1/P2 and IV -> Key output

WEP Frame new IV for each frame data ICV IV Key ID encrypted MAC payload Key ID new IV for each frame Security 8-20

Breaking 802.11 WEP encryption Security hole: 24-bit IV, one IV per frame, -> IV’s eventually reused IV transmitted in plaintext -> IV reuse detected Attack: Trudy causes Alice to encrypt known plaintext d1 d2 d3 d4 … Trudy sees: ci = di XOR kiIV Trudy knows ci di, so can compute kiIV Trudy knows encrypting key sequence k1IV k2IV k3IV … Next time IV is used, Trudy can decrypt! 8: Network Security

WEP Summary Authentication is first carried out via open system authentication, or shared key authentication Data packets are then encrypted using the WEP encryption process described above. Each packet requires a new IV.

WPA

WPA: Improving WEP Encryption Key size increased to 128 bits Larger IVs: 48-bit long Changing security keys through Temporary Key Integrity Protocol (TKIP) Encryption keys are changed (based on a master key) after a certain number of packets have been sent. An IV is mixed with data (not concatenate).

WPA Authentication Two options: PSK (inexpensive, home/personal networking) 802.1X (expensive, enterprise networking)

WPA Personal Security Pre-shared key (PSK) authentication Uses a passphrase to generate the encryption key Key must be entered into both the access point and all wireless devices Prior to the devices communicating with the AP The PSK is not used for encryption Instead, it serves as the starting point (seed) for mathematically generating the encryption keys Results in a pair-wise master key (PMK) Followed by a 4-way handshake to handle key management and distribution, which uses the PMK to generate a pair-wise transient key (PTK).

Pre-Shared Key Weakness A PSK is a 64-bit hexadecimal number Usually generated from a passphrase Consisting of letters, digits, punctuation, etc. that is between 8 and 63 characters in length If the passphrase is a common word, it can be found with a dictionary attack

WPA Authentication via 802.1X Three components: Remote authentication dial-in user service (RADIUS) authenticator (access point) supplicant (client) Uses EAP authentication framework EAP-PSK, EAP-TLS, EAP-TTLS, EAP-MD5 Results in a pair-wise master key (PMK) Followed by a 4-way handshake to handle key management and distribution, which uses the PMK to generate a pair-wise transient key (PTK).

EAP-TLS

WPA2

WPA2 Personal Security Wi-Fi Protected Access 2 (WPA2) Introduced by the Wi-Fi Alliance in September 2004 The second generation of WPA security Still uses PSK (Pre-Shared Key) authentication But instead of TKIP encryption it uses a stronger data encryption method called AES-CCMP AES: Advanced Encryption Standard CCMP: Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

WPA2 Personal Security (2) PSK Authentication Intended for personal and small office home office users who do not have advanced server capabilities PSK keys are automatically changed and authenticated between devices after a specified period of time known as the rekey interval

WPA2 Personal Security (3) AES-CCMP Encryption Encryption under the WPA2 personal security model is accomplished by AES-CCMP This encryption is so complex that it requires special hardware to be added to the access points to perform it

WPA and WPA2 Compared

WPA2 Enterprise Security The most secure method Authentication uses IEEE 802.1x Encryption is AES-CCMP We can still crack it if it is PSK!

802.11i A superset of all WLAN security mechanisms including WEP, WPA and WPA2. PSK (personal) or 802.1X (enterprise) is used for authentication and key management.

Reference Section 6.3.1, Wireless Mesh Networks, by I. F. Akyildiz and X. Wang

Demo Time (1) Setup 1. Let’s bring up the adapter ifconfig wlan0 up 2. Start monitoring interface airmon-ng start wlan0 3. Gather information on accesspoints: airodump-ng wlan0mon 4. Find the accesspoint to attack airodump-ng –bssid AP_MAC –channel AP_CH –write demo wlan0mon 5. Wait for a client to connect… Or deauth them: aireplay-ng -0 10 –a –c CLIENT ADAPTER

Demo Time (2) Crack Time aircrack-ng CAPFILE –w WORDLIST

Appendix

Cyclic Redundancy Check (CRC) One of the most common and powerful error- detecting codes. Given k bits of data, generate a sequence F of j bits (FCS) using a predetermined divisor P of (j+1) bits Transmit a frame of k+j bits (data + FCS) which will be exactly divisible by divisor P Receiver divides frame by divisor P If no remainder, assume no error One of the most common, and one of the most powerful, error-detecting codes is the cyclic redundancy check (CRC), which can be described as follows. Given a k-bit block of bits, or message, the transmitter generates an (n – k)-bit sequence, known as a frame check sequence (FCS), such that the resulting frame, consisting of n bits, is exactly divisible by some predetermined number. The receiver then divides the incoming frame by that number and, if there is no remainder, assumes there was no error. Can state this procedure in three equivalent ways: modulo 2 arithmetic, polynomials, and digital logic, as detailed in Stallings DCC9e chapter 6.3. Comes down to working out what remainder exists when divide data by desired number, and using that as the FCS value appended to the data to form the block.

WEP Encryption Process When a node has a packet to send, it first generates CRC for this packet as an integrity check value (ICV). Generates an IV; concatenates it with the secret key; applies RC4 to create RC4 key stream. Performs XOR operation on the above two streams, byte by byte, to produce ciphertext. Appends the IV to the ciphertext and transmits to the receiver.

WEP Encryption Process (3)

WPA History Wireless Ethernet Compatibility Alliance (WECA) A consortium of wireless equipment manufacturers and software providers WECA goals: To encourage wireless manufacturers to use the IEEE 802.11 technologies To promote and market these technologies To test and certify that wireless products adhere to the IEEE 802.11 standards to ensure product interoperability

WPA History (2) In 2002, the WECA organization changed its name to Wi-Fi (Wireless Fidelity) Alliance In October 2003 the Wi-Fi Alliance introduced Wi-Fi Protected Access (WPA) WPA had the design goal to protect both present and future wireless devices, addresses both wireless authentication and encryption PSK or 802.1X addresses authentication and TKIP addresses encryption

PSK Key Management Weaknesses People may send the key by e-mail or another insecure method Changing the PSK key is difficult Must type new key on every wireless device and on all access points In order to allow a guest user to have access to a PSK WLAN, the key must be given to that guest

EAP-TLS AS verifies client’s digital signature using client’s public key got from client’s certificate Certclient Get random number p by decrypting with its private key Client calculates H(c,s,p), compares it with the value sent by As EAP: extendable authentication protocol TLS: transport layer security

4-way Handshake

Key Hierarchy key derivation function (KDF) pseudorandom function family (PRF) CCMP: TK = 128 bits TKIP: TK = 256 bits

RSN-IE (Robust Security Network Information Element): indicates the cipher algorithms used (CCMP, TKIP, WEP-104, WEP-40)

Wireless Security Models