Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

FIREWALLS Chapter 11.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Awareness: Applying Practical Security in Your World
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Principles of Information Technology
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COEN 252: Computer Forensics Router Investigation.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Windows 2003 and 802.1x Secure Wireless Deployments.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ECE 578: COMPUTER NETWORK AND SECURITY
Mobile and Wireless Communication Security By Jason Gratto.
WIRELESS LAN SECURITY Using
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Kevin Watson and Ammar Ammar IT Asset Visibility.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Virtual Private Networks
Network security Vlasov Illia
Understanding Security Policies
Virtual Private Networks and IPSec
Re-evaluating the WPA2 Security Protocol
CSCE 548 Student Presentation By Manasa Suthram
CompTIA Security+ Study Guide (SY0-401)
Module 9: Configuring Network Access
Instructor Materials Chapter 6 Building a Home Network
Microsoft Windows NT 4.0 Authentication Protocols
Information Security Professionals
Wireless Hacking.
Security of a Local Area Network
Security in Networking
Advanced Penetration testing
Wireless LAN Security 4.3 Wireless LAN Security.
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Advanced Penetration testing
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Networking 101.
6. Application Software Security
LM 5. Wireless Network Security
Principles of Information Technology
Advanced Penetration testing
Presentation transcript:

Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella

Rogue Access Point Based MITM Attacks RAPs can be planted internally within corporate environment or setup in public areas with public internet access Evil Twin Attacks Preferred Network Lists MITM Attacks: All Network Traffic passes through the attacker’s device before being forwarded to the legitimate internet access point Even Secure Wireless networks that use WPA2 are vulnerable to this attack

MSCHAPv2 LEAP/PEAP Vulnerability Attacker can intercept any compromised device’s attempts to connect to their corporate network/encrypted tunnel Proven Weak all the way back in 1999 by Bruce Schneider’s Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MSCHAPv2) The RAP can steal the device’s password Hash and use 3rd party programs to brute force the Hash This attack will bypass even the most robust WPA2 security protocols

Companies networks that implement Radius will be vulnerable to remote attacks without proper configuration Radius – Remote Authentication Dial-In User Service (RADIUS) Allows employees to connect to their company networks remotely as long as they pass the MSCHAPV2 Challenge the server gives them. If the attack succeeds, the hacker will be able to spoof his identity to the identity of the victim and remotely access all of the company files his victim would normally have access to. Company Network will think all is well and hand over requests as if the employee was requesting the data

Example of some EAP Data captured via MITM Attack: Mobile Devices attempting to connect to their company network through EAP will Hash the password that is susceptible to a MITM attack Password hash can be brute forced with proper tolls like Kali Linux, CloudCracker.com and John the Ripper

Attack is incredibly Cheap! No Special Equipment Necessary! Do not need a lot of processing power Can use devices like Raspberry Pi or any device capable of running openWRT to broadcast the RAP

Precautionary Prevention Against EAP Attacks Consider eliminating wireless access points in your corporate network, resort to direct connections only For BYOD corporate environments: enroll every new individual employee device to give it a unique certificate and pair the device’s MAC address with the server Turn off Device’s preferred network lists(PNL) so it will not automatically connect to insecure connections

Breakdown of MSCHAPv2 Authentication Protocol and primary vulnerability Even strong Passwords are vulnerable All the green represents data sent in the clear or data that can be derived from data in the clear NTHASH is the only thing attackers need to figure out If you know the Challenge and the Response, you can brute force the DES keys DES key is only 56-bit complexity so it is easy to brute force 3rd party sources like Cloud Cracker charge $17 a hack and can get this in a few hours

Precautionary Prevention Against EAP Attacks Continued Experts advise against using MSCHAPv2 in a company environment altogether however there are ways to make security more robust if switching is not an option Individual Device Enrollment that stores the device MAC address will also prevent an unauthorized device attempting to connect to the RADIUS server or onsite Network.

Moving Forward with Passive Network Rogue Access Point Scanning with DAIR systems DAIR- Dense Array of inexpensive computers All administrators felt that WLAN security was a problem Many of them would periodically walk around their buildings using WLAN scanning software looking for security vulnerabilities Some hired expensive outside consultants to conduct security vulnerability analyses of their WLAN deployment, only to conclude that what they really needed was an ongoing monitoring and alerting system. Most administrators believed that better systems to manage WLAN security are needed. DAIR passively scans corporate environments and checks for RAP through radio wave frequency scanning