Hacking Exposed 7 Network Security Secrets & Solutions

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

Wireless Cracking By: Christopher Zacky.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Crack WPA Lab Last Update Copyright 2014 Kenneth M. Chipps Ph.D.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
CSC – Tieteen tietotekniikan keskus Oy CSC – IT Center for Science Ltd. WLAN Information Security Workshop on Wireless Belgrade Wenche Backman-Kamila.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Security.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
MIS Week 11 Site:
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless Attacks. Set up the APs Computer IP: Subnet Mask: Router IP address: –
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Chapter 8 Wireless Hacking Last modified
Chapter 8 Wireless Hacking Last modified
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Encryption: WEP and cracking it. Eric Shea.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Wireless Networking & Security Greg Stabler Spencer Smith.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Chapter 8 Wireless Hacking Last modified
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Module 48 (Wireless Hacking)
OSA vs WEP WPA and WPA II Tools for hacking
Advanced Penetration testing
Wireless Hacking.
Advanced Penetration testing
Advanced Penetration testing
Wireless Network Security
Breaking into Wi-Fi Networks
Advanced Penetration testing
Presentation transcript:

Hacking Exposed 7 Network Security Secrets & Solutions Chapter 8 Wireless Hacking

Case Study on Wireless Hacking Read It and WEP (not Weep) A store with the point-of-sale system connected through Wi-Fi /w WEP (Wired Equivalent Privacy) encryption A hacker at the parking lot turns laptop with Wi-Fi card and directional antenna to promiscuous mode aircrack-ng airodump-ng to sniff 802.11 frames including WEP initialization vectors (IVs) Look for SSID (service set identifier) of interest and its MAC address aireplay-ng to spoof as a client to capture ARP and replay it to collect enough IVs aircrack-ng to crack WEP key from the capture file Disable the promiscuous mode Enter WEP key and get an IP address from the DHCP server

Background on IEEE 802.11 Wireless LAN Frequencies and channels ISM (industrial, scientific, medical) unlicensed bands 2.4 GHz: 802.11b/g/n, channels 1-14, non-overlapping channels: 1, 6, 11 5 GHz: 802.11a/n, channels 36-165, all non-overlapping Session establishment Clients scan channels, to send a broadcast probe request and wait for probe responses from APs with SSID (Service Set Identifier) APs also broadcast beacons periodically Windows Vista and later: clients wait for beacons Clients send an authentication request to a selected AP Clients send an association request to the AP

Security Mechanisms Basic Authentication: identity and encryption key MAC filtering: source MAC address pre-configured at APs Hidden wireless networks: omitted SSID in beacons Responding to broadcast probe requests: all pre-configured clients and APs, APs ignore any broadcast probe requests Authentication: identity and encryption key WPA-PSK (Wi-Fi Protected Access, Pre-Shared Key) A 8~63-ASCII-character PSK known by APs and clients to derive encryption keys WPA Enterprise Leverage 802.1x EAP (extensible authentication protocol) from clients to APs and extended to wired RADIUS server Four-way handshake between clients and APs Pairwise transit key (PTK) for unicast, group temporal key (GTK) for multicast/broadcast Encryption: at layer 2 Wired Equivalent Privacy (WEP) RC4, no real authentication to generate the key (known in advance) Temporal Key Integrity Protocol (TKIP) RC4, a quick replacement to WEP Advanced Encryption Standard (AES)

Equipments for Hacking Wireless adapters Chipset Open hardware for re-written drivers allowing low-level control: Atheros, Ralink RT73/RT2770F (merged to Mediatek), ref.: aircrack-ng.org Band support Both 2.4 GHz and 5 GHz Antenna support External antenna for long-range attacks Interface PCMCIA being phased out, Express Card on laptop, USB with Virtual Machine, ref.: Ubiquiti SRC with Atheros on PCMCIA, Alfa with Ralink on USB Operating systems: Windows  Linux BackTrack Linux distribution: preinstalled with all tools and drivers for all popular wireless adapters; run on VM, launch from a LiveCD on USB Miscellaneous goodies Antennas Omnidirectional antenna with a wide focus and small gain, ref.: HyperLinkTech, FAB-corp, Pasadena Networks GPS To plot AP locations on a map, ref.: Garmin, Magellan APs To run OpenWRT or DD-WRT on some off-the-shelf APs

Discovery and Monitoring (1/2) Finding wireless networks Active discovery NetStumbler: broadcast probe requests to get responses from APs Many APs configured to ignore probe requests Passive discovery When APs are configured to not announce SSID or not to respond to probe requests Listen to beacons to list BSSID (Basic SSID, i.e., MAC address of the AP) and mark SSID as unknown Listen to other clients talking to that BSSID to find the SSID Discovery tools War-driving to find APs War-flying with GPS to survey an area User-uploaded WiGLE.net: map of APs Kismet: support GPS-tracking, distributed deployment, GUI airodump-ng: part of aircrack-ng, simpler than Kismet Saved to PCAP files

Discovery and Monitoring (2/2) Sniffing wireless traffic Violation of law in some US states if neither party does not know Many unencrypted wireless networks when difficult to do authentication: hot spots, airports, etc. wireshark on Windows with AirPcap USB adapters Thwarting wireless sniffing WPA-PSK, WPA Enterprise Upper layer encryption: VPN

Denial of Service Attacks 802.11 built-in mechanism: forced disconnect Incorrect encryption key, overloading, etc. Abused for DoS attacks De-authentication (deauth) attack Spoof de-authentication frames to disconnect From client to AP or from AP to client Client drivers try to reconnect quickly Send more than one deauth frame airplay-ng: part of aircrack-ng Deauth attack: 64 deauth to AP from client, 64 deauth to client from AP Find SSID by observing client’s probe requests as it reconnects

Encryption Attacks WPA vs. WEP WEP /w authentication vs. /wo authentication /w key rotation vs. /wo key rotation Crack again and again vs. crack once for all WEP Keystream Generated by WEP key and IV (Initiation Vector, pseudo-randomly generated for each frame and put into frame header) TX: XOR plain text to get cipher text RX: Use WEP key and IV from frame header to generate a keystream, XOR cipher text to get plain text Duplicate IVs in two frames  compare their cipher texts  guess the keystream  guess WEP key ARP frames with little or no difference  more duplicate IVs  easier to guess the keystream and WEP key

Encryption Attacks Passive Attack Capture enough data frames, parse IVs, deduce WEP key 60,000 IVs to crack a 104-bit key airodump-ng: capture to a PCAP file aircrack-ng: analyze statistically on a PCAP file to get WEP key Watch the rate at which IVs are collected to tell how much longer it will take to gather enough to crack the key Stops with KEY FOUND

Encryption Attacks ARP Replay with Fake Authentication Replay broadcast ARP requests From a client to an AP AP broadcasts with a new IV each time The client replays ARP and generates new ARP In 5 minutes, enough frames and IVs collected Spoof a valid client’s MAC address Fake authentication attack Open authentication without sending actual data Steps airodump-ng: capture to a PCAP file aireplay-ng: run fake authentication attack Open another window to launch ARP replay attack with aireplay-ng again aircrack-ng: crack on the captured PCAP file WEP countermeasures: Don’t use WEP ever.

Authentication Attacks WPA PSK About password brute forcing WPA PSK PSK shared among all users of a wireless network Four-way handshake between clients and APs: Using PSK and SSID to derive encryption keys PSK, 8~63 characters, hashed 4096 times with SSID Trillions of guesses Capture four-way handshake to crack PSK offline Wait or deauth to kick a client off (its driver will reconnect) Brute forcing aircrack-ng with dictionary and PCAP coWPAtty: use SSID-specific rainbow tables (40GB) Use top 1000 SSIDs from WiGLE.net Pyrit: offload hashing to GPU with multiple cores WPA-PSK mitigating controls Complex PSK and unique SSID But could be disclosed by a single user

Authentication Attacks WPA Enterprise Identifying 802.1x EAP (extensible authentication protocol) types Capture EAP handshake Wireshark shows EAP type Unencrypted username in RADIUS server in EAP handshake LEAP (lightweight EAP) Cisco solution /w clear text MSCHAPv2 challenge/response asleep: offline brute-force attack with LEAP handshake and wordlist Avoid using LEAP just like WEP EAP-TTLS and PEAP A TLS (Transport Layer Security, successor of SSL) tunnel between an unauthenticated client and RADIUS server AP relays and has no visibility Less secure inner authentication protocol often in clear text AP impersonation and man-in-the-middle attack Act as a terminating end of the TLS tunnel, if the client is misconfigured not to check the identity of RADIUS server  access inner auth protocol hostapd: Turn your card into an AP asleep: offline brute-force on inner authentication protocol Countermeasure: Check the box to validate server certificate on all clients

Summary WEP WPA-PSK WPA Enterprise Passive attack & ARP replay with fake authentication Cracked in 5 min Don’t use it! WPA-PSK Could be brute-forced, though high complexity One PSK fits all  put other users at risk WPA Enterprise LEAP Could be brute-forced, needs extremely complex passwords EAP-TTLS and PEAP Relatively secure with multilayered encryption Subject to AP impersonation and man-in-the-middle attack Always have clients check server certificate

Homework #4 Ch6 & Ch8 (Total: 200) Due: 6/9 (Mon) in the final exam in printed hardcopy (format: problem, solution with explanation, screen dumps) (40 points) Use all of WHOIS, Robtex, and PhishTank to trace back on a phishing email found in your mailbox. If you don’t find one, create one email account and post the email address onto Web to solicit some. Show and discuss your findings. (40 points) On Windows with some running processes connecting to the Internet, use FTK Imager to dump memory and then Volatility Framework to analyze the memory dump. Show processes with connections, and check whether they have DLLs. (30 points) Retrieve Poison Ivy RAT from the Internet. Use a program tracing tool you are familiar with to trace this RAT. Show how you trace the RAT with your tracing tool and summarize what modules this RAT contains. (30 points) Setup your own client and an AP, or find an existing AP, running no encryption. Use wireshark or airodump-ng to sniff and decode data frames. Show and discuss your findings. (60 points) Setup your own client and an AP to run WEP. Use the aircrack-ng suite to crack the WEP key by running through the steps of frame capturing, fake authentication attack, ARP replay attack, and key cracking. Show and discuss the steps you run through.