Stopping Intruders Using a Wireless Honeypot to Track Hackers Presented by Timber Wolfe The Hacker Academy

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
CY-SWR1100 Dual Band Wireless N Router
DSL-2730B, DSL-2740B, DSL-2750B.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
SETUP AND CONFIGURATIONS WEBLOGIC SERVER. 1.Weblogic Installation 2.Creating domain through configuration wizard 3.Creating domain using existing template.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Ch. 5 – Access Points. Overview Access Point Connection.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Configuring Routing and Remote Access(RRAS) and Wireless Networking
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Presented by: Dr. Munam Ali Shah
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Introduction to HP Availability Manager.
Module 11: Remote Access Fundamentals
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
RomanHunter (ROuter huMAN Hunter). How to protect networks with wireless devices (802.xx/Zigbee/etc...) This presentation is about a specific implementation.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Tour Overview Introduction Collage Basics Collage Basics (Templates and Tools) Computer Configuration Bookmark Collage Getting Started Tour Collage Terminology.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
An Introduction to Designing, Executing and Sharing Workflows with Taverna Katy Wolstencroft myGrid University of Manchester IMPACT/Taverna Hackathon 2011.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Configuring Security Featuers For Wi-Fi (Wireless) Broad Band Access Recently Intelligence agencies have found that terrorists were using unsecured wi-fi.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wyoming Technology Readiness February Agenda Wyoming Training - Feb Technology Readiness  Schedule of events  Components and System Requirements.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Dial For Netgear Router Support and Help Phone Number.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Computer Networks CSC September 23,
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Instructor Materials Chapter 6 Building a Home Network
SNMP M Clements ENS.
Wireless Technologies
Methods of Securing LANs
Securing A Wireless Network
SNMP M Clements ENS.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Unit 27: Network Operating Systems
SNMP M Clements ENS.
Network Models, Hardware, Protocols and number systems
Web Servers / Deployment
Network hardening Chapter 14.
Echo Doesn’t Connect to Bluetooth Speaker - Troubleshooting |
Presentation transcript:

Stopping Intruders Using a Wireless Honeypot to Track Hackers Presented by Timber Wolfe The Hacker Academy

How to protect networks with wireless devices (802.xx/Zigbee/etc...) This presentation is about a specific implementation of a methodology. The point here is to promote thinking about how to use this kind of thinking to secure all types of wireless networks on all types of platforms. Once an attacker is on the LAN all of the egress point protections are averted.

romanHunter ( RO uter hu MAN Hunter ) romanHunter is a system requiring a Netgear WG602Vx wireless access point and a device that can run python scripts Will collect a set of MAC addresses for use as a data stream for MAC black listing Think outside of the box, this methodology can be applied to any wireless router

Reverse Engineering the Router (WG602v4 Screen Shots) Stations descriptions how this router works  No Stations Listed  Associations (wireless attempted connections)  Authorizations (wireless password accepted) HTTPScoop ( Reverse Engineering the Conversation )  URLs of Interest (where the MAC addresses come from) (Where the security settings are performed)

WG602v4 Defaults and Notes Default IP: Default Username: admin Default PW: password

No Stations Listed

Associations

Authorizations

HTTPScoop Screenshots Reverse engineering the router protocol with the client

Viewing the Existing Connections on the Router

An Association An association is an attempted connection that did not get authorized. The red arrow denotes the associated MAC address.

An Authorization An authorization is a MAC that will be displayed when that user has entered the correct password. The red arrow denotes the authorized MAC address. An authorized MAC is also associated.

An Authorization An authorization is a MAC that will be displayed when that user has entered the correct password. The red arrow denotes the authorized MAC address. An authorized MAC is also associated.

Changing the Wireless PW on the Router To change the PW on this router several variables must be submitted to the wpas.html page.  setobject_secuirty_type=4  setobject_wpapskPhrase= TheNewPassword If WEP is enabled the variables required must be scooped. This ONLY applies when WPA is in use. Also, keep in mind that realm security is used. Each page must include that realm token in each request for it to be accepted.

Roman Hunter Overview File Structure romanHunterv3C.py (Python Script) romanHunterv3.txt (Logging File) pw_list.txt (File containing the list of passwords to use)

romanHunterv3.txt Sample

pw_list.txt Sample

romanHunter Screen Shots The following screenshots illustrate the romanHunter in action.

Idle, illustrating the heartbeat signal Note the dots, they illustrate the heartbeat signal. This denotes the scripts is running and is not monitoring any activity. It is critical to know the Python script monitoring one or more honeypots is not locked up.

The Output of an Association The following output is what would be produced when an association is seen by the script. Associations denote 'attempted' connections, if they are also not authorized.

The Output of an Authorization Note the line that says 'Hacker MAC'. That is the MAC address of the machine we are after. THIS MAC address is the point of this exercise. This information can then be used to block the hackers attempts to access nearby networks and alert CERT/CIRT members. The MAC could also be used to direct the attacker to a honeypot.

Basic Script Logic Run Main() Call check4ConnectionsR() Call changePassword() (if applicable) Call generateNewWIFIPW() (if applicable)

Caveats for a Working Environment If you are using WEP Security:  There does not need to be any additional configuration or connections If you are using WPA or anything other than WEP:  A device of any kind MUST be connected to the access point, once its in production. This is required for the attacker to disconnect.

Roman Hunter Screen Shots Stations descriptions how this router works  No Stations Listed  Associations (wireless attempted connections)  Authorizations (wireless password accepted) Python scripts in action Heartbeat signal the romanHunter produces

Implementations Wireless Mesh Adjacent AP to a corporate network Standalone AP (pen tests, testing for future office location) Can be used with WEP for faster hacker identification (15 minutes to compromise) Can be used to illustrate time to compromise with current PW implementations and infrastructure configurations as well as the distance the AP reaches, with zero impact on the customer network(s)

Mesh Implementation

Typical Deployment

Python Script Review Functionalized Limitations  Not enough error checking  Should include more abstraction for functionality that does not change between different router versions and types  Should include database functionality for storing the MAC addresses  Should include a function for uploading to a central repository of MAC's found

Tools Used During Development OS X Laptop HTTPScoop (Fiddler2 on Windows) VM Ware (Fusion 5) Windows 7 VM (initial setup of AP) Python (for scripting) (Can use any scripting language) Cell phone with wireless to simulate attacker

Tools Used HTTPScoop HTTP Protocol Analyzer. HTTPScoop  High Level protocol analyzer usage is easier to comprehend and find instructions versus something like wireshark.  OS X (can use: fiddler2 for Windows)

Other Tools for Extending romanHunter Scapy (protocol dissector and manipulator) MySQL Wireshark

Questions or Comments? Contact Timber Wolfe hunter/