1 Attacking a Wireless Network via De-authentication by Dou Wang, Jiaying Shi, Ying Chen School of Computer Science University of Windsor November 2007
2 Contents Introduction Related Works Our Experiment De-authentication attack of Denial of Service Intrusion Detection System Conclusion
3 Introduction Wireless Local Area Network (WLAN) A network connection not requiring wired Ethernet connection, is based on radio waves technology. Operating standard standard. flexible setup access mobility low cost easy to deploy
4 Introduction Passive attacks focus on sniffing data sent on wireless signal. Active attacks destroy the availability of the wireless networking infrastructure, or slow network performance.
5 Introduction Open Systems Interconnection (OSI) Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
6 Introduction protocol Data Link Layer Medium Access Control (MAC) sub-layer determines the way to send data and access the wireless medium. Logical Link Control (LLC) sub-layer is responsible for the MAC addressing, framing, and error control. Physical Layer takes care of transmitting raw bits through a communication channel.
7 Introduction network configuration Figure 1: Infrastructure Network and Ad Hoc Network
8 Related works Denial of Service A denial of service is “any action, or series of actions, that prevents any part of a system, or its resources, from functioning in accordance with its intended purpose”. Denial of service is the absence of availability. [2]
9 Related works Resource allocation attacks makes the victim out of service temporarily by keeping sending association flood or authentication flood. The service will be restored to be normal once the resource allocation attack stops. Resource destruction attacks disconnects the victim out of the network by exploiting vulnerabilities. The connection will be not restored immediately even though the attack stops.
10 1. Authentication 2. Association Connection established ! 1. Disassociation 2. Deauthentication Disconnected ! Ex periment
11 Ex periment Image from
12 Ex periment
13 Ex periment Key software Redhat Linux 9 with Kernel Redhat Linux 9 with Kernel Hostap Hostap Void Void Kismet R1 Kismet R1 Snort-wireless with wireless patch Snort-wireless with wireless patch
14 Attacker Laptop: Toshiba Satellite M30 LaptopToshiba Satellite M30 Laptop Hardware: Intel M 2.0GHz, RAM 512MB, 40GB Partition, SMC EliteConnection 2.4GHz b SMC2532W-B Hardware: Intel M 2.0GHz, RAM 512MB, 40GB Partition, SMC EliteConnection 2.4GHz b SMC2532W-B Software: Redhat Linux 9, kernel , Hostap 0.0.4, Void Software: Redhat Linux 9, kernel , Hostap 0.0.4, Void Role in the project: Attacker Role in the project: Attacker MAC: e MAC: e IP Address: none IP Address: none Ex periment
15 Ex periment Intrusion Detetion Laptop IBM Thinkpad R50IBM Thinkpad R50 Hardware: GC, Intel M 1.5GHz, RAM 256MB, 10GB Partition, SMC EliteConnection 2.4GHz b SMC2532W-BHardware: GC, Intel M 1.5GHz, RAM 256MB, 10GB Partition, SMC EliteConnection 2.4GHz b SMC2532W-B Software: Redhat Linux 9, Kernel , Hostap 0.0.4, Kismet R1, Snort-wireless Alpha 04 (Build 26) Software: Redhat Linux 9, Kernel , Hostap 0.0.4, Kismet R1, Snort-wireless Alpha 04 (Build 26) Role in the project: Sniffer, Intrusion Detection, frame capture Role in the project: Sniffer, Intrusion Detection, frame capture MAC: e MAC: e IP Address: IP Address:
16 Ex periment Victim Laptop ASUS M3NP LaptopASUS M3NP Laptop Hardware: Intel M 2.0GHz, RAM 1GB, 80GB Partition, NETGEAR Wireless PC Card 32-bit CardBus WG511 Hardware: Intel M 2.0GHz, RAM 1GB, 80GB Partition, NETGEAR Wireless PC Card 32-bit CardBus WG511 Software: Windows 2003 Server, Microsoft IIS Software: Windows 2003 Server, Microsoft IIS Role in the project: Victim Role in the project: Victim MAC: b-83-f8-9c MAC: b-83-f8-9c IP Address: IP Address:
17 Ex periment Service Requestor IBM Thinkpad T61IBM Thinkpad T61 Hardware: 7662-CT0, Intel Core 2 Duo 2.2GHz, RAM 2GB, 100GB Partition, Intel 8459 AGN Wireless NICHardware: 7662-CT0, Intel Core 2 Duo 2.2GHz, RAM 2GB, 100GB Partition, Intel 8459 AGN Wireless NIC Software: Windows Vista Home Edition Software: Windows Vista Home Edition Role in the project: Service Requestor, test for DoS Role in the project: Service Requestor, test for DoS IP Address: IP Address:
18 Ex periment Access Point & NICs (our heroes) Wireless Access PointWireless Access Point g/2.4GHz Wireless Router D-Link DI g/2.4GHz Wireless Router D-Link DI-524 MAC Address: 00:11:95:75:23:9A MAC Address: 00:11:95:75:23:9A IP Address: IP Address: SSID: wang1124 SSID: wang1124
19 Ex periment Attacking Tool: void11 based on hostap IDS Tool: kismet based on hostap Analysis Tool: snort-wireless
20 Ex periment Assumptions: Attacker has root privilege on that laptop Attacker has root privilege on that laptop Attacker knows the MAC addresses of both AP and victim Attacker knows the MAC addresses of both AP and victim The wireless network is based on b protocol The wireless network is based on b protocol
21 Ex periment Attacking #void11-penetration wlan0 –t 1 –s 00:09:5b:83:f8:9c –B 00:11:95:75:23:9a –d 1000
22 Ex periment Attacking – cont’ #void11-penetration wlan0 –t 1 –s 00:09:5b:83:f8:9c –B 00:11:95:75:23:9a –d
23 Ex periment Sniffing
24 Ex periment Analysis Result =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 10/30-22:09: Deauthent. 0:9:5B:83:F8:9C -> 0:11:95:75:23:9A bssid: 0:9:5B:83:F8:9C Flags: Re 0x0000: C0 08 3A A B 83 F8 9C..:....u#...[... 0x0010: B 83 F8 9C 80 4E [....N.. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 10/30-22:09: Deauthent. 0:9:5B:83:F8:9C -> 0:11:95:75:23:9A bssid: 0:9:5B:83:F8:9C Flags: 0x0000: C0 00 3A A B 83 F8 9C..:....u#...[... 0x0010: B 83 F8 9C A0 4E [....N.. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
25 Conclusions Simulate wireless attack on data-link layer by generating control frames to perform de-authentication flood to a single target. Intrusion Detection System is able to detect out the attack and capture the packets. The attack and detection tools are based on Prism Chipset wireless network cards, hostap need to be installed on Linux kernel 2.4.x. Different rate (frame per second/millisecond) of attack can cause different scenarios, higher rate of attack can cause the access point remove the MAC address of victim computer from its cache immediately. D-Link DI524 has self-protection from association flood and authentication flood.
26 Acknowledgement Yufei Xu, Da Teng and Xin Wu Dr. Akshai Aggarwal IT Service staff
27 References [1] Allison H. Scogin, “Disabling a Wireless Network via Denial of Service”, Technical Report MSU [2] S. Harris, CISSP Certification, 2nd Edition, McGraw-Hill/Osborne, Emeryville, CA, 2003, p [3] Basic Digital Forensic Investigation Concepts, org/di_basics.html (current Mar 1, 2007). [4] M. S. Gast, Wireless Networks: The Definitive Guide, 2nd Edition, O’Reilly Media, Inc., Sebastopol, California, [5] R. Power, “2000 CSI/FBI Computer Crime and Security Survey,” Computer Security Journal, vol. 16, no. 2, 2000, pp [6] A. S. Tanenbaum, Computer Networks, 4th Edition, Prentice Hall, Upper Saddle River, New Jersey, [7] for hostap installation [8] for void11 installation
28 ?