Misbehaving with 802.11 Will Stockwell

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Ethical Hacking Module XV Hacking Wireless Networks.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Network Attacks Mark Shtern.
Security Awareness Chapter 5 Wireless Network Security.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
How To Not Make a Secure Protocol WEP Dan Petro.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Security.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
MIS Week 11 Site:
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Wireless Encryption: WEP and cracking it. Eric Shea.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Networking & Security Greg Stabler Spencer Smith.
CHAPTER 9 Sniffing.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
Advanced Penetration testing
Wireless Hacking.
CSE 4905 Network Security Overview
Wireless LAN Security 4.3 Wireless LAN Security.
Advanced Penetration testing
Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Advanced Penetration testing
Presentation transcript:

Misbehaving with Will Stockwell

Topics Snake oil access control MAC layers lacks per frame authentication The spoofing problems which result 802.1X issues related to spoofing WEP (dead horse, I’ll discuss it briefly) Attacks against these schemes Recommendations Wireless tools you can mess with

Terminology SSID – Service Set ID –A text string used to identify sets of APs Spoofing –Illegitimate generation of network traffic Fake packets all together Insert traffic into a stream WEP – Wired Equivalent Privacy –Broken encryption scheme –Should be “What on Earth does this Protect?”

Terminology (continued) Access point –Device serving as wireless-to-wired bridge Association request –Wireless stations ‘associate’ with an AP –Follows rudimentary authentication procedure Per Frame Authentication –Every Frame authenticity information –Should be used with initial auth. exchange

Ted’s Hacker TED’S HACKER

Auth. in the MAC Layer Two types –Open System No authentication Gratuitous access –Shared Key Uses WEP – broken scheme (Returning to this later) Key distribution and usage issues No per frame auth. –frame spoofing is easy (more later) –If a authentication scheme is to be effective, it needs to be per frame No AP auth. – allows impersonation of APs MAC layer does leave room for other auth. schemes –None presently implemented –New schemes which conform to standard still can’t be per frame –Per frame authentication

Other Forms of Access Control SSID hiding (complete snake oil) –SSID often beaconed by APs –APs can be configured to stop beaconing MAC address filtering (snake oil) –DHCP servers –AP ACLs 802.1X (spoofing issues) –Takes places following MAC layer auth. and assoc. to AP –Controls access only to world beyond AP via EAP –Does allow for more robust authentication (Kerberos, others) –Doesn’t solve per packet auth. problem –No clients for all OS’s which all use the same auth. scheme

WEP, the “Sweet & Low” of (dead horse, moving quickly) Passive listening –Numerous documented attacks –Attacks widely implemented –Key can be recovered at worst in a few hours of passive listening Only encrypts data frames –Management, control frames sent in the clear –We can still spoof these frame types without a key Key management issues –If key changes all devices must change it at the very same time, so short key periods won’t help much –Employee leaves with key in hand –Broken anyway! Why are you considering this option?

Circumvention: The Easy, the Challenging and the Not-So-Impossible

Sniffing the SSID - easy Assoc. Request (…, SSID ‘Paris’, …) Regular User Station being innocent AP w/ SSID ‘Paris’ Mischievous Station Running NetStumble r or similar Sniff, sniff, sniff…

Beating MAC Address Filters - easy Sniff legitimate MAC Addresses Wait for a station to leave Set your MAC to a legitimate address –linux# ifconfig wlan0 hwaddr 00:00:de:ad:be:ef –openbsd# wicontrol wi0 –m b5:db:5d:b5:db:5d You can now authenticate and associate MAC filtered by DHCP server? –Sniff addresses and set your IP statically

Cracking WEP – easy, time consuming WEP encrypted Data Frames (A1%h8#/?e$!...) Regular User Station being innocent Access Point Mischievous Station Running AirSnort or similar Sniff, sniff… CRACK !

Back to the Spoofing Issue Allow lots of naughty behavior –Station disassociation DoS Disrupt wireless station’s access –Access point saturation DoS MAC level limit the number of associated stations to ~2000 Implementation limits set lower to prevent congestion Prevent new stations from authenticating to an AP –Hijacking of legitimately authenticated sessions –Man in the middle attacks Old ARP cache poisoning, DNS spoofing affect too Impersonate AP to a client, tamper with traffic, pass it along

More on Spoofing Frames – challenging, getting easy Libradiate makes it easy –Alpha stage code –Didn’t work for me, but expect it to work in future –Combine with Libnet to do all sorts of packet naughtiness Denial of Service (disassoc, AP saturate, others) –no publicly implemented attacks –Libradiate author wrote and tested, but unreleased –Wrote my own disassociator! –802.1X has its own DoSes (EAP Logoff, Failure)

Disassociating a Wireless Station – easy after implementation! Disassociate Frame (SANTA’S MAC, AP BSSID, DISASSOC, …) Regular User Station being innocent Access Point Mischievous Station running dis2 Sniff, sniff… DISASSOC ! General Wireless Traffic (MGMT, CRTL, DATA)

Session Hijacking, MITM – old dogs, new playground The wireless advantage: easy access to medium! Hijacking a wireless session –Known network/transport layer attacks – easy w/ implementations –MAC level hijacking – implemented in UMD research, not public Simple combination of disassociation and MAC spoofing Can beat 802.1X, if hijacking after EAP Success received by station MITM –SSH, SSL – easy w/ sshmitm, webmitm (part of the dsniff package) ARP Poisoning, DNS redirect still work (may need retooling for MAC) Same issues that go along with these attacks on wired medium exist here –AP impersonate MITM – doable, challenging (no public implementation) Could be detectable w/ knowledge of legitimate BSSIDs –802.1X MITM – implemented in UMD research, not public Spoof EAP success to station, pass traffic to network for it

Main Points Wireless medium is an inherently insecure The MAC poorly compensates MAC layer needs stronger authentication Per packet auth. could solve many issues 802.1X exchange comes too late Spoofing attacks will become public

Recommendations The first rule of Fight Club is… –Secure network protocols –SECURE NETWORK PROTOCOLS –wireless only makes attacks against these easier Snake oil can provide hurdles for the casual Treat wireless the way you treat remote traffic High security environments: no wireless allowed Not satisfied with these answers? Sorry!

Wireless Tools for your Tinkering Windows –Netstumbler – find APs and their SSIDs –Airopeek – wireless frame sniffer Linux –Airsnort (and other WEP tools) –Airtraf (Netstumbler-like) –Kismet (Netstumbler-like, WEP capture, other stuff) *BSD –bsd-airtools (Netstumbler-like tool, WEP cracking) –Kismet

References –My slides –PGP key Wireless Networks: The Definitive Guide, Matthew S. Gast –Good overview of in general –MAC layer well-covered –Discussion of the different physical layer standards as well –Lots of links –WEP papers –802.1X information –General security information – frame creation, injection, sniffing library –Works well in conjunction with libnet TCP/IP packet library –Broken in my experience, but big potential for the future