CS 525M – Mobile and Ubiquitous Computing Seminar Bradley Momberger Randy Chong.

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Understanding and Achieving Next-Generation Wireless Security Motorola, Inc James Mateicka.
MIS Week 12 Site:
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Apr 4, 2003Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Connecting to Secure Wi-Fi in QSB Boardroom Locations 01 September 2013.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Networking & Security Greg Stabler Spencer Smith.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
SSL/TLS How to send your credit card number securely over the internet.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wi-Fi: How it Works and Security Measures. What is Wi-Fi? Any wireless local area network (WLAN) product that meets the Institute of Electrical and Electronics.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Lecture 24 Wireless Network Security
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Distributed WPA Cracking CSCI Distributed Systems Spring 2011 University of Colorado Rodney Beede Ryan Kroiss Arpit Sud
Shambhu Upadhyaya Security – Key Hierarchy Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 11)
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
PKCS #5: Password-Based Cryptography Standard
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
PKCS #5 v2.0: Password-Based Cryptography Standard
WPA Cracking with Rainbow Tables For Educational Purposes Only Kurt Wondra November 18 th, 2010  1) Scanning for Vulnerable Networks  2) Capturing Usable.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Module 48 (Wireless Hacking)
Re-evaluating the WPA2 Security Protocol
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
A Wireless LAN Security Protocol
Wireless LAN Security 4.3 Wireless LAN Security.
Virtual Private Networks
Presentation transcript:

CS 525M – Mobile and Ubiquitous Computing Seminar Bradley Momberger Randy Chong

Credits References used in this presentation: – Moskowitz: Weakness in Passphrase Choice in WPA Interface –Edney & Arbaugh: Real Security: Wi-Fi Protected Access and i. ©2003 Addison-Wesley – Jouni Malinen: Host AP driver for Intersil Prism2/2.5/3 – RSA Laboratories: PKCS #5 v2.0: Password-Based Cryptography Standard

Overview PTcracK –There’s a Network Born Every Minute –Hybrid Passphrase Attack –Converts the Results of Passphrase Search to WPA Keys –Check Results of Generated Keys Against Intercepted Handshake Packets

Background PMK = Pairwise Master Key –The shared secret between the client and the server –Can be generated from a passphrase The MAC addresses of each end of the connection and fresh values or “nonces” have to be sent in the clear before encryption keys can be generated. Any rogue node can monitor the traffic and learn all of the session information except the PMK. If the PMK is based on a passphrase, a rogue node may be able to guess the passphrase by matching the encryption keys to what is in use. Barring other security measures, the attacker can then gain access to the network. The most time-efficient way to guess a passphrase or other passphrase is through hybridized guessing.

Hybridized Password Guesser Programmed from scratch Packaged in a general-purpose class Guess parameters specified at class instantiation –Minimum guess length –Maximum guess length –Maximum brute string length Three modes –Depth-First (default) –Breadth-First –Pure-Brute (fallback)

Demo Show Demo

PTcracK Implementation 1)Retrieve the ssid from the access point 2)Compute the ssid length 3)Send a DISASSOCIATE command to the access point 4)Retrieve the PTK and the MAC addresses from the handshake packets 5)Use a hybrid algorithm to guess a pass phrase. 6)Generate the PMK with the guess 7)Generate a guessed PTK with the PMK 8)Check for a match between the PTK and the guessed PTK –Repeat steps 5 through 8 until a match is found We have implemented steps 5 through 8

The PTcracK Project Hosted on Source Forge – –Site contains source code release, documentation, and task list. –Program is released under GPL by force; contains other code acquired through the GPL.