WarDriving. related fixed line attacks war dialing port scanning

Similar documents
Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Attacks and Countermeasures

What is Eavedropping?

Wireless LAN Security. Gabriel Clothier

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Appendix E Wireless Networking Basics

05 - WLAN Encryption and Data Integrity Protocols

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Wireless Network Security

Wireless technology Principles of Security

Configuring Wireless Security Settings on the RV130W

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

Configuring Cipher Suites and WEP

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Wireless Network Security Spring 2015

Wireless Network Security Spring 2016

Security in IEEE Networks

Configuring WEP and WEP Features

Network Encryption 3 4/20/17

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions

Table of Contents 1 WLAN Security Configuration Commands 1-1

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

FAQ on Cisco Aironet Wireless Security

Chapter 17. Wireless Network Security

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Chapter 24 Wireless Network Security

Network Security and Cryptography. 2 September Marking Scheme

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Cryptanalysis. Ed Crowley

Cryptography ThreeB. Ed Crowley. Fall 08

Wireless Network Security

LESSON 12: WI FI NETWORKS SECURITY

Physical and Link Layer Attacks

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

5 Tips to Fortify your Wireless Network

Wireless Security i. Lars Strand lars (at) unik no June 2004

Security Setup CHAPTER

The following chart provides the breakdown of exam as to the weight of each section of the exam.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

WPA Migration Mode: WEP is back to haunt you

ClearPass QuickConnect 2.0

Analysis of Security or Wired Equivalent Privacy Isn t. Nikita Borisov, Ian Goldberg, and David Wagner

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Lab Configure Enterprise Security on AP

CSC 4900 Computer Networks: Security Protocols (2)

Configuring the Client Adapter through Windows CE.NET

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Securing a Wireless LAN

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

WPA Passive Dictionary Attack Overview

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Overview of Security

Frequently Asked Questions WPA2 Vulnerability (KRACK)

PGP, Net Scanning, Wireless Network Security SPRING 2018: GANG WANG

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

5 Steps Wifi Hacking Cracking WPA2 Password

Configuring a VAP on the WAP351, WAP131, and WAP371

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

CWNA Exam PW0-100 certified wireless network administrator(cwna) Version: 5.0 [ Total Questions: 120 ]


CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

Security of WiFi networks MARCIN TUNIA

Configuring the WMIC for the First Time

The RNS (Robust Secure Network) IE must be enabled with an AES Cipher.

Section 4 Cracking Encryption and Authentication

Lab Configure Basic AP security through GUI

Configuring Layer2 Security

Standard For IIUM Wireless Networking

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Basic Wireless Settings on the CVR100W VPN Router

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

Figure 5-25: Setup Wizard s Safe Surfing Screen

CE Advanced Network Security Wireless Security

Wireless Networking Basics. Ed Crowley

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Configuring WLAN Security

Chapter 2. Switch Concepts and Configuration. Part II

IEEE i and wireless security

LiteStation2 LiteStation5 User s Guide

network security s642 computer security adam everspaugh

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Securing Your Wireless LAN

Stream Ciphers. Stream Ciphers 1

WLAN Security. รศ. ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D.

Securing Internet of things Infrastructure Standard and Techniques

Summary on Crypto Primitives and Protocols

AplombTech Smart Router Manual

Transcription:

WarDriving slide 1 related fixed line attacks war dialing port scanning war driving drive through a metropolitan area looking for wireless access points software logs, latidute/longitude runs software near each point to probe vulnerabilities

BSS and IBSS slide 2 core of an 802.11 network is called a Basic Service Set (BSS) consists of an access point (AP) clients (stations) connect to the AP APs send beacons giving SSID station and AP go through authentication to connect station should disassociate itself from the AP an AP will timeout if a station just leaves the area

WEP slide 3 Wired Equivalent Privacy (WEP) encryption using WEP uses a shared key (K) mechanism with a symmetric ciper called RC4 key size is either 40 or 104 bits transmitting device creates 24 bit random initialization vector (IV) uses IV and K to encrypt the data E(K,IV,P,C) transmitted to receiver who then uses shared key, K,and IV to decrypt data

WEP slide 4 Original data P Original data P Checksum IV pad &ID Original data P Checksum encrypted section

WEP slide 5 notice that IV is not encrypted some vendors claim 40 bit or 104 bit encryption some vendors claim 64 bit or 128 bit encryption misleading as 24 bits are sent in plaintext thus 40 bit and 64 bit claims are the same and 104 and 128 bit claims are the same

Authentication using WEP slide 6 upon association the station and AP exchange type of authentication required selecting open indicates no authentication selecting shared secret requires authentication

Authentication using WEP slide 7 authentication can be done using the reverse of encryption station, A, sends a nonce (random number) to another station, B station B encrypts the datum (with A s key, K)and returns it to A if A can decrypt the datum then it notifies station, B, that authentication was successful

Problems with WEP slide 8 alas WEP is not secure key management, using symmetric key creates a problem how dowesend a machine the key safely? a40bit key is small and can be broken by brute force on commodity PCs futhermore RC4 as implemented in WEP is weak and can be cracked if enough traffic is intercepted see this paper http:// www.crypto.com/papers/others/rc4_ksaproc.ps also see airsnort http://airsnort.shmoo.com

Problems with WEP slide 9 some vendors have implemented the IV choice in the same predictive manner some vendors do not choose a different IV!

Snooping/Eavesdropping slide 10 trivial to implement on GNU/Linux many programs exist etherfind,snoop tcpdump easy write your own to capture passwords passwords are often transferred in plaintext in some protocols ftp, telnet, rlogin, www

URL format slide 11 protocol//user:password@host:port/path protocol: http, ftp, news user and password: optional, but in plaintext! port: normally 80 host: FQDN for remote servers path: relative to the servers root

Socket code to read all packets slide 12 /* OPEN PROMISCUOUS SOCKET */ if ((sd = socket (AF_INET, SOCK_PACKET, htons (ETH_P_ALL))) < 0) { perror ("Can t get socket: "); exit (1); } /* SET PROMISC */ strcpy (oldifr.ifr_name, device); if (ioctl (sd, SIOCGIFFLAGS, &oldifr) < 0) { close (sd); perror ("Can t get flags: "); exit (2); }

Socket code to read packets slide 13 ifr = oldifr; ifr.ifr_flags = IFF_PROMISC; if (ioctl (sd, SIOCSIFFLAGS, &ifr) < 0) { close (sd); perror ("Can t set flags: "); exit (3); } while (TRUE) { /* This is the main data-gathering loop */ sizeaddr = SN_RCV_BUF_SIZE; } length = recvfrom (sd, buf, SN_RCV_BUF_SIZE, 0, &saddr, &sizeaddr); if (length > 0) handle_frame (buf, length, &saddr);

Socket code to read all packets slide 14 under GNU/Linux the user needs to run the above code as root provides no security as an attacker could run it from their laptop

handle_frame slide 15 function decodes the message held insidebuf and looks for plaintext password inftp,telnet, URLs it could search for particular src ip address dest ip address ftp packets technique known as packet filtering with advent of very fast inexpensive machines and large RAM sizes, capturing packets is easy

Security at the data link layer slide 16 802.11i, is an amendment to the IEEE 802.11 standard specifying security mechanisms for wireless networks created due to the failure of WEP ratified on 24 June 2004, and supersedes the previous security specification, Wired Equivalent Privacy

Security at the data link layer slide 17 802.11i uses AES-based CCMP to provide confidentiality, integrity and origin authentication AES uses a 128 bit key CCMP is a mode of operation for cryptographic block cipher providing authentication and privacy makes use of the Advanced Encryption Standard (AES) block cipher, whereas WEP and WPA use the RC4 stream cipher

Security at the data link layer slide 18 Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless networks WPA requires either new hardware or existing hardware to be firmware upgraded WPA2 cannot use older WEP hardware WPA implements the majority of the IEEE 802.11i standard WPA2 implements the full IEEE 802.11i standard

Legacy hardware slide 19 problem exists, huge amount of WEP hardware deployed might like toupgrade or reflash existing hardware but some hardware cannot be firmware upgraded we could use TKIP

Legacy hardware slide 20 Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networks recall the problems of WEP too short a key (40 bits) IV (initialisation vector) is predictive, making it susceptible to replay attacks the key used for encryption in TKIP is 128 bits

Legacy hardware slide 21 TKIP also changes the key used for each packet it does this by incrementing a unique 48 bit serial number which is used as the IV and also as part of the key TKIP also generates part of the key from its base key which in turn is created every time a station associates to an access point all these elements combined will stop a replay attack

Conclusion slide 22 WEP is broken, do not trust it WEP legacy hardware will live for many years to come we should move to WPA2 practically we should use TKIP and WPA inthe interim also we should try and use application and transport security wherever possible (ssh and openssl for example)