wireless insecurity. wireless 802.11a works on 5 ghz 802.11b,g,n works on 2.4 ghz access points and...

23
Wireless Insecurity

Upload: ethan-cook

Post on 21-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Wireless Insecurity

Page 2: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Wireless

• 802.11a works on 5 Ghz

• 802.11b,g,n works on 2.4 Ghz

• Access points and wireless cards are used.

• Protocol can be either in the clear or encrypted.

• Wired Equivalent Privacy (WEP) provides poor security

Page 3: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Scenario

AttackerUser

Access Point

PhysicalSecurity

Page 4: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in
Page 5: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

AttackerUser

Access Point

Typical Configuration

PCMCIA Wireless NIC

USB Wireless NIC

ISA/PCI Wireless NIC

Corporate Resources

Page 6: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Wireless Equivalence Protocol

• RC4 Crypto algorithm

• 64, 128 bit encryption

• 24 bit Initialization Vector

• Compromised in under 24 hours– Even faster now!!!

• No key management (key update)New

Page 7: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Configuring Wireless

Service Set Identifier (SSID)

Key

Page 8: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Steps for attack

• Surveying (Wardriving/Warwalking)

• Identification (Warchalking)

• Crypto-analysis(Cracking)

• Penetration

• Exploitation

Page 9: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Wardriving Tools

• Laptop or PDA with Wireless Card– Prism Wireless Card for promiscuous

monitoring– Antenna– GPS– Netstumbler– Kismet– Wireshark

GPS

Antenna

Page 10: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

PDA with wireless card and Ministumbler Goal is to identify

Access Points and SSIDs

Page 11: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in
Page 12: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Warchalking

Identifying wireless sites is a new trophy sport for some.

Page 13: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Note Access Points are Identified

Page 14: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Warchalking as a Social Activity

Page 15: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

WEP Cracking

• Capture the packets of an Access Point for a Day using Ethereal.

• Pass through WEP Crack (Shareware)

• Will identify the key in under an hour.

• WEP crypto will be defeated (including 128 bit)

Nobody uses WEP anymore right?

Page 16: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

WPA2

• TKIP

• AES

• WPA2-PSK can be cracked with PSK under 21 characters

Use LONG pass phrases for Wireless

Everyonehastherighttolife,libertyand security

Page 17: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Bypassing Access Points with MAC Access Control

• Some Access Points require MACs to authenticate access.

• MACs can be discovered and forged

• Using linux – ifconfig hw eth0 11:11:11:11:11

Page 18: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Other tools• AirSnort

– AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

• AirJAM– Jams Access Point– denial of service attack

Page 19: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

• Aircrack-ng and WEPLab

are 802.11 WEP key crackers implementing the Fluhrer - Mantin - Shamir (FMS) attack, and the KoreK approach.

• CoWPAtty (Dictionary attack tool)

Page 20: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Penetration

• Access the network

• Take/Alter Data

• Use backdoor (Wi-Fi) or Front Door (cable)

• GO TO JAIL – Criminal Code

Page 21: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Improvements

• Wi-Fi Protected Access

• WPA2 (802.11i)

• Implementation of Temporal Key Interchange Protocol

• Extensible Authentication Protocol

Page 22: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

Other safeguards

• RADIUS Access control

• VPN based on Certificates

• Intrusion Prevention System

• Intrusion Detection System

Page 23: Wireless Insecurity. Wireless 802.11a works on 5 Ghz 802.11b,g,n works on 2.4 Ghz Access points and wireless cards are used. Protocol can be either in

What is the point?

• Vulnerabilities are discovered

• Vulnerabilities get fixed

• New vulnerabilities appear

• You must re-assess safeguards