Vivek Ramachandran MD Sohail Ahmad www.airtightnetworks.net Cafe Latte with a Free Topping of Cracked WEP - Retrieving WEP Keys From Road-Warriors
Talk Outline WEP Cracking – a quick primer Debunking the myths of WEP Cracking – Café Latte Café Latte - Attack Background Café Latte – Detailed Analysis Countermeasures against Café Latte Conclusions Q&A
Cracks in WEP -- Historic Evolution 2001 - The insecurity of 802.11, Mobicom, July 2001  N. Borisov, I. Goldberg and D. Wagner. 2001 - Weaknesses in the key scheduling algorithm of RC4. S. Fluhrer, I. Mantin, A. Shamir. Aug 2001. 2002 - Using the Fluhrer, Mantin, and Shamir Attack to Break WEP A. Stubblefield, J. Ioannidis, A. Rubin. 2004 – KoreK, improves on the above technique and reduces the complexity of WEP cracking. We now require only around 500,000 packets to break the WEP key. 2005 – Adreas Klein introduces more correlations between the RC4 key stream and the key. 2007 – PTW extend Andreas technique to further simplify WEP Cracking. Now with just around 60,000 – 90,000 packets it is possible to break the WEP key. Is there really a need for a New Attack?
Limitations of the traditional WEP Cracking  The attacker  needs to be in the RF vicinity  of the WEP network The authorized network should have  at least one AP up and running  which the Clients can connect to Client AP Hacker
An example scenario where traditional approaches fail An isolated Client far away from the authorized network Hacker Victim This Client has a WEP encrypted network “Toorcon” in its PNL Can we crack the WEP key of “Toorcon” using only this Client? Can we have an IP layer connectivity with this Client? WEP Cracking Fails!! Café Latte Attack to the rescue!
What is the Café Latte Attack? We attack the Client to retrieve the WEP key The Client can be absolutely isolated and nowhere near the authorized network There is no need for an authorized network AP Hacker Client Moon No AP needed
Before we begin – a quick 101!
Attack Background – Windows Wireless Configuration Manager User connects to a WEP protected network “Default” for the first time User enters the WEP key when prompted by the Windows wireless utility “ Default” gets added into the preferred network list (PNL) of the configuration manager
Attack Background - Conclusions Windows stores the SSID and the WEP key in its Preferred Network List (PNL) Question:   Can we retrieve the WEP key from this Client e.g. at a Coffee Shop? Answer:   Café Latte Attack
Can we crack WEP with just an isolated Client?  To crack WEP we need a large number of encrypted data packets 90k for PTW 500k for Korek+FMS It does not matter which device produces these packets – Client or AP Is it possible to make the Client produce data packets without connecting to the authorized network’s AP? Client
Café Latte - How does it work?  Client probes for SSID “Default”  Hacker sniffs these probes and brings up a Honeypot Client Authenticates and Associates with this Honeypot Fake Authentication and Association works because WEP does not have mutual Authentication  Default Default
 

More Related Content

PPT
Caffe Latte Attack
PPT
Caffe Latte Attack Presented In Toorcon
PPT
Chapter11ccna
PPTX
Hacking Wireless Networks : Null Delhi (November)
PDF
Nick Stephens-how does someone unlock your phone with nose
DOC
N918 specification-www.ttbvs.com
PDF
New flaws in WPA-TKIP
PDF
Huiming Liu-'resident evil' of smart phones--wombie attack
Caffe Latte Attack
Caffe Latte Attack Presented In Toorcon
Chapter11ccna
Hacking Wireless Networks : Null Delhi (November)
Nick Stephens-how does someone unlock your phone with nose
N918 specification-www.ttbvs.com
New flaws in WPA-TKIP
Huiming Liu-'resident evil' of smart phones--wombie attack

What's hot (20)

PPT
Cisco Packet Tracer Overview
PDF
Attacking and Securing WPA Enterprise Networks
PDF
Zhiyun Qian-what leaves attacker hijacking USA Today site
DOC
W2055 specification-www.ttbvs.com
PPTX
CCNA NAT (Network Address Translation)
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
ODP
Feb-8-2012-Breaking-Wireless-Security
PPTX
CCNA Network Monitoring
PDF
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
PDF
Practical Verification of TKIP Vulnerabilities
PPTX
PPT
PPTX
CCNA point to point
PPT
Firewall - Network Defense in Depth Firewalls
PPTX
Packet tracer 6.2 new features
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPT
11 01 Tbd I Radius Security
PPTX
CSCI 1100 Group 1 project 1
PDF
SSL Web VPN
PDF
Aircrack
Cisco Packet Tracer Overview
Attacking and Securing WPA Enterprise Networks
Zhiyun Qian-what leaves attacker hijacking USA Today site
W2055 specification-www.ttbvs.com
CCNA NAT (Network Address Translation)
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Feb-8-2012-Breaking-Wireless-Security
CCNA Network Monitoring
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Practical Verification of TKIP Vulnerabilities
CCNA point to point
Firewall - Network Defense in Depth Firewalls
Packet tracer 6.2 new features
Cracking WPA/WPA2 with Non-Dictionary Attacks
11 01 Tbd I Radius Security
CSCI 1100 Group 1 project 1
SSL Web VPN
Aircrack
Ad

Viewers also liked (9)

PPT
PPTX
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
PPT
Activemethods
PPT
Volleyball 2008
PPT
NYC Annual Citywide Bocce Tournament
PDF
MulchFest 2009
PPTX
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
PPT
Citywide Beach Volleyball Tournament
PPTX
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
Activemethods
Volleyball 2008
NYC Annual Citywide Bocce Tournament
MulchFest 2009
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
Citywide Beach Volleyball Tournament
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
Ad

Similar to Cafe Latte (20)

PPT
Security Issues of 802.11b
PPT
Security Issues of IEEE 802.11b
PPTX
Wired equivalent privacy by SecArmour
PPTX
Wifi Security
PPT
4 wifi security
PPT
Shashank wireless lans security
PPTX
WEP/WPA attacks
PDF
PPT
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
PDF
Airheads vail 2011 pci 2.0 compliance
PPT
Wireless security presentation
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPT
Wireless Device and Network level security
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
PPT
Wireless security837
PPTX
Wireless Security
PDF
How to Hack WiFi on Windows
PDF
Hacking Wireless Networks by Mandeep Singh Jadon
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PDF
Fundamentals of network hacking
Security Issues of 802.11b
Security Issues of IEEE 802.11b
Wired equivalent privacy by SecArmour
Wifi Security
4 wifi security
Shashank wireless lans security
WEP/WPA attacks
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
Airheads vail 2011 pci 2.0 compliance
Wireless security presentation
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
Wireless Device and Network level security
Pentesting Your Own Wireless Networks, June 2011 Issue
Wireless security837
Wireless Security
How to Hack WiFi on Windows
Hacking Wireless Networks by Mandeep Singh Jadon
DTS Solution - Wireless Security Protocols / PenTesting
Fundamentals of network hacking

More from AirTight Networks (6)

PPTX
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
PPTX
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
PPTX
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
PPTX
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
PDF
PDF
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
SMAC - Presentation from RetailWeek Technology Summit, Sept 23

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
STKI Israel Market Study 2025 version august
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
The various Industrial Revolutions .pptx
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Modernising the Digital Integration Hub
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Hindi spoken digit analysis for native and non-native speakers
Benefits of Physical activity for teenagers.pptx
Custom Battery Pack Design Considerations for Performance and Safety
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
sustainability-14-14877-v2.pddhzftheheeeee
2018-HIPAA-Renewal-Training for executives
sbt 2.0: go big (Scala Days 2025 edition)
STKI Israel Market Study 2025 version august
CloudStack 4.21: First Look Webinar slides
A review of recent deep learning applications in wood surface defect identifi...
The various Industrial Revolutions .pptx
Flame analysis and combustion estimation using large language and vision assi...
Module 1.ppt Iot fundamentals and Architecture
Modernising the Digital Integration Hub
A proposed approach for plagiarism detection in Myanmar Unicode text
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Taming the Chaos: How to Turn Unstructured Data into Decisions
NewMind AI Weekly Chronicles – August ’25 Week III

Cafe Latte

  • 1. Vivek Ramachandran MD Sohail Ahmad www.airtightnetworks.net Cafe Latte with a Free Topping of Cracked WEP - Retrieving WEP Keys From Road-Warriors
  • 2. Talk Outline WEP Cracking – a quick primer Debunking the myths of WEP Cracking – Café Latte Café Latte - Attack Background Café Latte – Detailed Analysis Countermeasures against Café Latte Conclusions Q&A
  • 3. Cracks in WEP -- Historic Evolution 2001 - The insecurity of 802.11, Mobicom, July 2001 N. Borisov, I. Goldberg and D. Wagner. 2001 - Weaknesses in the key scheduling algorithm of RC4. S. Fluhrer, I. Mantin, A. Shamir. Aug 2001. 2002 - Using the Fluhrer, Mantin, and Shamir Attack to Break WEP A. Stubblefield, J. Ioannidis, A. Rubin. 2004 – KoreK, improves on the above technique and reduces the complexity of WEP cracking. We now require only around 500,000 packets to break the WEP key. 2005 – Adreas Klein introduces more correlations between the RC4 key stream and the key. 2007 – PTW extend Andreas technique to further simplify WEP Cracking. Now with just around 60,000 – 90,000 packets it is possible to break the WEP key. Is there really a need for a New Attack?
  • 4. Limitations of the traditional WEP Cracking The attacker needs to be in the RF vicinity of the WEP network The authorized network should have at least one AP up and running which the Clients can connect to Client AP Hacker
  • 5. An example scenario where traditional approaches fail An isolated Client far away from the authorized network Hacker Victim This Client has a WEP encrypted network “Toorcon” in its PNL Can we crack the WEP key of “Toorcon” using only this Client? Can we have an IP layer connectivity with this Client? WEP Cracking Fails!! Café Latte Attack to the rescue!
  • 6. What is the Café Latte Attack? We attack the Client to retrieve the WEP key The Client can be absolutely isolated and nowhere near the authorized network There is no need for an authorized network AP Hacker Client Moon No AP needed
  • 7. Before we begin – a quick 101!
  • 8. Attack Background – Windows Wireless Configuration Manager User connects to a WEP protected network “Default” for the first time User enters the WEP key when prompted by the Windows wireless utility “ Default” gets added into the preferred network list (PNL) of the configuration manager
  • 9. Attack Background - Conclusions Windows stores the SSID and the WEP key in its Preferred Network List (PNL) Question: Can we retrieve the WEP key from this Client e.g. at a Coffee Shop? Answer: Café Latte Attack
  • 10. Can we crack WEP with just an isolated Client? To crack WEP we need a large number of encrypted data packets 90k for PTW 500k for Korek+FMS It does not matter which device produces these packets – Client or AP Is it possible to make the Client produce data packets without connecting to the authorized network’s AP? Client
  • 11. Café Latte - How does it work? Client probes for SSID “Default” Hacker sniffs these probes and brings up a Honeypot Client Authenticates and Associates with this Honeypot Fake Authentication and Association works because WEP does not have mutual Authentication Default Default
  • 12.