SlideShare a Scribd company logo
Wireless Security Workshop Rohit Srivastwa Sheetal Joseph © ClubHack http://clubhack.com 7 th  December 2008
Roadmap Wireless Overview Wireless Security Standards Exploiting Wireless Vulnerabilities Wireless Best Practices © ClubHack http://clubhack.com
Wireless - The World of Convenience! User mobility Reduced cost  Flexibility and convenience Increase the productivity Wireless devices use Radio Frequency (RF) technology to facilitate communication. © ClubHack http://clubhack.com
Wireless Standards 802.11b   – Transmits at 2.4 GHz, sends data up to 11 Mbps using direct sequence spread spectrum modulation. 100 -150 feet range 802.11a  – Transmits at 5 GHz and send data up to 54 Mbps using orthogonal frequency division multiplexing (OFDM). 50-75 feet range. Not interoperable is 802.11b.  802.11g  – Combines features of both standards (a,b), 2.4 GHz frequency, 54 Mbps Speed, 100-150 feet range and is interoperable with 802.11b.  802.11i   – Improves WEP encryption by implementing Wi-Fi Protected Access (WPA2). Data encryption with Advanced Encryption Standard (AES). 802.11n   – 600 Mbps speed by adding multiple-input multiple-output (MIMO) and Channel-bonding/40 MHz operation to the physical (PHY) layer, and frame aggregation to the MAC layer. 802.11n uses WPA and WPA2 to secure the network.  © ClubHack http://clubhack.com
Latest Wireless Hacks Email sent before the Ahmedabad  & Delhi bombings  sent via a hacked wireless connection TJX theft tops 45.6 million card numbers  http://www.tjx.com/tjx_message.html © ClubHack http://clubhack.com
Types of Attacks Identity theft (MAC spoofing)  - Cracker is able to listen in on network traffic and identify the MAC address of a computer and attack after spoofing the same Man-in-the-middle attacks  - Cracker entices clients to log into a computer set up as an AP Once this is done, the hacker connects to a real AP through another wireless card offering a steady flow of traffic. Denial of service  - Cracker continually bombards a targeted AP with bogus requests, premature successful connection messages, failure messages, and/or other commands.  © ClubHack http://clubhack.com
Wireless Security Goals Access Control  - Ensure that your wireless infrastructure is not mis-used. This calls for Efficient Key Management Data Integrity  -  Ensure that your data packets are not modified in transit. Confidentiality  - Ensure that the contents of your wireless traffic is not learned. Proper Encryption mechanisms need to be implemented. © ClubHack http://clubhack.com
Wireless Security Standards © ClubHack http://clubhack.com
Description of WEP Protocol WEP relies on a shared secret key (64 bit/128 bit) which is shared between the sender (Mobile Station) and the receiver (Access Point). Secret Key - to encrypt packets before they are transmitted Integrity Check - to ensure packets are not modified in transit. The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points. © ClubHack http://clubhack.com
CHAP Authentication © ClubHack http://clubhack.com Supplicant Authenticator username challenge response Accept/reject
How WEP works   © ClubHack http://clubhack.com IV RC4 key IV encrypted packet original unencrypted packet checksum
Deficiencies of WEP IV is too short and not protected from reuse. The per packet key is constructed from the IV, making it susceptible to weak key attacks. No effective detection of message tampering (message integrity). No built-in provision to update the keys in all wireless clients connected to the access point. No protection against message replay. © ClubHack http://clubhack.com
WEP Cracking Demo © ClubHack http://clubhack.com
Radius: An additional layer in security © ClubHack http://clubhack.com
802.1x Port-based access control Mutual authentication via authentication server © ClubHack http://clubhack.com 3. Issue  challenge 5. Validate response 2. Limit access to  authentication  server 6. Allow access  to network 1. Request  access 4. Answer  challenge 7. Use other  Network devices Time Supplicant Authentic ator Authenticator   server Client inaccessible network devices
Wi-Fi Protected Access (WPA) IEEE 802.1X authentication server- LEAP, EAP/TLS, PEAP or PSK (Pre-Shared Key) RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).  Temporal Key Integrity Protocol (TKIP)  Message Integrity Code (MIC) Michael to ensure data Integrity  © ClubHack http://clubhack.com
WPA – PSK A pass phrase (shared secret key) is used. Pre-Shared Key is generated by combining the Service Set Identifier (SSID)  with a passphrase (an ASCII  string, 8-63 characters.) A passphrase less than 64 characters can be insecure Management is handled on the AP - Vulnerable to dictionary attacks  © ClubHack http://clubhack.com
Temporal Key Integrity Protocol Fixes flaws of key reuse in WEP - Comprised of 3 parts, guarantees clients different keys - 128-bit temporal key, shared by clients and APs - MAC of client - 48-bit IV describes packet sequence number Increments the value of the IV to ensure every frame has a different value Changes temporal keys every 10,000 packets Uses RC4 like WEP, only firmware upgrade required © ClubHack http://clubhack.com
Michael Message Integrity Check Message Integrity Code (MIC) - 64-bit message calculated using “Michael” algorithm inserted in TKIP packet to detect content alteration Message is concatenated with the secret key and the result is hashed  Protects both data and header Implements a frame counter, which discourages replay attacks © ClubHack http://clubhack.com
WPA Summary Confidentiality : Per-packet keying via TKIP Message Authenticity : Michael algorithm  Access Control and Authentication : IEEE 802.1x -EAP/TLS © ClubHack http://clubhack.com
Deficiencies of WPA Dictionary Attack on WPA-PSK  - The weak pass-phrases users typically employ are vulnerable to dictionary attacks. DoS Attacks  - Due to inevitable weaknesses of Michael, the network is forced to shut down for one minute if two frames are discovered that fail the Michael check. TKIP Attack  - An attacker sniffs a packet, makes minor modifications to affect the checksum, and checks the results by sending the packet back to the access point.  © ClubHack http://clubhack.com
© ClubHack http://clubhack.com WPA–PSK Hacking Demo
WPA2 – 802.11i 802.1x / PSK for authentication. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) to provide confidentiality, integrity and origin authentication.  AES replaces RC4 w/TKIP © ClubHack http://clubhack.com
A Comparison © ClubHack http://clubhack.com WEP WPA WPA2 Cipher RC4 RC4 AES Key Size 40 bits 128 bits 128 bits Key Life 24 bit IV 48 bit IV 48 bit IV Packet Key Concatenated Mixing Function  Not Needed Data Integrity CRC - 32 Michael  CCM Replay Attack None IV Sequence IV Sequence Key Management None  EAP - Based EAP - Based
A dedicated website for wardriving in India http://wardrive.in
Trivia On 10th November 2008,  ClubHack  with support of Cyber Crime Cell of Pune Police conducted a Wardriving in Pune, Maharashtra. 50% of Pune’s wireless networks were found to be Open. 31% of Pune’s wireless networks were found with weak encryption (WEP) Only 19% of the networks were strongly encrypted with WPA (and its variants) © ClubHack http://clubhack.com Ref:  http://www.wardrive.in/
Exploiting Vulnerabilities Locating a wireless network Attaching to the Found Wireless Network Sniffing Wireless Data © ClubHack http://clubhack.com
Locating a wireless network © ClubHack http://clubhack.com We need a special holiday to honor the countless kind souls with unsecured networks named 'linksys'. http://www.xkcd.com   Strip Number: 466
Locating a wireless network NetStumbler  – This Windows based tool easily finds wireless signals being broadcast within range © ClubHack http://clubhack.com
Locating a wireless network (contd) Kismet  – Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks. © ClubHack http://clubhack.com
Capturing the Wireless Network If the wireless network is using authentication and/or encryption, you may need one of the following tools. Airodump-ng  - packet capture program, collects authentication handshake Aireplay-ng  - de-authenticator /packet injection program © ClubHack http://clubhack.com
Attacking to the Wireless Network  CowPatty  – Brute force tool for cracking WPA-PSK. Aircrack-ng  - To crack PSK using authentication handshake © ClubHack http://clubhack.com
Sniffing Wireless Data Wireshark  – Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs. © ClubHack http://clubhack.com
Steps to achieve security for home users •  Open the configuration of your wi-fi device •  Go to wireless setting •  Under security option, select any one (whichever available) –  WPA –  WPA - PSK –  WPA - Personal –  WPA - AES –  WPA2 - Personal –  WPA2 - PSK •  Set a complex password •  Change the login password of the wireless router. •  Change the SSID to something classy •  Don't disable SSID broadcast •  Done
Example : Linksys
Example : Netgear
Example : Dlink
Example : ZyXEL
Further Advised Change the router login password frequently Atleast once a month Change the wireless WPA password also Atleast once a month Avoid temptation to connect to open wireless just looking for free internet.
Securing Enterprise Networks 1. Define, monitor and enforce a wireless security policy Policy should cover all 802.11 and Bluetooth wireless devices Define wireless policies for mobile workers Ensure wireless devices are not used until they comply with the wireless security policy 2. Take a complete inventory of all Access Points and 802.11 devices in the airwaves Eliminate rogue Access Points and unauthorized user Stations. © ClubHack http://clubhack.com
Securing Enterprise Networks (Contd) 3. Define secure configurations for Access Points and user Stations Change default setting Disable SSID broadcast Turn-off “ad-hoc” mode operation 4. Define acceptable encryption and authentication protocols Use strong authentication (802.1x with EAP recommended) Use strong encryption with at least 128-bit keys (WPA2, WPA recommended) Deploy a layer-3 Virtual Private Network (VPN) for wireless communication © ClubHack http://clubhack.com
Securing Enterprise Networks (Contd) 5. Monitor the airwaves to identify suspicious activity Deploy a Wireless Intrusion Detection System (IDS) to identify threats and attacks Detect and terminate unauthorized associations in a timely manner Monitor wireless assets for policy violations Log, analyze, and resolve incidents in a timely manner Gather and store wireless activity information for forensic analysis © ClubHack http://clubhack.com
References Aircrack-ng Airtight Networks  BackTrack 3 Understanding WPA TKIP crack Practical attacks against WEP and WPA Best Practices for Wireless Network Security and Sarbanes-Oxley compliance – Joshua Wright iPig Encryption Software Wikipedia! © ClubHack http://clubhack.com
Q & 42 ? :-?
© ClubHack http://clubhack.com Thank  You! [email_address] [email_address]

More Related Content

PDF
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
PDF
RFID Hacking: Live Free or RFID Hard
PDF
A 2018 practical guide to hacking RFID/NFC
PDF
SCADA deep inside: protocols and security mechanisms
PPTX
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
PDF
SlingSecure Mobile Voice Encryption
PDF
Exfiltrating Data through IoT
PDF
Wireless security
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
RFID Hacking: Live Free or RFID Hard
A 2018 practical guide to hacking RFID/NFC
SCADA deep inside: protocols and security mechanisms
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
SlingSecure Mobile Voice Encryption
Exfiltrating Data through IoT
Wireless security

What's hot (20)

PDF
Extracting the Painful (Blue)Tooth - Presentation
PDF
Meetup -- RFID
PDF
Hacking TESLA Model3 - NFC Relay Revisited
PPT
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
PDF
RFID Security Module
PDF
Grand theft-auto-digital-key-hacking
PDF
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
PPTX
Voice encryption for gsm using arduino
PDF
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
PPTX
PrivateGSM - Voice Encryption Technical Overview
PDF
NFC: Naked Fried Chicken (PHDays VI)
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PPTX
Arduino Interface with MySQL for Storing RFID Access Details
PDF
Cant touch this: cloning any Android HCE contactless card
PPTX
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
PDF
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
PDF
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
PPTX
Encrypted Voice Communications
PDF
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
PPTX
How to do Cryptography right in Android Part One
Extracting the Painful (Blue)Tooth - Presentation
Meetup -- RFID
Hacking TESLA Model3 - NFC Relay Revisited
Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015
RFID Security Module
Grand theft-auto-digital-key-hacking
It’s in the Air(waves): Deconstructing 2017’s Biggest RF Attacks
Voice encryption for gsm using arduino
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
PrivateGSM - Voice Encryption Technical Overview
NFC: Naked Fried Chicken (PHDays VI)
How to hack a telecommunication company and stay alive. Sergey Gordeychik
Arduino Interface with MySQL for Storing RFID Access Details
Cant touch this: cloning any Android HCE contactless card
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Sergio González - WiFiSlax 4.0 [RootedCON 2010]
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Encrypted Voice Communications
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
How to do Cryptography right in Android Part One

Similar to Sheetal - Wirelesss Hacking - ClubHack2008 (20)

PPTX
WPA3 - What is it good for?
PPTX
Wireless Security null seminar
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PPTX
Wireless Pentesting: It's more than cracking WEP
PPT
Security Issues of 802.11b
PPT
Security Issues of IEEE 802.11b
PPT
4 wifi security
PPTX
Wi fi security
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
PPTX
Wireless and how safe are you
PDF
ECE560 Wireless and Mobile Security Fall2020..pdf
PPTX
Wifi Security
PPTX
Wireless network security
PPT
Wireless security presentation
PPT
5169 wireless network_security_amine_k
PPT
Shashank wireless lans security
PDF
Comprehensive Guide On Network Security
PPTX
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
PDF
Viable means using which Wireless Network Security can be Jeopardized
PPTX
Wireless hacking
WPA3 - What is it good for?
Wireless Security null seminar
DTS Solution - Wireless Security Protocols / PenTesting
Wireless Pentesting: It's more than cracking WEP
Security Issues of 802.11b
Security Issues of IEEE 802.11b
4 wifi security
Wi fi security
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wireless and how safe are you
ECE560 Wireless and Mobile Security Fall2020..pdf
Wifi Security
Wireless network security
Wireless security presentation
5169 wireless network_security_amine_k
Shashank wireless lans security
Comprehensive Guide On Network Security
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
Viable means using which Wireless Network Security can be Jeopardized
Wireless hacking

More from ClubHack (20)

PDF
India legal 31 october 2014
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
PPT
Cyber Insurance
PPTX
Summarising Snowden and Snowden as internal threat
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
PPTX
Smart Grid Security by Falgun Rathod
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
XSS Shell by Vandan Joshi
PDF
Clubhack Magazine Issue February 2012
PDF
ClubHack Magazine issue 26 March 2012
PDF
ClubHack Magazine issue April 2012
PDF
ClubHack Magazine Issue May 2012
PDF
ClubHack Magazine – December 2011
India legal 31 october 2014
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyber Insurance
Summarising Snowden and Snowden as internal threat
Fatcat Automatic Web SQL Injector by Sandeep Kamble
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Smart Grid Security by Falgun Rathod
Legal Nuances to the Cloud by Ritambhara Agrawal
Infrastructure Security by Sivamurthy Hiremath
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hacking and Securing iOS Applications by Satish Bomisstty
Critical Infrastructure Security by Subodh Belgi
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
XSS Shell by Vandan Joshi
Clubhack Magazine Issue February 2012
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue April 2012
ClubHack Magazine Issue May 2012
ClubHack Magazine – December 2011

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25-Week II
Reach Out and Touch Someone: Haptics and Empathic Computing
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Group 1 Presentation -Planning and Decision Making .pptx
A comparative analysis of optical character recognition models for extracting...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Machine Learning_overview_presentation.pptx
Tartificialntelligence_presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx

Sheetal - Wirelesss Hacking - ClubHack2008

  • 1. Wireless Security Workshop Rohit Srivastwa Sheetal Joseph © ClubHack http://clubhack.com 7 th December 2008
  • 2. Roadmap Wireless Overview Wireless Security Standards Exploiting Wireless Vulnerabilities Wireless Best Practices © ClubHack http://clubhack.com
  • 3. Wireless - The World of Convenience! User mobility Reduced cost Flexibility and convenience Increase the productivity Wireless devices use Radio Frequency (RF) technology to facilitate communication. © ClubHack http://clubhack.com
  • 4. Wireless Standards 802.11b – Transmits at 2.4 GHz, sends data up to 11 Mbps using direct sequence spread spectrum modulation. 100 -150 feet range 802.11a – Transmits at 5 GHz and send data up to 54 Mbps using orthogonal frequency division multiplexing (OFDM). 50-75 feet range. Not interoperable is 802.11b. 802.11g – Combines features of both standards (a,b), 2.4 GHz frequency, 54 Mbps Speed, 100-150 feet range and is interoperable with 802.11b. 802.11i – Improves WEP encryption by implementing Wi-Fi Protected Access (WPA2). Data encryption with Advanced Encryption Standard (AES). 802.11n – 600 Mbps speed by adding multiple-input multiple-output (MIMO) and Channel-bonding/40 MHz operation to the physical (PHY) layer, and frame aggregation to the MAC layer. 802.11n uses WPA and WPA2 to secure the network. © ClubHack http://clubhack.com
  • 5. Latest Wireless Hacks Email sent before the Ahmedabad & Delhi bombings sent via a hacked wireless connection TJX theft tops 45.6 million card numbers http://www.tjx.com/tjx_message.html © ClubHack http://clubhack.com
  • 6. Types of Attacks Identity theft (MAC spoofing) - Cracker is able to listen in on network traffic and identify the MAC address of a computer and attack after spoofing the same Man-in-the-middle attacks - Cracker entices clients to log into a computer set up as an AP Once this is done, the hacker connects to a real AP through another wireless card offering a steady flow of traffic. Denial of service - Cracker continually bombards a targeted AP with bogus requests, premature successful connection messages, failure messages, and/or other commands. © ClubHack http://clubhack.com
  • 7. Wireless Security Goals Access Control - Ensure that your wireless infrastructure is not mis-used. This calls for Efficient Key Management Data Integrity - Ensure that your data packets are not modified in transit. Confidentiality - Ensure that the contents of your wireless traffic is not learned. Proper Encryption mechanisms need to be implemented. © ClubHack http://clubhack.com
  • 8. Wireless Security Standards © ClubHack http://clubhack.com
  • 9. Description of WEP Protocol WEP relies on a shared secret key (64 bit/128 bit) which is shared between the sender (Mobile Station) and the receiver (Access Point). Secret Key - to encrypt packets before they are transmitted Integrity Check - to ensure packets are not modified in transit. The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points. © ClubHack http://clubhack.com
  • 10. CHAP Authentication © ClubHack http://clubhack.com Supplicant Authenticator username challenge response Accept/reject
  • 11. How WEP works © ClubHack http://clubhack.com IV RC4 key IV encrypted packet original unencrypted packet checksum
  • 12. Deficiencies of WEP IV is too short and not protected from reuse. The per packet key is constructed from the IV, making it susceptible to weak key attacks. No effective detection of message tampering (message integrity). No built-in provision to update the keys in all wireless clients connected to the access point. No protection against message replay. © ClubHack http://clubhack.com
  • 13. WEP Cracking Demo © ClubHack http://clubhack.com
  • 14. Radius: An additional layer in security © ClubHack http://clubhack.com
  • 15. 802.1x Port-based access control Mutual authentication via authentication server © ClubHack http://clubhack.com 3. Issue challenge 5. Validate response 2. Limit access to authentication server 6. Allow access to network 1. Request access 4. Answer challenge 7. Use other Network devices Time Supplicant Authentic ator Authenticator server Client inaccessible network devices
  • 16. Wi-Fi Protected Access (WPA) IEEE 802.1X authentication server- LEAP, EAP/TLS, PEAP or PSK (Pre-Shared Key) RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). Temporal Key Integrity Protocol (TKIP) Message Integrity Code (MIC) Michael to ensure data Integrity © ClubHack http://clubhack.com
  • 17. WPA – PSK A pass phrase (shared secret key) is used. Pre-Shared Key is generated by combining the Service Set Identifier (SSID) with a passphrase (an ASCII string, 8-63 characters.) A passphrase less than 64 characters can be insecure Management is handled on the AP - Vulnerable to dictionary attacks © ClubHack http://clubhack.com
  • 18. Temporal Key Integrity Protocol Fixes flaws of key reuse in WEP - Comprised of 3 parts, guarantees clients different keys - 128-bit temporal key, shared by clients and APs - MAC of client - 48-bit IV describes packet sequence number Increments the value of the IV to ensure every frame has a different value Changes temporal keys every 10,000 packets Uses RC4 like WEP, only firmware upgrade required © ClubHack http://clubhack.com
  • 19. Michael Message Integrity Check Message Integrity Code (MIC) - 64-bit message calculated using “Michael” algorithm inserted in TKIP packet to detect content alteration Message is concatenated with the secret key and the result is hashed Protects both data and header Implements a frame counter, which discourages replay attacks © ClubHack http://clubhack.com
  • 20. WPA Summary Confidentiality : Per-packet keying via TKIP Message Authenticity : Michael algorithm Access Control and Authentication : IEEE 802.1x -EAP/TLS © ClubHack http://clubhack.com
  • 21. Deficiencies of WPA Dictionary Attack on WPA-PSK - The weak pass-phrases users typically employ are vulnerable to dictionary attacks. DoS Attacks - Due to inevitable weaknesses of Michael, the network is forced to shut down for one minute if two frames are discovered that fail the Michael check. TKIP Attack - An attacker sniffs a packet, makes minor modifications to affect the checksum, and checks the results by sending the packet back to the access point. © ClubHack http://clubhack.com
  • 23. WPA2 – 802.11i 802.1x / PSK for authentication. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) to provide confidentiality, integrity and origin authentication. AES replaces RC4 w/TKIP © ClubHack http://clubhack.com
  • 24. A Comparison © ClubHack http://clubhack.com WEP WPA WPA2 Cipher RC4 RC4 AES Key Size 40 bits 128 bits 128 bits Key Life 24 bit IV 48 bit IV 48 bit IV Packet Key Concatenated Mixing Function Not Needed Data Integrity CRC - 32 Michael CCM Replay Attack None IV Sequence IV Sequence Key Management None EAP - Based EAP - Based
  • 25. A dedicated website for wardriving in India http://wardrive.in
  • 26. Trivia On 10th November 2008, ClubHack with support of Cyber Crime Cell of Pune Police conducted a Wardriving in Pune, Maharashtra. 50% of Pune’s wireless networks were found to be Open. 31% of Pune’s wireless networks were found with weak encryption (WEP) Only 19% of the networks were strongly encrypted with WPA (and its variants) © ClubHack http://clubhack.com Ref: http://www.wardrive.in/
  • 27. Exploiting Vulnerabilities Locating a wireless network Attaching to the Found Wireless Network Sniffing Wireless Data © ClubHack http://clubhack.com
  • 28. Locating a wireless network © ClubHack http://clubhack.com We need a special holiday to honor the countless kind souls with unsecured networks named 'linksys'. http://www.xkcd.com Strip Number: 466
  • 29. Locating a wireless network NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range © ClubHack http://clubhack.com
  • 30. Locating a wireless network (contd) Kismet – Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks. © ClubHack http://clubhack.com
  • 31. Capturing the Wireless Network If the wireless network is using authentication and/or encryption, you may need one of the following tools. Airodump-ng - packet capture program, collects authentication handshake Aireplay-ng - de-authenticator /packet injection program © ClubHack http://clubhack.com
  • 32. Attacking to the Wireless Network CowPatty – Brute force tool for cracking WPA-PSK. Aircrack-ng - To crack PSK using authentication handshake © ClubHack http://clubhack.com
  • 33. Sniffing Wireless Data Wireshark – Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs. © ClubHack http://clubhack.com
  • 34. Steps to achieve security for home users • Open the configuration of your wi-fi device • Go to wireless setting • Under security option, select any one (whichever available) – WPA – WPA - PSK – WPA - Personal – WPA - AES – WPA2 - Personal – WPA2 - PSK • Set a complex password • Change the login password of the wireless router. • Change the SSID to something classy • Don't disable SSID broadcast • Done
  • 39. Further Advised Change the router login password frequently Atleast once a month Change the wireless WPA password also Atleast once a month Avoid temptation to connect to open wireless just looking for free internet.
  • 40. Securing Enterprise Networks 1. Define, monitor and enforce a wireless security policy Policy should cover all 802.11 and Bluetooth wireless devices Define wireless policies for mobile workers Ensure wireless devices are not used until they comply with the wireless security policy 2. Take a complete inventory of all Access Points and 802.11 devices in the airwaves Eliminate rogue Access Points and unauthorized user Stations. © ClubHack http://clubhack.com
  • 41. Securing Enterprise Networks (Contd) 3. Define secure configurations for Access Points and user Stations Change default setting Disable SSID broadcast Turn-off “ad-hoc” mode operation 4. Define acceptable encryption and authentication protocols Use strong authentication (802.1x with EAP recommended) Use strong encryption with at least 128-bit keys (WPA2, WPA recommended) Deploy a layer-3 Virtual Private Network (VPN) for wireless communication © ClubHack http://clubhack.com
  • 42. Securing Enterprise Networks (Contd) 5. Monitor the airwaves to identify suspicious activity Deploy a Wireless Intrusion Detection System (IDS) to identify threats and attacks Detect and terminate unauthorized associations in a timely manner Monitor wireless assets for policy violations Log, analyze, and resolve incidents in a timely manner Gather and store wireless activity information for forensic analysis © ClubHack http://clubhack.com
  • 43. References Aircrack-ng Airtight Networks BackTrack 3 Understanding WPA TKIP crack Practical attacks against WEP and WPA Best Practices for Wireless Network Security and Sarbanes-Oxley compliance – Joshua Wright iPig Encryption Software Wikipedia! © ClubHack http://clubhack.com
  • 44. Q & 42 ? :-?
  • 45. © ClubHack http://clubhack.com Thank You! [email_address] [email_address]

Editor's Notes

  • #4: SSID service set identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS.
  • #12: IV provides more randomness to the encryption process, to avoid pattern recognition in the ciphertext
  • #13: The initialization vector in WEP is a 24-bit field, which is sent in the cleartext part of a message. Such a small space of initialization vectors guarantees the reuse of the same key stream. A busy access point, which constantly sends 1500 byte packets at 11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours. Malicious user can generate automated collisions and collect enough packets to crack a moderately used network well within 30 minutes.
  • #16: 802.1x is used with the EAP protocol which provides a framework to extend authentication possibilities from PAP, CHAP to OTP, certificates, biometrics, kerberos Eg: EAP -
  • #18: The PSK provides an easily implemented alternative for the PMK as compared to using 802.1X to generate a PMK. A 256bit PSK is used directly as the PMK. When the PSK is a passphrase, the PMK is derived from the passphrase as follows: PMK = PBKDF2(passphrase, ssid, ssidLength, 4096, 256) Where the PBKDF2 method is from PKCS #5 v2.0: Password-based Cryptography Standard. This means that the concatenated string of the passphrase, SSID, and the SSIDlength is hashed 4096 times to generate a value of 256 bits. The lengths of the passphrase and the SSID have little impact on the speed of this operation. The PTK is a keyed-HMAC function using the PMK on the two MAC addresses and the two nonces from the first two packets of the 4-Way Handshake. This is why the whole keying hierarchy falls into the hands of anyone possessing the PSK, as all the other information is knowable.
  • #33: This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key