SlideShare a Scribd company logo
1
Wireless Spreading of WiFi
APs Infections Using WPS Flaws
Amirali Sanatinia, Sashank Narain,
Guevara Noubir
2
In a Nutshell
● Security flaws in WiFi APs
● Measurement study in Boston
● Network of susceptible APs
● Possibility of an airborne infection
● Compromise one AP, and let the infection spread
3
Outline
● Introduction
● WiFi Security
● Data Collection
● Connectivity Analyses
● Spread Analyses
● Countermeasures
● Conclusion
4
WiFi APs
● Gateway to home connectivity
● Do not run Anti Virus (AV), no supervision
● No automatic update mechanism, rarely patched
● Wirelessly interconnected
● Can result in DoS attack on Internet and RF spectrum
● Ideal target
5
AP Gone Rogue
● Eavesdrop on un-encryprted traffic
● Man-in-the-middle (MITM) attacks, strip TLS
● CRIME, BEAST, BREACH attack
● Phishing, DNS pharming
● Inject “crafted” signatures in Android [Fahl, CCS '12]
● Prevent or delay updates to desktop and mobile OS
● Privacy concerns
– Identify user behaviour, whereabouts, leak information
● Disturbed botnet
6
WiFi Security
● WEP (1999) as part of IEEE 802.11 standard
● First broken in 2001, [Fluhrer, SAC '01]
● WPA (2003) as an more secure intermediate before WPA2
● WPA2 (2004), secure but not perfect
● WPS (2006), facilitate establishment of secure connections
● In 2011 Stefan Viehböck found flaws in WPS [VU#723755]
7
WPS Protocol
8
Data Collection
● War-driving in four neighbourhoods of Boston
● Asus Eee PC 1000 HE
● Three TP-Link TL-WN722N, Alfa 9dBi high gain antennas
● GlobalSat BU-335 USB GPS
9
Data Collection
● Passive data collection
● Beacon frames broadcasts, with PPI GPS header
● Channel 1, 6, 11 (orthogonal)
● BSSID, ESSID, signal strength, latitude, longitude,
encryption mode
10
Neighbourhoods
1) Allston: residential, young population, BU students
2) Back Bay: residential, young professional and families,
high income
3) Fenway: home to many schools, mostly students, NEU
4) South Boston: Dense residential area, large working
class population
11
Neighbourhoods
South Boston
Back Bay
Allston
Fenway
12
Basic Statistics
Back Bay (32787)
Encryption Number of APs Percentage
WEP 5369 16%
OPEN 5051 15%
WPA/WPA2 22367 69%
WPS 7809 35%
Allston (15422)
Encryption Number of APs Percentage
WEP 1667 11%
OPEN 1598 10%
WPA/WPA2 12157 79%
WPS 6149 51%
South Boston (14756)
Encryption Number of APs Percentage
WEP 1874 13%
OPEN 1110 7%
WPA/WPA2 11772 80%
WPS 5504 47%
Fenway (26306)
Encryption Number of APs Percentage
WEP 4093 16%
OPEN 3427 13%
WPA/WPA2 18786 71%
WPS 5764 31%
13
Connectivity Radius
● Convex hull algorithm to compute a lower bound for R
● Calculated the farthest distance between the points on the
convex hull, divided by two; (41 meters)
14
Connectivity Graph
● Two APs are connected if they are in R-proximity
● Coordinates of the strongest signal as the location of AP
● Attack can be performed any time during the day
● Higher reach of the wireless signal at quiet and idle times
15
Connectivity Graph
South Boston
WEP
Radius Avg. Deg. Conn. Comp.
15 8.34 437
30 12.99 117
50 20.16 15
75 31.52 2
WPS
15 18.38 277
30 33.64 23
50 55.77 1
75 93.36 1
WEP+WPS
15 23.64 223
30 43.36 10
50 72.43 1
75 121.09 1
Back Bay
WEP
Radius Avg. Deg. Conn. Comp.
15 42.62 216
30 69.85 32
50 115.10 1
75 119.74 1
WPS
15 40.02 124
30 82.36 20
50 157.90 3
75 285.97 1
WEP+WPS
15 65.48 57
30 126.19 11
50 233.73 1
75 420.98 1
16
Infection Steps
● Check if AP is vulnerable (WEP/WPS)
● Crack WEP/WPS
● Guess Admin Password
● Infect and re-flash
● Try to compromise other APs
17
SIR Compartmental Model
● Models the progress of an epidemic
● Divides population to compartments
– Susceptible, Infected, Recovered (SIR)
● Captures characteristics of our model
● Other alternatives, e.g. SEIR
18
SIR Spread Model
19
SIR Parameters
● p1
= 6060%
● p1Stime
= 33, 66, 99 hours, p1Ftime
= 1010 min
● Many use default configurations, out of the box
➔ q1
= 5050%, u1
=5050%
● t1
=100100%, t1Stime
= 2020 min
● r1
= 8080% and s1
= 1010%
● r1Stime
= r1Ftime
= 6060 min
● s1Stime
= s1Ftime
= 120120 min
20
Infection Spread
● %WPSWPS * (p1
* q1
* r1
+ p1
* (1-q1
) * s1
)
● %WEPWEP * (t1
* u1
* r1
+ t1
* (1-u1
) * s1
)
➢ Theoretical average upper bound in a single connected
component is 3232%
● R = 50m; 19% to 23%, in 97.1 to 137.5 days
● R = 75m; 33% to 35%, in 109.1 to 194.5 days
● R = 90m; 34% to 35%, in 62.5 to 189.9 day
21
Infection Spread
50 M
75 M
90 M
22
Countermeasures
● Disable WPS; unfortunately not possible with some vendors
● WPS enabled by default without users knowledge
● APs not wireless ready , high chance of misconfiguration
● Investigate over 540,000 publicly available devices, over 13%
use default root passwords [Cui, ACSAC '10 ]
● Intrusion Detection System that use flow characteristics of WiFi
network, e.g. Kismet
● Use of reliable bootstrap architect5ures and malicious code
detectors [Arbaugh, ACSAC '02; Adelstein SP '97]
23
Suggestions
● More secure and more intuitive authentication
mechanisms [Cassola, Mobisys '11]
● New trend (SDN) and view of the APs [Kim, Comm. Mag. '13]
● Easier management and configuration mechanism
● Incentive for vendors to maintain APs
● Roku, Meraki are good examples of such view
24
Lessons
● Similar infection and spreading characteristics in different
neighbourhoods
● WEP is still used, although it's known to be flawed
● WPA/WPA2 are “secure” alternatives, not perfect
● New enhancement (WPS) made it worst
25
Thank You!
Questions?

More Related Content

PDF
DDoS-атаки в 2016–2017: переворот
PPT
Network security over ethernet
PPTX
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
PPTX
MNSEC 2018 - Evolving DDoS Threat Landscape
PPT
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
PPS
Iuwne10 S05 L06
PPT
How to hack wireless internet connections using aircrack-ng
DDoS-атаки в 2016–2017: переворот
Network security over ethernet
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
MNSEC 2018 - Evolving DDoS Threat Landscape
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Iuwne10 S05 L06
How to hack wireless internet connections using aircrack-ng

What's hot (20)

PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
PPT
Wireless security presentation
PPT
Securing wireless network
PPTX
Hacking Wireless Networks : Null Delhi (November)
PDF
Venkasure Total Security + Presentation
PDF
What is Wi-Fi 6? - C&T RF Antennas Inc
DOC
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
ODP
Feb-8-2012-Breaking-Wireless-Security
PPT
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
PDF
The Post Covid-19 Cybersecurity World - Where Is It Headed?
PPTX
Wireless Network Security
PDF
Pentesting
PDF
Digital self defense
DOC
Ccna 3 chapter 7 v4.0 answers 2011
PPTX
Exploiting WiFi Security
PPT
Implementation of Wireless Sensor Network in disaster detection and monitoring
DOCX
หน่วยที่ 5 ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
PPT
Wireless Device and Network level security
PDF
Wt4901 indoor siren
PPTX
R1 - Slides
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Wireless security presentation
Securing wireless network
Hacking Wireless Networks : Null Delhi (November)
Venkasure Total Security + Presentation
What is Wi-Fi 6? - C&T RF Antennas Inc
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Feb-8-2012-Breaking-Wireless-Security
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Wireless Network Security
Pentesting
Digital self defense
Ccna 3 chapter 7 v4.0 answers 2011
Exploiting WiFi Security
Implementation of Wireless Sensor Network in disaster detection and monitoring
หน่วยที่ 5 ระบบเครือข่ายคอมพิวเตอร์ไร้สาย
Wireless Device and Network level security
Wt4901 indoor siren
R1 - Slides
Ad

Similar to Wireless Spreading of WiFi APs Infections Using WPS Flaws (20)

PPTX
Spread spectrum seminar
PDF
Using Wireless Networks to Support First Responders and Resilience in Upland ...
PDF
LTEcloudSecurityIssuesTakeaways-GP
PPTX
Jaming the IoT device- nie dziala mi alarm IoT
PDF
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
PDF
[GITSN] wireless data security system
PPT
Mobile Devices and Wireless for teaching and stuyding pruposae
PPTX
6 Weeks Summer Training In TelcoCrats
PPT
PDF
SatCom Protection in Mission Critical Oil & Gas - Edited
PDF
Ijetcas14 391
PDF
Compressive Sampling for Power System Synchrophasor data Communication
PPTX
Staab Itp 251 Chapter 9 Swl Case Presentation
PDF
Reducing False Alerts by Improving Strain Gauge Data Quality using Fast Fouri...
PPTX
Shunra university 1 intro to network virtualization
PDF
[May 2018] Sigfox Technology Overview
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PDF
Tutorial and Review TP Link Archer C54.pdf
PPTX
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
PPTX
Spread spectrum seminar
Using Wireless Networks to Support First Responders and Resilience in Upland ...
LTEcloudSecurityIssuesTakeaways-GP
Jaming the IoT device- nie dziala mi alarm IoT
[36C3] Sigover + alpha : Signal overshadowing attack on LTE and its applications
[GITSN] wireless data security system
Mobile Devices and Wireless for teaching and stuyding pruposae
6 Weeks Summer Training In TelcoCrats
SatCom Protection in Mission Critical Oil & Gas - Edited
Ijetcas14 391
Compressive Sampling for Power System Synchrophasor data Communication
Staab Itp 251 Chapter 9 Swl Case Presentation
Reducing False Alerts by Improving Strain Gauge Data Quality using Fast Fouri...
Shunra university 1 intro to network virtualization
[May 2018] Sigfox Technology Overview
A trigger identification service for defending reactive jammers in wireless s...
Tutorial and Review TP Link Archer C54.pdf
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory System
Ad

Recently uploaded (20)

PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Understand the Gitlab_presentation_task.pdf
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Exploring The Internet Of Things(IOT).ppt
PPT
12 Things That Make People Trust a Website Instantly
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
TITLE DEFENSE entitle the impact of social media on education
PPTX
Database Information System - Management Information System
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Internet Safety for Seniors presentation
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Cyber Hygine IN organizations in MSME or
Understand the Gitlab_presentation_task.pdf
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Mathew Digital SEO Checklist Guidlines 2025
Uptota Investor Deck - Where Africa Meets Blockchain
Introduction to cybersecurity and digital nettiquette
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
si manuel quezon at mga nagawa sa bansang pilipinas
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Exploring The Internet Of Things(IOT).ppt
12 Things That Make People Trust a Website Instantly
artificialintelligenceai1-copy-210604123353.pptx
TITLE DEFENSE entitle the impact of social media on education
Database Information System - Management Information System
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Internet Safety for Seniors presentation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd

Wireless Spreading of WiFi APs Infections Using WPS Flaws

  • 1. 1 Wireless Spreading of WiFi APs Infections Using WPS Flaws Amirali Sanatinia, Sashank Narain, Guevara Noubir
  • 2. 2 In a Nutshell ● Security flaws in WiFi APs ● Measurement study in Boston ● Network of susceptible APs ● Possibility of an airborne infection ● Compromise one AP, and let the infection spread
  • 3. 3 Outline ● Introduction ● WiFi Security ● Data Collection ● Connectivity Analyses ● Spread Analyses ● Countermeasures ● Conclusion
  • 4. 4 WiFi APs ● Gateway to home connectivity ● Do not run Anti Virus (AV), no supervision ● No automatic update mechanism, rarely patched ● Wirelessly interconnected ● Can result in DoS attack on Internet and RF spectrum ● Ideal target
  • 5. 5 AP Gone Rogue ● Eavesdrop on un-encryprted traffic ● Man-in-the-middle (MITM) attacks, strip TLS ● CRIME, BEAST, BREACH attack ● Phishing, DNS pharming ● Inject “crafted” signatures in Android [Fahl, CCS '12] ● Prevent or delay updates to desktop and mobile OS ● Privacy concerns – Identify user behaviour, whereabouts, leak information ● Disturbed botnet
  • 6. 6 WiFi Security ● WEP (1999) as part of IEEE 802.11 standard ● First broken in 2001, [Fluhrer, SAC '01] ● WPA (2003) as an more secure intermediate before WPA2 ● WPA2 (2004), secure but not perfect ● WPS (2006), facilitate establishment of secure connections ● In 2011 Stefan Viehböck found flaws in WPS [VU#723755]
  • 8. 8 Data Collection ● War-driving in four neighbourhoods of Boston ● Asus Eee PC 1000 HE ● Three TP-Link TL-WN722N, Alfa 9dBi high gain antennas ● GlobalSat BU-335 USB GPS
  • 9. 9 Data Collection ● Passive data collection ● Beacon frames broadcasts, with PPI GPS header ● Channel 1, 6, 11 (orthogonal) ● BSSID, ESSID, signal strength, latitude, longitude, encryption mode
  • 10. 10 Neighbourhoods 1) Allston: residential, young population, BU students 2) Back Bay: residential, young professional and families, high income 3) Fenway: home to many schools, mostly students, NEU 4) South Boston: Dense residential area, large working class population
  • 12. 12 Basic Statistics Back Bay (32787) Encryption Number of APs Percentage WEP 5369 16% OPEN 5051 15% WPA/WPA2 22367 69% WPS 7809 35% Allston (15422) Encryption Number of APs Percentage WEP 1667 11% OPEN 1598 10% WPA/WPA2 12157 79% WPS 6149 51% South Boston (14756) Encryption Number of APs Percentage WEP 1874 13% OPEN 1110 7% WPA/WPA2 11772 80% WPS 5504 47% Fenway (26306) Encryption Number of APs Percentage WEP 4093 16% OPEN 3427 13% WPA/WPA2 18786 71% WPS 5764 31%
  • 13. 13 Connectivity Radius ● Convex hull algorithm to compute a lower bound for R ● Calculated the farthest distance between the points on the convex hull, divided by two; (41 meters)
  • 14. 14 Connectivity Graph ● Two APs are connected if they are in R-proximity ● Coordinates of the strongest signal as the location of AP ● Attack can be performed any time during the day ● Higher reach of the wireless signal at quiet and idle times
  • 15. 15 Connectivity Graph South Boston WEP Radius Avg. Deg. Conn. Comp. 15 8.34 437 30 12.99 117 50 20.16 15 75 31.52 2 WPS 15 18.38 277 30 33.64 23 50 55.77 1 75 93.36 1 WEP+WPS 15 23.64 223 30 43.36 10 50 72.43 1 75 121.09 1 Back Bay WEP Radius Avg. Deg. Conn. Comp. 15 42.62 216 30 69.85 32 50 115.10 1 75 119.74 1 WPS 15 40.02 124 30 82.36 20 50 157.90 3 75 285.97 1 WEP+WPS 15 65.48 57 30 126.19 11 50 233.73 1 75 420.98 1
  • 16. 16 Infection Steps ● Check if AP is vulnerable (WEP/WPS) ● Crack WEP/WPS ● Guess Admin Password ● Infect and re-flash ● Try to compromise other APs
  • 17. 17 SIR Compartmental Model ● Models the progress of an epidemic ● Divides population to compartments – Susceptible, Infected, Recovered (SIR) ● Captures characteristics of our model ● Other alternatives, e.g. SEIR
  • 19. 19 SIR Parameters ● p1 = 6060% ● p1Stime = 33, 66, 99 hours, p1Ftime = 1010 min ● Many use default configurations, out of the box ➔ q1 = 5050%, u1 =5050% ● t1 =100100%, t1Stime = 2020 min ● r1 = 8080% and s1 = 1010% ● r1Stime = r1Ftime = 6060 min ● s1Stime = s1Ftime = 120120 min
  • 20. 20 Infection Spread ● %WPSWPS * (p1 * q1 * r1 + p1 * (1-q1 ) * s1 ) ● %WEPWEP * (t1 * u1 * r1 + t1 * (1-u1 ) * s1 ) ➢ Theoretical average upper bound in a single connected component is 3232% ● R = 50m; 19% to 23%, in 97.1 to 137.5 days ● R = 75m; 33% to 35%, in 109.1 to 194.5 days ● R = 90m; 34% to 35%, in 62.5 to 189.9 day
  • 22. 22 Countermeasures ● Disable WPS; unfortunately not possible with some vendors ● WPS enabled by default without users knowledge ● APs not wireless ready , high chance of misconfiguration ● Investigate over 540,000 publicly available devices, over 13% use default root passwords [Cui, ACSAC '10 ] ● Intrusion Detection System that use flow characteristics of WiFi network, e.g. Kismet ● Use of reliable bootstrap architect5ures and malicious code detectors [Arbaugh, ACSAC '02; Adelstein SP '97]
  • 23. 23 Suggestions ● More secure and more intuitive authentication mechanisms [Cassola, Mobisys '11] ● New trend (SDN) and view of the APs [Kim, Comm. Mag. '13] ● Easier management and configuration mechanism ● Incentive for vendors to maintain APs ● Roku, Meraki are good examples of such view
  • 24. 24 Lessons ● Similar infection and spreading characteristics in different neighbourhoods ● WEP is still used, although it's known to be flawed ● WPA/WPA2 are “secure” alternatives, not perfect ● New enhancement (WPS) made it worst