1 / 43

Advanced 802.11 Attack

Advanced 802.11 Attack. Mike Lynn & Robert Baird. What Is NOT Covered. Wired Equiv. Privacy (WEP) vulnerabilities WEP Key cracking techniques Radio signal amplification Suggested changes to the IEEE 802.11b specification Wireless network discovery tools. What Will Be Covered.

bviola
Download Presentation

Advanced 802.11 Attack

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Advanced 802.11 Attack Mike Lynn & Robert Baird Black Hat 2002, Las Vegas NV

  2. What Is NOT Covered • Wired Equiv. Privacy (WEP) vulnerabilities • WEP Key cracking techniques • Radio signal amplification • Suggested changes to the IEEE 802.11b specification • Wireless network discovery tools Black Hat 2002, Las Vegas NV

  3. What Will Be Covered • Wireless network best practices • Practical attacks • The focus of the attack(s) • The network layers • The bottom 2 layers • Custom (forged) 802.11b management frames • The Tool Box • Drivers • Utilities • Proof of concept code Black Hat 2002, Las Vegas NV

  4. What Will Be Covered • Attack Scenarios • Denial of service • Masked ESSID detection • 802.11b layer MITM attack • Inadequate VPN implementations • Mitigation Strategies Black Hat 2002, Las Vegas NV

  5. Wireless Best Practices • Enable WEP - Wired equivalent privacy • Key rotation when equipment supports it • Disable broadcast of ESSID • Block null ESSID connection • Restrict access by MAC address • Use VPN technology • Use strong mutual authentication Black Hat 2002, Las Vegas NV

  6. Practical Attacks • WEP – Can be cracked passively • Masked ESSID – Can be passively observed in management frames during association • Block null ESSID connects – Same problem • Install VPN – Weakly authenticated VPN is susceptible to active attack (MITM) • Strong mutual authentication - ? Black Hat 2002, Las Vegas NV

  7. The Network Layers Black Hat 2002, Las Vegas NV

  8. The Bottom Layers • Manipulating the bottom 2 layers of the OSI • Data Link (Layer 2) • Media Access Control (MAC) – Access to medium • Logical Link Control (LLC) – Frame sync, flow control • Physical (Layer 1) • Radio bit stream • Divided into channels Black Hat 2002, Las Vegas NV

  9. The Bottom Layers Black Hat 2002, Las Vegas NV

  10. Management Frames • Management frames can control link characteristics and physical medium properties • 802.11b management frames are NOT authenticated • Why is this bad? Black Hat 2002, Las Vegas NV

  11. The Tool Box • Custom Drivers • Air-Jack • Custom driver for PrismII (HFA384x) cards • MAC address setting/spoofing • Send custom (forged) management frames • AP forgery/fake AP • Lucent/Orinoco • Linux driver modified to allow MAC address setting/spoofing from the command line • Utilities • User space programs – wlan-jack, essid-jack, monkey-jack, kracker-jack Black Hat 2002, Las Vegas NV

  12. Air-Jack Driver • Allows control of wireless card modes • Modes 0 and 1 standard documented modes • BSS (infrastructure) (1) or IBSS (0) (Ad-hoc) • Pseudo-IBSS (3) mode • Control channel selection • Firmware handles timing sensitive functions • Mode 5 - undocumented • Channel selection • Firmware handles time sensitive functions • No beacons sent • Very little firmware intervention Black Hat 2002, Las Vegas NV

  13. Air-Jack Driver • Mode 6 – Host Access Point mode • Sends Beacons (firmware control) • Responds to Probe request • Handles time sensitive functions • Can enable PrismII monitor mode • Uses Linux PF_PACKET interface for RX and TX of raw frames Black Hat 2002, Las Vegas NV

  14. Air-Jack Driver void send_deauth (__u8 *dst, __u8 *bssid) { struct { struct a3_80211 hdr; __u16 reason; }frame; memset(&frame, 0, sizeof(frame)); frame.hdr.mh_type = FC_TYPE_MGT; frame.hdr.mh_subtype = MGT_DEAUTH; memcpy(&(frame.hdr.mh_mac1), dst, 6); memcpy(&(frame.hdr.mh_mac2), bssid, 6); memcpy(&(frame.hdr.mh_mac3), bssid, 6); frame.reason = 1; send(socket, &frame, sizeof(frame), 0); } Black Hat 2002, Las Vegas NV

  15. Attack Scenarios – WLAN-Jack • Denial of Service – De-authentication • Use MAC address of Access Point • Send deauthenticate frames • Send continuously • Send to broadcast address or specific MAC • Users are unable to reassociate with AP • Air-Jack + WLAN-Jack Black Hat 2002, Las Vegas NV

  16. Attack Scenarios – WLAN-Jack Black Hat 2002, Las Vegas NV

  17. Attack Scenarios – WLAN-Jack Airopeek Trace Black Hat 2002, Las Vegas NV

  18. Attack Scenarios – WLAN-Jack • Airopeek Trace Black Hat 2002, Las Vegas NV

  19. Attack Scenarios – WLAN-Jack • Decode of Deauthentication Frame Black Hat 2002, Las Vegas NV

  20. Attack Scenarios – WLAN-Jack This is your connection Black Hat 2002, Las Vegas NV

  21. Attack Scenarios – WLAN-Jack This is your connection on WLAN-Jack. Black Hat 2002, Las Vegas NV

  22. Attack Scenarios – ESSID-Jack • Is the ESSID a shared secret? • If I mask the ESSID from the AP beacons then unauthorized users will not be able to associate with my AP? • Discover Masked ESSID • Send a deauthenticate frame to the broadcast address. • Obtain ESSID contained in client probe request or AP probe response. Black Hat 2002, Las Vegas NV

  23. Attack Scenarios – ESSID-Jack Black Hat 2002, Las Vegas NV

  24. Attack Scenarios - ESSID-Jack • Airopeek Trace Black Hat 2002, Las Vegas NV

  25. Attack Scenarios – ESSID-Jack • Airopeek Trace Black Hat 2002, Las Vegas NV

  26. Attack Scenarios – Monkey-Jack • MITM Attack • Taking over connections at layer 1 and 2 • Insert attack machine between victim and access point • Management frames • Deauthenticate victim from real AP • Send deauthenticate frames to the victim using the access point’s MAC address as the source Black Hat 2002, Las Vegas NV

  27. Attack Scenarios – Monkey-Jack • Victim’s 802.11 card scans channels to search for new AP • Victim’s 802.11 card associates with fake AP on the attack machine • Fake AP is on a different channel than the real one • Attack machine’s fake AP is duplicating MAC address and ESSID of real AP Black Hat 2002, Las Vegas NV

  28. Attack Scenarios – Monkey-Jack • Attack machine associates with real AP • Attack machine duplicates MAC address of the victim’s machine. • Attack machine is now inserted and can pass frames through in a manner that is transparent to the upper level protocols Black Hat 2002, Las Vegas NV

  29. Attack Scenarios – Monkey-Jack • Before Monkey-Jack Black Hat 2002, Las Vegas NV

  30. Attack Scenarios Monkey-Jack • After Monkey-Jack Black Hat 2002, Las Vegas NV

  31. Attack Scenarios - Monkey-Jack Black Hat 2002, Las Vegas NV

  32. Attack Scenarios – Kracker-Jack • Dangers of wireless MITM • Wireless networks are more vulnerable to MITM attacks than wired networks. • Many security solutions are implemented with an assumption of a secure layer 1 and 2 • Many VPN solutions are implemented with inadequate authentication for protection against wireless MITM attacks. Black Hat 2002, Las Vegas NV

  33. Attack Scenarios – Kracker-Jack • WAVEsec • An open source software solution for securing wireless networks • Uses FreeS/WAN IPSEC implementation • Will thwart passive eavesdropping of wireless network communications. • Implementation options • X.509 Certificates • Secure DNS Black Hat 2002, Las Vegas NV

  34. Attack Scenarios – Kracker-Jack • Authenticating with WAVEsec gateway • Client sends modified DHCP request with client’s public key • WAVEsec gateway inserts client’s public key into DNS record • Client obtains WAVEsec gateway’s public key by requesting it from the DNS server • IPSEC tunnel setup Black Hat 2002, Las Vegas NV

  35. Attack Scenarios – Kracker-Jack • Using Kracker-Jack • KJ inserts to 802.11 layer (like monkey-jack) • KJ, using a DNS request, gets victims public key from DNS server • KJ, using the victims MAC address sends DHCP request with its own key to replace the victim’s key in the DNS server Black Hat 2002, Las Vegas NV

  36. Attack Scenarios – Kracker-Jack • KJ initiates ISAKMP main mode SA with the WAVEsec server • KJ initiates ISAKMP main mode SA with victim • Victim gets new server key by DNS request serviced by KJ • Two separate IPSEC tunnels are now setup • All traffic passes through KJ unencrypted Black Hat 2002, Las Vegas NV

  37. Attack Scenarios – Kracker-Jack Black Hat 2002, Las Vegas NV

  38. Attack Scenarios – Kracker-Jack • IKE – ISAKMP/Oakley • Phase 1 • Messages 1 and 2 – negotiate characteristics of security association; no authentication • Messages 3 and 4 – exchange random values (nonce) and execute Diffie-Hellman exchange to establish a master key (SKEYID); no authentication • Messages 5 and 6 – exchange information for mutually authenticating the parties; identity payload, signature payload, and OPTIONAL certificate payload Black Hat 2002, Las Vegas NV

  39. Attack Scenarios – Kracker-Jack • IKE – ISAKMP/Oakley • Phase 2 – Oakley Quick Mode • Define Security Associations • Define keys used to protect IP datagrams Black Hat 2002, Las Vegas NV

  40. Attack Scenarios • Shared key authentication attack • Observe plain text challenge • Observe cipher text response • XOR plain text with cipher text to get key stream • XOR IP packet with key stream re-using IV • Broadcast ping Black Hat 2002, Las Vegas NV

  41. Mitigation Strategies • Big guy with a stick • Wireless IDS and Monitoring • AirDefense http://www.airdefense.net • VPN + Strong mutual authentication • RF Signal shaping – Avoiding signal leaks • Antennas with directional radiation pattern • Lower Access Point power Black Hat 2002, Las Vegas NV

  42. Summary • Wireless networks are more susceptible to active attacks than wired networks • Enable all built-in security capabilities • Use VPN with strong mutual authentication • Monitor wireless network medium (air space) for suspicious activity • Updates – Black Hat web site or • http://802.11ninja.net Black Hat 2002, Las Vegas NV

  43. Advanced 802.11 Attack Robert Baird & Mike Lynn Black Hat 2002, Las Vegas NV

More Related