1 / 32

Shark: A Wireless Internet Security Test Bed

Shark: A Wireless Internet Security Test Bed. Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross. Dr. Steve Russell Associate Professor Electrical and Computer Engineering sfr@iastate.edu Adrienne Huffman Graduate Student Computer Engineering

Download Presentation

Shark: A Wireless Internet Security Test Bed

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Shark: A Wireless Internet Security Test Bed Senior Design Project May07-09 Stephen Eilers Jon Murphy Alex Pease Jessica Ross

  2. Dr. Steve Russell Associate Professor Electrical and Computer Engineering sfr@iastate.edu Adrienne Huffman Graduate Student Computer Engineering adnihuff@iastate.edu Jon Murphy Computer Engineering jwmurph@iastate.edu Steve Eilers Computer Engineering seilers@iastate.edu Alex Pease Computer Engineering Alex.pease@iastate.edu Jessica Ross Computer Engineering and Mathematics rossjr@iastate.edu Faculty Advisor and team

  3. Definitions • ARP – Address Resolution Protocol • IV – Initialization Vector • L2TP – Layer 2 Tunneling Protocol • PPTP – Point to Point Tunneling Protocol • Radius – Remote Authentication Dial In User Service • SSL – Secure Socket Layer • WEP – Wired Equivalency Privacy • WPA – Wi-Fi Protected Access • VPN – Virtual Private Network

  4. What is SHARK? • SHARK is a wireless security network to be used to study security related issues on wireless networks • Tool to teach interested students about wireless security • Report statistics about attackers and methods used to researchers at ISU • Deployable to any remote location

  5. Why SHARK? • Client’s Last Semester as Professor, wants project finished • Educated college students about 802.11 security • Give students something fun to do

  6. Limitations • SHARK must be portable and extendable • Initial build of the SHARK system must consist of three or fewer computers • SHARK must be built within a $150 budget • Must use public domain software • Must be capable of collecting research data

  7. Intended Users • Primary • College students in computer related fields • Know the basics of wireless networking • Secondary • Interested community members • People looking for a free access point

  8. Intended Uses • Primary • Learning tool for students • Study methods of wireless attacks • Study basic network security • Legal and ethical way for students to participate in hacking exercises

  9. SHARK Node

  10. SHARK – Software • Ubuntu • Squid • Web proxy cache • Direct traffic to appropriate places • Apache • Used to create local web-server login/registration • Keep track of users • MySQL • Database • WireShark/Ethereal • Network Protocol Analyzer • Captures all traffic on SHARK Network

  11. Levels of Security • SHARK has five levels of security • Guppy • No security, used for basic registering on network • Clownfish • WEP security • Swordfish • Rotating WEP security • Barracuda • WPA security • SHARK • RADIUS security • Provides statistical data on hacking patterns

  12. Wired Equivalent Privacy (WEP) • 64-bit WEP 128-bit WEP • Same 24bit IV Stream • Flaws in WEP • Repeating IV • Short • Stream Cipher • XOR is bad

  13. Breaking WEP Down • Aircrack, airodump, airdecap • http://www.linux-wlan.org/docs/wlan_adapters.html.gz • No magic number of IV’s • 250,000 – 400,000 for 40 bit • 750,000 – 2M + for 104 bit • More users = more IV’s sent = More IV’s that are re-used • Can read packets if IV is re-used but key not broken yet

  14. WPA • Software update to WEP (closely related to rotating WEP) • Re-keying • No more weak IV packets • Pre-shared Key • Only as strong a pasephrase • Extensible Authentication Protocol (EAP) • User authentication • Radius

  15. TrafficGenerator– Baiting the Hook • Breaking WEP and WPA encryption • Attackers must analyze thousands of packets

  16. 7-of-9 • Off-the-Shelf wireless access point • Provides generic internet access • Traffic is captured and compared to SHARK traffic

  17. Network View Analysis Subnet

  18. Pros One external IP Firewall branches Cons extensive forwarding Network Pros/Cons

  19. Machine Breakdown

  20. SmallBox • Captures traffic on SHARK • Stores and Analyzes data • Packet Capture WireShark • Filter Snort • Webserver Apache

  21. Sharkweb When attackers break into SHARK, are forwarded here • Logged into database • Webserver Apache • Web Utilities MySQL, PHP

  22. Virtualnet • Simulates additional machines running services without adding cost of physical machines • OS Ubuntu • Virtual Machine Manager Xen

  23. Virtual Machines • VM 1 • Mimicking a standard server • VM 2 • Tarpit • Delays incoming connections for as long as possible • VM 3 • HoneyD • Confuse attackers to think it has open ports

  24. Secure Tunneling VPN Provide secure communications over unsecured networks Benefits Provides the level of security we desire Downsides If SHARK is compromised, they have direct access to our network Solution Scripting for “on-the-fly” configuration

  25. Secure Tunneling – VPN • One of the only ways to provide a secure and extensible way to access the SHARK machines • Need the ability to create multiple VPN sessions, so a VPN server is required • Multiple solutions available • PPTP • L2TP • SSL

  26. Status of SHARK • Completed • All computers have main software packages installed and configured • Order for parts has been placed • Xen server fully configured • Portal redirect • In Progress • Open access point for registering • Virtual machines up and running • In Concept • VPN • Radius Server • Data Statistics and Heuristics

  27. Testing • Target Audience CPRE 537 wireless Security Class • CONTEST • Open Registration week 1 • WEP weeks 2,3 • WPA week 4 • Rotating WEP week 5 • RADIUS week 6 • Results week 7 • Basic Analysis week 8

  28. Hours and Resources

  29. Future Uses • Make the automation of tasks smoother • Better documentation • Increase the number of fields for registration.

  30. Commercialization • This project is a research project and is not intended for commercialization.

  31. Questions?

More Related