wifi-hacking-100228163648-phpapp01

Upload: naveenkumarreddy

Post on 13-Feb-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    1/22

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    2/22

    PRESENTED BY

    Paul Gillingwater, CISSP, CISM

    Adjunct Professor of Computer ScienceWebster University Vienna

    http://security-risk.blogspot.com

    Working in IT Security 20+ years

    Thursday, February 25, 2010

    http://security-risk.bogspot.com/http://security-risk.bogspot.com/http://security-risk.bogspot.com/
  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    3/22

    A BRIEF OVERVIEW

    Wi-Fi has been around more than 12 years --originally, it lacked any form of security

    Since 2001, Wireless Encryption Protocol (WEP) hasbeen successfully attacked -- in 2007, it takes no morethan 90,000 packets to break keys (due to weaknessesin RC4) -- time to crack less than 1 minute

    Since 2004, Wi-Fi Protected Access (WPA & WPA2)were introduced to address WEPs failure -- but eventhis is not quite enough for full security

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    4/22

    WI-FI HISTORY

    Originally offered as IEEE 802.11 in 1997 -- securitylimited due to export restrictions of certaingovernments

    Implements Wireless LAN access over 2.4 and 5 GHzbands -- former with 3 channels (and shared withAmateur Radio and Cordless Phones), latter with 19

    Initial systems 1-2 Mbps, later increased to 11 Mbpswith 802.11b, then up to 802.11n with 54-600 Mbpspossible (since 2009)

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    5/22

    WIRELESS SIGNALS

    Any wireless signal can be received by suitableequipment

    Key-sharing is fundamental issue -- and the moreoften a key is used, the easier it is to find it due tomathematics of encryption

    In addition to receiving packets, we can also injectpackets -- e.g., ARP or de-auth to create traffic

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    6/22

    SECURING WI-FI

    In my view, only reliable method for securing Wi-Fi isto run a VPN on top (e.g., OpenVPN)

    WEP and WPA are easily broken (WPA TKIP crackedin less than 1 minute by Japanese researchers in 2009)

    WPA is TKIP -- WPA2 is CCMP, which is better (AES)

    WPA2 is probably secure enough for home usage --but there is still risk of impersonation

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    7/22

    TRAFFIC MONITORING

    On OSX, from command line (with sudo):/System/Library/PrivateFrameworks/

    Apple80211.framework/Versions/A/Resources/airport

    Specify en1 sniff 1as parameters to capturepackets into /tmp/airportSniffxxxx.cap file

    WireShark is free utility for Windows, OSX or Linuxthat captures and displays packets

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    8/22

    HOW WPA WORKS

    WPA tried to fix WEP problems, while WPA2 was anew approach to solving security problem

    802.1X port access control is key to successful use

    This Enterprise approach depends on separateRADIUS authentication server -- each new session

    gets a fresh key, good for a short time

    Home networks dont use RADIUS, so a Pre SharedKey (PSK) is used

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    9/22

    WPA KEY HANDSHAKE

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    10/22

    COW PATTY ATTACK

    Where 802.1X not available, PSK may be sniffed fromother authenticating stations

    KisMac and coWPAtty use dictionary and otherattacks to guess the PSK from captured packets

    Packet injection can force re-connects to capture

    coWPAtty with Rainbow Tables (pre-calculatedhashes) can test >18,000 pass-phrases per second

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    11/22

    WPA CRACKER

    Regular WPA-PSK cracking on business gradehardware can take up to two weeks

    WPA Cracker is a commercial service using cloud-based computing with 400 nodes, which can crack aWPA key in 20 minutes for $34

    This is based on 135 million word dictionary attack --therefore a strong password can defeat this class

    Businesses now know the price of security

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    12/22

    BOGUS HOTSPOTS

    Any computer can also be a Wireless Access Point

    Windows 7 has new feature SoftAP -- which can be

    used for Internet Connection Sharing (use Connectifyfor example -- http://connectify.me/)

    However, the bad guys can capture all of the

    packets which pass through their system, even if theyconnect to you with WEP or WPA

    Bad guys can use similar names, e.g., Webster-Wi-Fi

    Thursday, February 25, 2010

    http://connectify.me/http://connectify.me/http://connectify.me/http://connectify.me/
  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    13/22

    MAC SPOOFING

    Some Access Points allow restriction based on the

    MAC (Media Access Control) address

    This is good basic security, but not reliable -- becauseattackers can simply sniff for trusted address anduse that in their own systems

    802.1x makes this more difficult for attackers

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    14/22

    SUPPRESSING SSID

    Most Wi-Fi networks broadcast

    their network name -- called the SSID

    Security may be improved by disabling this featurefor a home or business network

    However, experienced hackers will simply monitorauthorized connections to learn the SSID

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    15/22

    MAN IN THE MIDDLE

    A MITM attack means intruder pretends to be

    authorized gateway, but intercepts and can changepackets (this was used by Japanese team with TKIP)

    Example: Video of Cain tool, with packet capture

    and WEP crackingcracking-wep-with-airpcap-packet-injection-and-cain-and-abel.wmv

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    16/22

    BYPASSING AIRPORT WI-FI

    Frequent airport travelers know about airport Wi-Fi

    Such systems intercept HTTP, redirect to a login page

    before allowing access (e.g., Boingo Hotspot)

    Most airport Wi-Fi allows DNS lookups -- some direct,and some via DNS relay

    If port 53 is allowed, then you can run OpenVPN usingUDP port 53 to your home system

    If DNS relayed, then use DNS tunnel (Linux mostly)

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    17/22

    AIRPORT RISKS

    Free Wi-Fi hotspots in an airport or cafe mightbelong to a hacker, who is capturing traffic --

    including, potentially, user names & passwords

    Hackers can also relay HTTPS -- so dont assumeyour password is safe at a public Hot Spot

    Most hotspots dont use WEP or WPA -- so mosttraffic is not encrypted (unless SSH or SSL is used)

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    18/22

    WI-FI SECURITY ADVICE

    Avoid WEP and WPA/TKIP, use WPA2 or WPA/AES

    If using in a business, use 802.1X -- otherwise makesure you have PSK length > 20 characters

    Use MAC access control (restrict connecting devices

    based on their internal address)Use VPN for truly sensitive information

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    19/22

    TJ Maxx is classic example of Wi-Fi vector: resulted inloss of 45 million customer records (Credit Card details)

    The weakness was the use of WEP to secure a LAN, which was

    exploited by the hackers

    This breach cost the company $12 million in direct costs, notincluding the subsequent remedial work and loss of PCIcompliance

    Average cost of a Data Breach rose to $200 per customer record in2009, according to PonemonInstitute study -- average total costrose to $6.75m

    COMMERCIAL RISKS

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    20/22

    LEGAL ASPECTS

    In many countries, hacking others Wi-Fi is illegal --therefore, do any tests using your OWN gear

    See NCSL web site for summary of States laws

    Unauthorized access can attract seriousprosecutions, fines and criminal charges

    Within Webster University, unauthorized Wi-Fiaccess could be grounds for expulsion

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    21/22

    LATEST WI-FI TRENDS

    Passive-Aggressive SSIDs now used by some... e.g.:

    YOURDOGPOOPSINMYYARD

    TURNTHEMUSICDOWN

    CAITLINSTOPUSINGOURINTERNET

    WECANHEARYOUHAVINGSEX

    OBAMAISASOCIALIST

    Thursday, February 25, 2010

  • 7/23/2019 wifi-hacking-100228163648-phpapp01

    22/22

    THANK YOU!

    Any questions?

    Comments?

    Discussion....