wifi social engineering - africahackon · 2015: kenya’s internet penetration stood at 26 ......

42
WiFi Social Engineering

Upload: others

Post on 24-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WiFi Social

Engineering

Page 2: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

BIO

Gabriel Mathenge

Security enthusiast

Security consultant at Ernst and Young (EY)

Penetration testing and red teaming

T: https://twitter.com/_V1VI

E: [email protected]

Page 3: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

QUESTIONS

Stop me whenever you’re curious

Page 4: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WHY WIFI?

Why WiFi?

Rapid growth of WiFi networks for commercial

and private use

2015: Kenya’s internet penetration stood at 26

million people – KNBS Economic Survey

Page 5: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

SOCIAL ENGINEERING

Social Engineering

Manipulating people into giving you what you want.

Page 6: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

IEEE 802.11

IEEE 802.11

IEEE - Institute of Electrical and Electronics

Engineers

IEEE 802.11 - A set of specifications for

implementing wireless networks

Define the rules of communication between

clients and wireless access points (AP)

Page 7: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

IEEE 802.11

IEEE 802.11

THIS PART HERE

INTERNET

Page 8: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

TOOLS

Tools of the trade

Page 9: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

802.11 ISSUES

Issues

Page 10: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

PROTOCOL-SIDE

WiFi Deauthentication

Anyone with the right hardware can send a

deauthentication frame to the AP and clients

connected to it

Page 11: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

DEAUTHENTICATION

Deauthentication

Targets

Deauthentication packets

Page 12: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CLIENT-SIDE

Identifying APs

Clients can’t differentiate between access points

with the same name (ESSID) and will usually

just connect to the strongest one.

Page 13: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CLIENT-SIDE

No difference

London ESSID: Java WiFi

Nairobi ESSID: Java WiFi

Page 14: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CLIENT-SIDE

Probing for and auto-connecting to APs

Ever wondered how your phone/laptop

automatically connects to your office/home

network whenever you’re in the area?

Page 15: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CLIENT-SIDE

WiFi Selection

Page 16: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CLIENT-SIDE

Anytime your device’s WiFi is on and not connected to an AP

Home WiFi! Office WiFi!

Airport WiFi! Girlfriend’s WiFi!

Other girlfriend’s WiFi! Neighbor’s WiFi! Coffee shop WiFi!

Page 17: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WiFi Probes

Page 18: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

CONVENIENCE VS SECURITY

Why is it built this way?

Page 19: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

TRADITIONAL WIFI ATTACKS

Page 20: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

EVIL TWIN

Evil Twin

A rogue wireless AP that masquerades as a

legitimate Wi-Fi access point

Page 21: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

EVIL TWIN

How it works

I’m Safaricom, the real AP.

No! I’m Safaricom, the real AP. Connect

to me!

Deauthentication packets

Targets

Page 22: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MiTM

Man-in-The-Middle

Grabbing all of the traffic that passes you over a

wired or wireless network.

Page 23: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MiTM

How it works

Username Solomon

Password Password123

Username Solomon

Password Password123

Username Solomon

Password Password123

BANK

Page 24: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WIFIPHISHER

A WiFi tool that automates social engineering

attacks on WiFi networks

Written in Python and developed by Greek

security researcher, @_sophron (George)

Page 25: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

DEMO

Scenario

Swara WiFi

Swara WiFi

Target

Page 26: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WIFIPHISHER

Phishing scenarios

Page 27: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WIFIPHISHER

Sample phishing page

Page 28: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WIFIPHISHER

Sample phishing page

Page 29: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

HARVEST CREDENTIALS

Harvest credentials

Page 30: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WIFIPHISHER

Taking it further…

Page 31: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

DEMO

Scenario

VIVI WiFi

VIVI WiFi

Target

Page 32: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MALWARE INFECTION

Taking it further – malware infection

Page 33: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MALWARE INFECTION

Updating is good for you

Page 34: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MALWARE INFECTION

Updating is good for you

Page 35: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

MALWARE INFECTION

Shell

Page 36: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

WHY WIFI?

Why did I pick WiFi?

To make it relatable

Some vulnerabilities can’t be fixed by technology

Page 37: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

PPT

The Security Trinity

SECURITY

Page 38: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

THE WEAKEST LINK

Who is the weakest link?

Page 39: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

FOCUS ON SECURITY AWARENESS

How vulnerable is your tech are your people?

Security training and awareness programs

Fewer tech focused security tests and more

holistic security assessments.

Does your organization have a red team?

Page 40: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

SECURITY FAILURE

Page 41: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

STAYING SAFE

Staying safe

Be wary with public Wi-Fi.

2 factor authentication.

Use strong passwords. Avoid password reuse.

Turn off your Wi-Fi when you’re not using it.

Update your software, use an antivirus.

Awareness, a little paranoia never killed anyone.

Page 42: WiFi Social Engineering - Africahackon · 2015: Kenya’s internet penetration stood at 26 ... SOCIAL ENGINEERING Social Engineering Manipulating people into giving you what you want

Thanks for your time!