wireless security

22
by: Frank Pfleger

Upload: reba

Post on 05-Jan-2016

28 views

Category:

Documents


3 download

DESCRIPTION

Wireless Security. by: Frank Pfleger. Overview. Introduction to Wireless Networks Secure the Network Wireless Security Mechanisms Unsecure the Network Security Mechanism Weaknesses Tools and Techniques Wardriving / Procedures. Introduction. Private Wi-Fi - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless Security

by: Frank Pfleger

Page 2: Wireless Security

Introduction to Wireless Networks

Secure the Network◦ Wireless Security Mechanisms

Unsecure the Network◦ Security Mechanism Weaknesses◦ Tools and Techniques

Wardriving / Procedures

Page 3: Wireless Security

Private Wi-Fi◦ Easy installation security problems◦ Location freedom

Office Wi-Fi◦ Location freedom◦ Laptop popularity

Public Hotspot◦ Non-private ( mostly with fee )◦ Public places

Introduction Secure Unsecure Wardriving Conclusion

Page 4: Wireless Security

Non Encryption◦ Static IP addresses

Deactivate DHCP Assign IP address on every host

◦ MAC address filter Restrict access to unique hardware address Add MAC address for every host

◦ Hide SSID Deactivate the SSID broadcasting

Introduction Secure Unsecure Wardriving Conclusion

INSECURE

Page 5: Wireless Security

Encryption◦ WEP – Wired Equivalent Privacy

Based on RC4 (pseudo-random generator) XOR between data and random (bitstream) RC4 uses WEP key + Initialization vector INSECURE

◦ WPA – Wi-Fi Protected Access Based on the WEP architecture ( RC4 ) TKIP – Temporal Key Integrity Protocol RC4 uses WPA key (PSK or EAP) + Initialization

vector + Per packet key mixing + Re Keying+ Message Integrity Check

SECURE

Introduction Secure Unsecure Wardriving Conclusion

Page 6: Wireless Security

Encryption◦ WPA2 – Wi-Fi Protected Access 2

Implements IEEE 802.11 a,b,gand basic/mandatory functions of IEEE 802.11 i

New architecture based on AES AES – Advanced Encryption Standard

Symmetric crypto system Complies with the requirements of FIPS 140-2

Choose strong password / passphrase (63 characters)

SECURE

Introduction Secure Unsecure Wardriving Conclusion

Page 7: Wireless Security

RADIUS◦ Remote Authentification Dial-In Server◦ Client – Server system◦ AAA protocol

Authentification ( who ) Authorization ( what ) Accounting ( track consumption )

VPN – Virtual Private Network◦ Tunnel◦ Authentification◦ Secure Encryption ( Public Key / RSA )

Introduction Secure Unsecure Wardriving Conclusion

Page 8: Wireless Security

Weaknesses◦ Serveral techniques to compromise

Sniffing a IP address◦ Deactivated DHCP◦ IP address transmitted in every packet

Spoofing a MAC address◦ MAC address filter◦ MAC address transmitted in every frame

Introduction Secure Unsecure Wardriving Conclusion

Page 9: Wireless Security

Hacking WEP◦ Introduced in 1999◦ Serious weaknesses identified in 2001◦ IV – Initialization Vector used for decryption◦ ICV – Integrity Check Value

CRC32 checksum CRC32 is strict linear

◦ Calculation of the Key Attack based on security flaw in CRC32 500 000 – 1 000 000 IV‘s for 128 bit encryption Techniques: Packet Reinjection / Deauthenticate

Client TU Darmstadt ( PTW ) 50 000 IV‘s for 128 bit (50%)

Introduction Secure Unsecure Wardriving Conclusion

Page 10: Wireless Security

WPA / WPA2◦ Currently no weakness or security flaw◦ Weak Passwords

Choose a strong password At least 12 characters Mixed letters, numbers and symbols

◦ Dictionary Attack◦ Brute-Force Attack

Introduction Secure Unsecure Wardriving Conclusion

Page 11: Wireless Security

Tools and Techniques◦ MAC address spoofing

Linux macchanger –s wlan0

Windows supported by some Wi-Fi cards SMAC or other tools

◦ ARP spoofing Spoof the wrong MAC – IP combination Windows

WinArpSpoofer Linux

arpspoof –t 10.0.0.1 ( all packets to your host)

Introduction Secure Unsecure Wardriving Conclusion

Page 12: Wireless Security

Tools and Techniques◦ Man-in-the-Middle ( MITM )

Use ARP spoofing to get packets Analyze packets Forward packets to victim Linux:

fragroute/fragrouter sslsniff ( https MITM )

◦ DNS Spoofing Spoof the wrong Hostname – IP combination Linux:

dnsspoof

Introduction Secure Unsecure Wardriving Conclusion

Page 13: Wireless Security

Tools and Techniques◦ Sniffing data

Used for MITM or passive listening Capture and analyze data Linux / Windows:

Wireshark ( Ethereal )

◦ Aircrack Toolkit Cracking a WEP encryption Airodump

Logging / Scanning IV‘s Aireplay

Re-inject packets

Introduction Secure Unsecure Wardriving Conclusion

Page 14: Wireless Security

Act of searching Wireless Networks In general with a car

◦ Warbiking◦ Warwalking

Warchalking◦ Mark a place, mostly with chalk

Mapping◦ Create exact maps◦ Use GPS to get the coordinates◦ Provide information online

Difference to Piggybacking◦ Use of the wireless network

Introduction Secure Unsecure Wardriving Conclusion

Page 15: Wireless Security

Equipment◦ Good equipment for effective Wardriving◦ Notebook with Tools◦ Wireless Network Card

Regular Card Special Card with an external antenna interface

◦ Antenna Directional Onmidirectional Parabolic (not for Wardriving)

◦ GPS receiver Logging / Mapping

Introduction Secure Unsecure Wardriving Conclusion

Page 16: Wireless Security

Tools◦ Operating System

Windows ( just for Mapping and Logging ) Linux (Special Distributions)

All tools and drivers preinstalled Run from CD Eg. Backtrack ( Auditor )

◦ Scanning and Mapping Windows

Netstumbler Linux

Kismet

Introduction Secure Unsecure Wardriving Conclusion

Page 17: Wireless Security

Wardriving◦ Scan for wireless networks ( Netstumbler /

Kismet )◦ Save the GPS position

Piggybacking◦ Connect to the wireless network◦ Use the network

Introduction Secure Unsecure Wardriving Conclusion

Page 18: Wireless Security

Using Backtrack ( Auditor ) Hidden SSID

◦ aircrack to deauthenticate ( force reconnect )◦ Scan with airodump for the SSID

Scan and log IV‘s◦ airodump to log◦ Filters, Stores and analyzes packets for IV‘s

Reinject packets◦ aireplay reinjects found IV‘s◦ Increases the retransmitted IV‘s

Crack the Key◦ aircrack to calculate the WEP key◦ Enough IV‘s needed

Introduction Secure Unsecure Wardriving Conclusion

Page 19: Wireless Security

MAC filter◦ Scan packets with Wireshark ( Ethereal )◦ Spoof a MAC address with macchanger

DHCP deactivated◦ Scan packets with Wireshark ( Ethereal )◦ Set your IP address

Man-in-the-Middle◦ Spoof your MAC with the gateways IP◦ Spoof your MAC with the victims IP◦ Reroute packets◦ Using arpspoof and fragroute

Introduction Secure Unsecure Wardriving Conclusion

Page 20: Wireless Security

Spoof DNS Entry◦ Spoof your IP address for different hostnames◦ Eg. hostname of the victims bank

Intercept SSL connections◦ SSL MITM attack◦ Fake SSL certificate◦ Sniff data transmitted via SSL◦ Using sslsniff

Sniff Data◦ Log and analyze all transmitted data◦ Using Wireshark ( Ethereal )

Get access to Computers◦ Using various Windows / Linux tools

Introduction Secure Unsecure Wardriving Conclusion

Page 21: Wireless Security

Secure your wireless network properly!

Don‘t rely on◦ Hidden SSID◦ MAC filter◦ Deactivated DHCP◦ WEP

Use a proper encryption◦ WPA / WPA2 ( choose a strong password )◦ VPN ( secure with multi user )

Introduction Secure Unsecure Wardriving Conclusion

Page 22: Wireless Security

Thanks for your attention.

Any Question?

Frank [email protected]

Introduction Secure Unsecure Wardriving Conclusion