Practical Attacks on DOCSIS
|
|
|
- Isabel Jefferson
- 10 years ago
- Views:
Transcription
1 Practical Attacks on DOCSIS
2 Who am Security researcher at Accuvant Work in embedded device security, reverse engineering, exploit dev No background in DOCSIS, but I find it interesting
3 DOCSIS Data Over Cable Service Interface Specification RF protocol stack underneath IP It s how your cable modem accesses the internet This presentation focuses on DOCSIS, not cable modems Applicable in US, Europe (layer 1 differences), Japan
4 Motivation DOCSIS attack range Wifi attack range
5 Network overview Cable modem termination system = CMTS Coax/fiber network = HFC Cable Modem = CM Router = CPE
6 Protocol overview IP BPKM Packet PDU Other MAC Management MPEG-TS MAC PMD Downstream PHY (1 to many, 64/256 QAM) Upstream PHY (many to 1, TDMA, QPSK / QAM, return frequencies )
7 Protocol overview MPEG-TS Fixed size packets PID is 0x1FFE for DOCSIS Desegmentation occurs here
8 Protocol overview MAC Frame control determines packet type Extended header supports TLVs
9 How to access? Downstream 1. Hacked cable modem Model-specific, clunky 2. SDR 3. Dedicated hardware Cheap, ready to go
10 Clear QAM dongle MyGica USB QAM HDTV tuner $29 on Amazon Supported out of the box by Linux DVB API Truly plug and play Order one now!
11 How to access? 1. Hacked cable modem Upstream Hacked CMTS? Expensive, highly model-specific 2. SDR Best/only option 3. Dedicated hardware Doesn t exist (that I know of)
12 DOCSIS SEC / BPI+ You didn t think it was all in the clear did you? DOCSIS SEC/BPI+ Encryption and authentication protocol in DOCSIS BPI (Baseline Privacy Interface) in DOCSIS 1.0 BPI+ in DOCSIS 1.1 and 2.0 SEC (Security) in DOCSIS 3.0
13 DOCSIS SEC / BPI+ Encrypted Key Management IP BPKM Packet PDU Other MAC Management MAC Downstream PHY / MPEG-TS Upstream PHY, PMD
14 BPKM Baseline Privacy Key Management Client/server key synchronization protocol Operates on SAIDs (Security Association IDs) 14-bit random integers Authorization: Prevent cable theft and device spoofing by cryptographically identifying modems Don t care much (this talk is not about service theft) Traffic Encryption Key (TEK) provisioning Provisioning TEKs that encrypt customer traffic
15 BPKM Authorization Identification info serial#, MAC, CM s public key Certificate Authorization Key (RSA encrypted with CM s key) Key lifetime Security Capabilities (supported algorithms) Key sequence # SAID (initialized to zero) Attributes (cryptographic algorithm) Auth Request Auth Response
16 BPKM Authorization This request is rare One week lifetime* On CM boot This is where supported security capabilities are announced and selected Note that supported capabilities field is unsigned Downgrade attack possible?
17 Algorithms Encryption algorithms 40-bit DES 56-bit DES 128-bit AES (added in DOCSIS 3.0) Data authentication None
18 BPKM TEK provisioning Identification info serial#, MAC, CM s public key Auth key sequence # Auth key sequence # SAID SAID current/next TEK parameters 3DES encrypted TEK, lifetime, seq #, IV SHA1 HMAC (key derived from Auth Key) Key Request SHA1 HMAC (key derived from Auth Key) Key Response
19 BPKM TEK provisioning More frequent New TEK 6 hours* TEK is protected with Auth key-derived KEK IV is in the TEK parameters Only 1 IV is used for the lifetime of TEK Chaining is re-initialized with each frame
20 Packet PDU encryption (almost* all Packet PDUs) MAC header Destination/ Source MAC addresses Protocol Type IP CRC Contains Extended Header identifying Encryption enabled and SAID Encrypted with TEK using CBC with residual block termination
21 Problems with DOCSIS SEC Use of 56-bit DES DOCSIS 3.0 adds support for AES Never seen AES used* Lack of use likely due to DOCSIS 2.0 support CMTS are not picking most secure cryptographic algorithm supported by CM
22 Problems with DOCSIS SEC Re-use of CBC IV in each frame Required by specification Identical packets will have identical ciphertext
23 Exploiting these vulnerabilities First focused on attacks performable with passive downstream read access only Reduced cost and complexity to perform No significant chance of detection Doesn t even require being a subscriber
24 DOCSIS DES brute force 1. Identify the victims 2. Obtain tuples for each victim (X, E(X)) 3. Brute-force DES key to determine X from E(X) If X static, time/memory tradeoff possible
25 Identifying the victims Packet PDU exposes source & destination MAC addresses in clear ARP traffic is in the clear IP registration occurs prior to encryption/ authentication (in normal provisioning flow) Unless EAE enabled (Early Authentication & Encryption) Never seen this enabled*
26 Identifying the victims Sniff ARP traffic on downstream and collect subnets Send ICMP ping sweeps across subnets with various packets sizes Irrelevant how victim CPE responds Perform correlation between encrypted packet sizes and sent ICMP packet length Produce (MAC, IP) tuples
27 Obtaining known plaintext values Send ping containing known data PlainN CBC CipherN CipherN-1 Re-send identical packet but change Plain N = Cipher N-1 Subsequent Cipher N = E(Cipher N-1 Cipher N-1 ) = E(0) Sniffing lossy due to channel bonding
28 Brute-forcing 56-bit DES Attacking 56-bit DES is not new EFF DES Cracker (1998) Moxie Marlinspike (2012) for MS-CHAPv2 using FPGAs Karsten Nohl (2013) for SIM cards using rainbow tables Sergey Gordeychik/Alex Zaitsev (2014) reproducing Karsten s attack using FPGAs
29 DOCSIS use-case DES TEKs are only useful for 6 hours of traffic Ideally, cracking DES TEKs should be cheap, fast (<6hrs), and repeatable Some upfront cost is acceptable
30 Existing DES attack platforms Implementer Upfront cost Crack time Karsten ~ EUR minute Moxie? 23 hours Sergey/Alex ~$ days
31 My attack platform Uses rainbow tables for time/memory tradeoff since E(0) Created with Amazon EC2, tables stored in S3 Total upfront EC2 cost was around $2000 (across ~3 weeks) on GPU spot instances Cracking cost is $0.22, takes 23 minutes Assuming spin-up time is amortized
32 DES rainbow tables 16 rainbow tables, 64gb apiece (1 tb total) Each chain represents DES operations (1 MegaDES) E(0,Imm1) Start E(0,Start) Imm1 End E(0,ImmN-1) DES Reduce DES Reduce Keep start and end only
33 Attack platform systems: generation RTGen GPU+CPU instances creating work units Each work unit is 1 TeraDES Massively parallelized Assimilator Memory-optimized instance Sorts and uniques work unit chains (by endpoint) into finished tables Each finished table is 64gb, and represents 4 PetaDES
34 Attack platform systems: cracking Cracker GPU instance (one for each table index) Does precalculation : calculate every possible chain endpoint that would contain E(X) Takes 20 minutes Table Lookup Memory instance (one for each table index) Looks up all precalculated chain endpoints in final table For each found, walks chain from start point to find cleartext X Takes ~3 minutes
35 Success probability Due to reduction step, cracking success is not guaranteed Probability of two ciphertexts reducing to the same key is 255/2**56 Unless collision occurs at same position, chains will not merge This is because position is used in reduction function In practice, about 4% endpoint collisions in a table part
36 Notes on performance Use bit slicing to do N parallel DES operations N depends on GPU (32) vs CPU (128) Each DES bit is represented in a single variable This makes permutation (bit-shuffling) operations free, which are otherwise costly on CPUs Bits in the variable represent DES operations occurring in parallel Data Bit X Key 0 Key 1 Key 2 Key 3 Key 4 Key N Replace typical reduction algorithm (addition) with bitslice-friendly (xor) to avoid serializing bits between steps
37 IV recovery Cracking only reveals key, what about IV? Only in BPKM Key Reply Ignoring it is OK, since you only lose the first block, but Wireshark won t like your pcaps Heuristic recovery dc
38 Video Demo
39
40 Decryption oracle attacks Two theoretical attacks that are nearly practical Work regardless of encryption algorithm These will be more important after AES used Use the CMTS/CM + ICMP as a decryption oracle This is an active attack, and only available for TEK lifetime Requires functional ICMP to/from victim Requires being a subscriber
41 Decryption oracle 1) Echo 4) Echo 2) Echo Reply 3) Echo Reply attacker victim
42 Decryption oracle CM Oracle: Downstream injection 4) Echo Reply 3) Echo Reply 2) Echo modify & reinject attacker victim
43 CM Oracle attack 1. Identify the victims, collect downstream encrypted payloads 2. Send ICMP echo to victim, collect encrypted ping request 3. Inject ICMP echo, but splice in desired payload Requires QAM modulator 4. Wait for echo response containing cleartext
44 CM Oracle attack MAC PDU IP ICMP Echo Placeholder Data Collected downstream to victim MAC PDU IP ICMP Echo Sniffed Encrypted Data Modified and re-injected downstream with modulator MAC PDU IP ICMP Echo Reply Received by attacker Decrypted Replayed Data
45 Injection feasibility There doesn t appear to be anything preventing this at the physical layer Requires specific hardware QAM modulator Lots of these available on ebay for all kinds of price points, starting at reasonable levels Likely require some level of hacking SDR
46 Decryption oracle CMTS Oracle: Upstream sniffing 4) Echo Reply 3) Echo Reply attacker modify & reinject victim
47 CMTS Oracle attack 1. Identify the victims, collect downstream encrypted payloads 2. Send ICMP echo to victim, collect upstream ping reply from victim Requires upstream sniffing capability 3. Spoofed upstream packet, but splice in desired payload Requires hacked cable modem 4. Wait for echo response containing cleartext
48 Upstream sniffing feasibility Requires sniffing upstream data Requires sniffing with SDR
49 Upstream spoofing on Ubee Telnet on as user/user for root access /proc/net/dbrctl/maxcpe number of CPE devices the modem will forward (default 1) /proc/net/dbrctl/addcpe write another MAC address here to start modem forwarding Read current TEK/IV from /dev/mem decrypt encrypted data with my TEK, expect modem to encrypt it back to original (?) SAID is not in upstream packet, but key version# is
50 CRC validation What about the encrypted CRC in the spliced packet PDU? We don t know what the correct CRC value is Brute force sucks CRC MAC PDU IP ICMP Echo solution Sniffed Encrypted Data 4b, resets CRC to what it would be after processing MAC header only, so spliced CRC still correct
51 Conclusions Your DOCSIS network is less safe than your wifi network Downstream sniffing is easy and decryption is possible Upstream sniffing is close Active attacks are plausible
52 Solutions Support AES immediately for 3.0 modems Support EAE Drop ICMP at the CMTS? Consider other traffic types that may be used for oracle Add data authentication!
53 Software Releases CableTables software Uses MyGica dongle (or equivalent) to perform DES cracking attack Supports local or cloud-based rainbow tables Cloud DES Rainbow table generation software What I used to generate my DES rainbow tables in EC2 What I use for cloud-based cracking
54 Obtaining the tables They are available to all AWS users Requestor Pays: you just pay for data transfer $0 to US East AWS region 1tb: ~$20 to other AWS region 1tb: ~$90 over the internet to your computer
55 Q&A
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs
Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model
AUTOMATYKA 2010 Tom 14 Zeszyt 1 Marcin Ko³odziejczyk* Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model 1. Introduction The purpose of this article is to describe some security levels
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson
Chapter 8 Network Security Slides adapted from the book and Tomas Olovsson Roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity Security protocols and measures: Securing
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna. 2010 Marc Heuse <[email protected]>
Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna 2010 Marc Heuse Hello, my name is The future is here already Let s start with the basics IPv4 4 octets 4.294.967.296
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
VoIP Security. Title: Something Old (H.323), Something New (IAX), Something Hallow (Security), & Something Blue (VoIP Administrators)
VoIP Security Title: Something Old (H.323), Something New (IAX), Something Hallow (Security), & Something Blue (VoIP Administrators) BlackHat 2007 Presented by: Himanshu Dwivedi ([email protected])
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan Hassan Zaheer Manager Operations Broadband Division Broadband Cable Cable services provides Intelligent network Mix of IP and MPEG Multiple
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Karsten Nohl, [email protected]. Breaking GSM phone privacy
arsten Nohl, [email protected] Breaking GSM phone privacy GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill [email protected]
Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill [email protected] Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler [email protected] Packetwatch Research http://www.packetwatch.net December 2003 Abstract Packet sniffing is a technique of monitoring
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Cisco Cable Radio Frequency (RF) FAQs
Table of Contents Cable Radio Frequency (RF) FAQs...1 Questions...1...1 Related Information...8 i Cable Radio Frequency (RF) FAQs Questions How do I measure the upstream RF signal? How do I measure the
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA
A Seminar report On Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface I have made
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For Content Security measures Recent publications in the hacking community Practical
CONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
CM500 High Speed Cable Modem User Manual
User Manual February 2015 202-11472-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Security in Wireless and Mobile Networks
Security in Wireless and Mobile Networks 1 Introduction This is a vast and active field, a course by itself Many references on wireless security A good book on wireless cooperation: Thwarting Malicious
COMBATING SECURITY RISKS ON THE CABLE IP NETWORK
COMBATING SECURITY RISKS ON THE CABLE IP NETWORK J.T. McKelvey Cisco Systems, Inc., USA ABSTRACT Cable IP networks are often mistakenly believed to be insecure. Theft of service is becoming more common
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Packet Sniffer Detection with AntiSniff
Ryan Spangler University of Wisconsin - Whitewater Department of Computer and Network Administration May 2003 Abstract Packet sniffing is a technique of monitoring every packet that crosses the network.
