Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI



Similar documents
Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

What Hackers Know that you Don t Know

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Technical Brief. Wireless Intrusion Protection

Closing Wireless Loopholes for PCI Compliance and Security

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

All You Wanted to Know About WiFi Rogue Access Points

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Network Attacks. Common Network Attacks and Exploits

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

How To Protect A Wireless Lan From A Rogue Access Point

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

WHITE PAPER. Ensuring Compliance with DoD Wireless Policies

Introduction. Course Description

Wireless (In)Security Trends in the Enterprise

Ensuring HIPAA Compliance in Healthcare

MITM Man in the Middle

9 Simple steps to secure your Wi-Fi Network.

New Avatars of Honeypot Attacks on WiFi Networks

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

Security Awareness. Wireless Network Security

Wireless Tools. Training materials for wireless trainers

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

WIRELESS NETWORKING SECURITY

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Topics in Network Security

Network Security Best Practices

Securing end devices

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

PCI Wireless Compliance with AirTight WIPS

WiFi Security Assessments

Designing, Securing and Monitoring a/b/g/n Wireless Networks

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Hole196 Vulnerability in WPA2

Wireless Security: Secure and Public Networks Kory Kirk

Best Practices for Outdoor Wireless Security

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Developing Network Security Strategies

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Wireless Vulnerability Assessment For: ABC

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

WIRELESS SECURITY TOOLS

Long-Range 500mW IEEE g Wireless USB Adapter. User's Guide

Air Marshal. White Paper

Wireless LAN Pen-Testing. Part I

Ensuring HIPAA Compliance in Healthcare

Wireless Network Standard and Guidelines

Chapter 3 Safeguarding Your Network

Mobile Data Loss. Threats & Countermeasures. Michael T.Raggo, CISSP, NSA-IAM, ACE, CSI.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Design and Implementation Guide. Apple iphone Compatibility

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Best Practices for Securing Your Enterprise Wireless Network

MSC-131. Design and Deploy AirDefense Solutions Exam.

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Wireless Networks. Welcome to Wireless

The following chart provides the breakdown of exam as to the weight of each section of the exam.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Wireless Network Best Practices for General User

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

Top 10 Security Checklist for SOHO Wireless LANs

WHITE PAPER. Wireless Security: Ensuring Compliance with HIPAA, PCI, GLBA, SOX, DoD & Enterprise Policy

CYBERTRON NETWORK SOLUTIONS

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

802.11b and associated network security risks for the home user

Vocera Infrastructure Planning Summary. B3000n Compatible

Global Partner Management Notice

Cisco Adaptive Wireless Intrusion Prevention System

Top 10 Security Checklist for SOHO Wireless LANs

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Detailed Description about course module wise:

Security and privacy in public WLAN networks

Enterprise A Closer Look at Wireless Intrusion Detection:

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless Network Rogue Access Point Detection & Blocking

Wireless Auditing on a Budget

The next generation of knowledge and expertise Wireless Security Basics

Transcription:

Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI Friday, November 11, 2011

Get Ready for the Wireless World!

Wireless Network Risks (What do I need to look for?) 3

Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure SECURE INTERNAL NETWORK Server INTERNET Users

Wireless Security Concerns Network Edge Blurred, New Attack Vectors Behind the Firewall Hacker Server 1 Rogue AP Connected to Network Network Breach 3 Leaked Wired Traffic & Insertion Data Leakage AP INTERNET INTRANET Laptop Hotspot Evil Twin Desktop 4 Non-Compliant AP Network Breach/Data Leakage/ Data Compromise Mobile User 2 Hotspot Phishing Data Leakage 5 Users Bypassing Network Security Controls Data Leakage/Network Backdoor Muni Wi-Fi or Neighbors

Reconnaissance - Wired-Side Leakage Broadcast and Multicast Traffic leaking from the Wired Network into the local air space: - HSRP - IGMP - IGRP - OSPF AP - VRRP - IPX - STP - AND NetBIOS!!!

Reconnaissance - Wired-Side Leakage Wired Side Leakage (Router Broadcast Traffic) Password for H/A on Core Router! Note that this is leaking from the wired network into the wireless airspace, unencrypted, even though the AP is using encryption for wireless users

Common Infrastructure Vulnerabilities Cisco WPA Migration Mode Vulnerability BlackHat 2010

<>

Summary of 802.11 Vulnerabilities Type Attacks Tools Reconnaissance Sniffing Masquerade & Hijack Insertion Denial-of-Service Rogue APs Open/Misconfigured APs Ad Hoc stations WEP, WPA, LEAP cracking Dictionary attacks WPA Migration Mode (Cisco) MAC spoofing MiFi or cellphone hotspot Evil Twin/Wi-Phishing attacks Multicast/Broadcast injection Routing cache poisoning Man in the Middle attack Disassociation Duration field spoofing RF jamming Netstumbler, Kismet, Wellenrighter AirSnort, Cowpatty, Wireshark, Cain, Ettercap, aircrack-ng AirSnarf, Hotspotter, HostAP, SMAC, Firesheep Airpwn, WepWedgie, ChopChop, Vippr, irpass AirJack, void11, Bugtraq, IKE-crack

Common Infrastructure Vulnerabilities Many people have fortified their sensitive wireless infrastructures by migrating away from insecure Open or WEP configurations Type Comments State WEP Attack WPA-PSK Attack TKIP Vulnerable for many years, including Cisco Migration Mode Can be vulnerable to dictionary attack 2009/2010 attack demonstrations Easily Cracked Can be attacked, especially 8 char PSKs Targeted in POC End-users have now become the low-hanging fruit!!!

End-users have now become the low hanging fruit Hotel Am I connected to an insecure access point? Airport Am I connected to another passenger in ad-hoc mode? Coffee Shop Am I connected to a real hotspot connection? Home Is my laptop probing for SSIDs not on the safe list? Office Do I have wired & wireless on at the same time?

Wireless Phishing Old School Method Hotspot Evil Twin Mobile Users 1 Hotspot Phishing Data Leakage Tools such as Karma can Respond to ANY Client Probe Request Variety of Services (POP, FTP and HTTP) to Lure Unsuspecting Users No Authentication of Pervasive Wireless Cloud Automatic Network Selection in Windows (Zero Configuration Client)

Corporate Network Malicious Associations 1 Laptop sends Probe Request 2 AP responds with Probe Response User Station 3 Naïve user Associates with Fake AP AP provides IP address to User 4 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop (Soft AP)

Hotspot Phishing, Evil Twin, SoftAP, etc. New School Method - Direct attacks on Wireless Clients using Cellphone Palm Pre with Hacked Mobile Hotspot Corporate Hotspot Evil Twin X Mobile User 2 New School Hotspot Phishing Data Leakage Attack vector on any wifi enabled cell phone Got a WiFi ipad, ipod, Mac?

Corporate Network Malicious Associations - Cell Phone hotspot 1 Laptop sends Probe Request 2 Fake Pre-AP responds w/ Probe Response 3 Naïve user Associates with Fake AP AP provides IP address to User 4 User Station 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop

Guest Access Targeting Guest Users Captive portal doesn t allow access until authenticated via the portal But it does allow access to the local wireless network, and provides an IP What can I do with access to the local network? Unless PSPF or client isolation is enabled, hacker can scan and target other users of the wireless network Exploit their laptop and steal credentials for other wireless networks (metasploit anyone?) Validate if portal ACL rules are properly prohibiting access Virtually every captive portal we tested was only controlling HTTP/HTTPS access to the Internet and internal networks We could ping, ssh, telnet, ftp, etc. without EVER authenticating to the portal!!! Intruder Laptop Intruder doesn t authenticate to captive portal Targets users on same AP Perhaps some of those Guest users are actual employees??? Internet

Captive Portal Bypass Captive Portals We later determined that the attackers got to the corporate network through a unauthorized wired bridge installed by an a consulting firm This secondary local subnet was discovered by listening to wireless traffic for the entire airspace, and identifying IPs for the corporate network They then attempted to access the network through the captive portal, and were successful. And this DIDN T require any authentication to the captive portal! They already had access to the local network!!! Intruder Laptop Hub was connected to Guest wireless switch Bridge to corporate network Installed by consulting firm onsite, in a non-it closet Internet

Some of the other attack vectors that we re seeing lately 19

Windows 7 Virtual WiFi Windows 7 A whole new possibility of Rogue AP threats Windows 7 (all version) provide Virtual Wifi with the operating the system, essentially allowing any desktop user to setup a Virtual Wireless Access Point!!! Note that this is not an adhoc network, but an actually virtual access point that behaves, lives, and breathes like an actual Access Point!

Windows 7 Virtual WiFi How? Setup at the DOS Prompt Share either a Wired or Wireless connection The user can share their own desktop (like an ad-hoc network) And the user can share their network connection with others Wireless network may use authentication and encryption, BUT the user can share that connection with others, allowing those users to connect to the corporate network with weaker authentication & encryption Note: This is native to the operating system! In all versions of Windows 7 (Starter through Ultimate)

Windows 7 Virtual Wifi Windows 7 Virtual WiFi Rogue AP on Wired Network Passerby Windows 7 Virtual WiFi Rogue AP on Wire Contractor or Friend Hacker in Parking Lot INTERNET Sanctioned Access Point Users

Windows 7 Virtual Wifi Windows 7 Virtual WiFi Rogue AP on Wireless Network Passerby Windows 7 Virtual WiFi Rogue AP on Wireless (Wireless Bridge) Contractor or Friend Hacker in Parking Lot INTERNET Sanctioned Access Point Users

Corporate Network Win7 - Comparing packets from Access Points versus Wireless Clients Your Windows 7 Laptop is now a Rogue AP on your network How many Windows 7 laptops are in your network??? 1 Laptop sends Probe Request 2 Win7 responds with Probe Response 3 Win7 provides IP address to User User Station 4 Intruder Intruder on Network Laptop

Wireless Layer 2 Use are previous approach to detect Win7 Virtual WiFi

Corporate Network Win7 - Comparing packets from Access Points versus Wireless Clients WHY IS DEVICE ACTING LIKE BOTH AN AP AND A CLIENT??? Single device sending probe requests AND probe responses Win7 Probe Responses 1 Laptop sends Probe Request 2 Win7 responds with Probe Response 3 Win7 provides IP address to User User Station 4 Intruder Intruder on Network Laptop

Virtual WiFi for Windows XP too! (since 2005)

Intrusion Detection & Forensic Analysis Wireless attacks Layer 1 RF Jamming Bluetooth Malicious Interference Layer 2 Impersonation Attacks Active Attacks DoS Rogue Activity Anomalous Behavior Extrusions Performance List does on and on Layer 3 and above Impersonation Attacks Active Attacks DoS Rogue Activity Anomalous Behavior Performance Possibilities are endless

Incident Response Old School of thought Network Edge Blurred, New Attack Vectors Behind the Firewall Hacker Server AP INTERNET INTRANET Laptop Hotspot Evil Twin Desktop If I m only looking At my firewall, access Point, and servers, What have I missed??? Muni Wi-Fi or Neighbors ALMOST EVERYTHING!!!

Wireless Incident Response and Forensics Requires Wireless Analysis!!! Let s begin with Live Analysis 30

Layer 1 Spectrum Analysis Android WiFi Analyzer App - Nice (and free) WiFi Analyzer - Handy for walking around watching the signal strength get stronger as you get closer to the suspect AP - Limited to 802.11b/g (no 802.11a)

Layer 2 - Wireless Analyzer Wireless Analyzer Netstumbler/Kismet Great (and free) tools BUT: - Are you scanning 802.11a and 802.11n also? If you re built-in card only supports 802.11b/g, then you re missing 802.11a devices!!! (>50% of the PCI QSA reports we ve seen, do not include any 802.11a analysis, that s means they ve missed half of the potential wireless devices, therefore Rogues may still exist in your environment) Make sure your analysis is COMPREHENSIVE!!! USE A DUAL- BAND CARD Otherwise you may be missing half the picture!

Layer 2 - Wireless Sniffing Wireshark Wireless Sniffing on Windows usually requires a licensed product - note that we re sniffing Layer 2 WiFi packets, not Layer 3 as if you were already connected to the AP and have an IP address Use your laptop with BackTrack and a compatible wireless card and you can perform wireless sniffing for free! - New Link: http://www.backtrack-linux.org - Some 802.11a/b/g Card Options: - Ubiquiti (can have external antennas) - NetGear WAG511 What about 802.11n? Remember that 802.11n APs operate in both the 2.4GHz and 5GHz spectrums and are typically visible in either spectrum and backward compatibility, so you re probably good!

Layer 2 - Wireless Sniffing Sniffing with BackTrack 1. Enable monitor mode for wireless card to allow packet capture # airmon-ng start wifi0

Layer 2 - Wireless Sniffing Sniffing with BackTrack 2. Run airodump with the following options: # airodump-ng -c <channel> --bssid <MAC of AP> ath1 -w <target capture file>

Corporate Network Comparing packets from Access Points versus Wireless Clients Why is a Palm Pre sending Beacons & probe responses??? 1 Laptop sends Probe Request 2 Pre fake AP responds with Probe Response 3 Naïve user Associates with Fake AP AP provides IP address to User 4 User Station 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop

Wireless Layer 2 Suspicious Activity Hotspot Phishing, Evil Twin, SoftAP attacks

Know your perpetrator Hidden Identity An experience hacker will most likely change his MAC address Many times these modified MACs standout as anomalies -55:44:33:22:11:00 common -8F:21:47:AB:55:70 unknown OUI, suspicious - Organizationally Unique Identifier (OUI) 1 st Three Octets -Duplicate MACs, two different devices, different RSSI values - Received Signal Strength Indication Lookout for strange MAC addresses, wireshark mappings to OUIs can easily help you identify these oddities

Layer 3 Evidence Rogue Wireless Client IP Spoofing and MITM Attacks Valid wireless client Valid wired host Where might evidence of the breach reside? Rogue wireless client spoofs IP

Bluetooth Hacks picking up steam (again) Bluetooth Hacks PIN pads replaced at a fast food chain to steal payment card details More payment cards have been skimmed (financial details hijacked) as a result of PIN pads being replaced. This time the breach occurred at a fast food chain in a busy part of Edmonton, Canada. A "Bluetooth" device was used in the phony PIN pads to transmit all the card details, using a wireless connection. The fraud was discovered when a large number of Edmonton cards started showing up with unusual activity in Montreal. Edmonton Police, March 18, 2007

Bluetooth Specs Bluetooth All Bluetooth devices operate at the 2.4 GHz band Bluetooth defines 79 channels for communication on the 2.4 GHz band each channel being separated by 1 MHz The frequency range 2.402 GHz - 2.480 GHz Allows for 1600 frequency hops per second Class Maximum Permitted Power mw dbm Range (approximate ) Class 1 100 20 ~100 meters Class 2 2.5 4 ~10 meters Class 3 1 0 ~1 meters

Bluetooth Intrusion Detection Kit Bluetooth USB Class 2 Dongle & Backtrack Intrusion detection kit Also a Hacker kit for targeting cell phones

Bluetooth Detection Kit Identifying the services on the bluetooth device Backtrack: hcitool identify devices sdptool identify services on device Using this approach we can identify Bluetooth devices within 10 meters, and distinguish the radio types Bottomline, we re looking for anomalies (strange bluetooth radios that might be imbedded in a POS system)

Incident Response & Forensic Analysis Sources for analyzing wireless attacks Historical Device logs/syslog Firewall logs (wireless switches, Access Points, Wired Firewall) Wireless IDS alarms, events, logs Wired IDS alarms, events, logs Remnants on wireless clients (registry, saved wireless networks, etc.) Live Wired Sniffing Wireless Sniffing Spectrum Analysis Bluetooth RF Analysis, Heat Maps/Location Tracking Live analysis on IPS, WIPS, Firewalls, etc. Roaming behavior (from AP to AP, or client to client attacks) Others

CISCO

ARUBA

MOTOROLA (AIRDEFENSE) Attack Visuals Remote packet capture Track Sequence of Attack

Recommendations Final words Live Analysis Great, but you re probably conducting it post-breach still helpful if suspicious devices are still present Wired Firewall, Access Points, Wireless Switches, and Servers may provide very limited visibility into wireless attacks Probably NO visibility into wireless client attacks Windows SMS policies can possibly be used to disable Win7 Virtual WiFi note that other operating systems are working on this feature as well Currently available on Windows Server 2008, Windows 7, and drivers for Windows XP available from the Microsoft Research website

Final words Recommendations Mobile Devices Mobile devices such as wifi-enabled phones, ipads, etc. are just as susceptible to wireless sniffing and wireless attacks, especially in insecure deployments. Products exist for enforcing policies on mobile phones The aforementioned wireless vendors provide protection for end-users (Aruba Amigopod, Motorola AirDefense client isolation, Cisco PSPF) Wireless Intrusion Detection & Prevention can provide 24/7 monitoring Historical audit trails and forensic analysis of the steps leading up to a breach Mitigation & prevention of many of the aforementioned attacks Whether you have wireless or not, this is a must-have for a critical network We re a no wireless zone Are you sure???

Additional reading materials Sites The Greatest Hacking Breach in Cyber History http://hakin9.org/magazine/1528-email-security Joshua Wright http://www.willhackforsushi.com/ Project Ubertooth (Bluetooth advanced detection techniques) http://ubertooth.sourceforge.net/ My Security Website http://www.spyhunter.org or http://www.spy-hunter.com

Q&A Thank You mraggo@accuvant.com C O M P A N Y C O N F I D E N T I A L 51