Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI



Similar documents
Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

What Hackers Know that you Don t Know

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Technical Brief. Wireless Intrusion Protection

Closing Wireless Loopholes for PCI Compliance and Security

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

All You Wanted to Know About WiFi Rogue Access Points

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Wireless (In)Security Trends in the Enterprise

Network Attacks. Common Network Attacks and Exploits

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

How To Protect A Wireless Lan From A Rogue Access Point

New Avatars of Honeypot Attacks on WiFi Networks

Ensuring HIPAA Compliance in Healthcare

Network Security Best Practices

9 Simple steps to secure your Wi-Fi Network.

WHITE PAPER. Ensuring Compliance with DoD Wireless Policies

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

WiFi Security Assessments

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

WIRELESS NETWORKING SECURITY

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Security Awareness. Wireless Network Security

PCI Wireless Compliance with AirTight WIPS

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

MITM Man in the Middle

Introduction. Course Description

Certified Ethical Hacker Exam Version Comparison. Version Comparison

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Topics in Network Security

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Tools. Training materials for wireless trainers

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Designing, Securing and Monitoring a/b/g/n Wireless Networks

Best Practices for Outdoor Wireless Security

Developing Network Security Strategies

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System

Mobile Data Loss. Threats & Countermeasures. Michael T.Raggo, CISSP, NSA-IAM, ACE, CSI.

Wireless Vulnerability Assessment For: ABC

Chapter 3 Safeguarding Your Network

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Long-Range 500mW IEEE g Wireless USB Adapter. User's Guide

Ensuring HIPAA Compliance in Healthcare

Hole196 Vulnerability in WPA2

Wireless Network Best Practices for General User

WIRELESS SECURITY TOOLS

802.11b and associated network security risks for the home user

Air Marshal. White Paper

Top 10 Security Checklist for SOHO Wireless LANs

Wireless Networks. Welcome to Wireless

The following chart provides the breakdown of exam as to the weight of each section of the exam.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Detailed Description about course module wise:

Wireless LAN Pen-Testing. Part I

Wireless Network Standard and Guidelines

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Best Practices for Securing Your Enterprise Wireless Network

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Global Partner Management Notice

Securing end devices

Cisco Adaptive Wireless Intrusion Prevention System

The next generation of knowledge and expertise Wireless Security Basics

CRYPTUS DIPLOMA IN IT SECURITY

Cisco Adaptive Wireless Intrusion Prevention System

CYBERTRON NETWORK SOLUTIONS

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

Wireless Network Risks and Controls

MN-700 Base Station Configuration Guide

Top 10 Security Checklist for SOHO Wireless LANs

MUNICIPAL WIRELESS NETWORK

CISCO WIRELESS CONTROL SYSTEM (WCS)

AC750 WiFi Range Extender

How To Secure Your Store Data With Fortinet

Design and Implementation Guide. Apple iphone Compatibility

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Transcription:

Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI Wednesday, September 28, 2011

Get Ready for the Wireless World!

Wireless Network Risks (What do I need to look for?) 3

Traditional Wired Network Well-Defined Network Edge, Straightforward to Manage and Secure SECURE INTERNAL NETWORK Server INTERNET Users

Wireless Security Concerns Network Edge Blurred, New Attack Vectors Behind the Firewall Hacker Server 1 Rogue AP Connected to Network Network Breach 3 Leaked Wired Traffic & Insertion Data Leakage AP INTERNET INTRANET Laptop Hotspot Evil Twin Desktop 4 Non-Compliant AP Network Breach/Data Leakage/ Data Compromise Mobile User 2 Hotspot Phishing Data Leakage 5 Users Bypassing Network Security Controls Data Leakage/Network Backdoor Muni Wi-Fi or Neighbors

Common Infrastructure Vulnerabilities Many people have fortified their sensitive wireless infrastructures by migrating away from Open or WEP configurations Type Comments State WEP Attack WPA-PSK Attack TKIP Vulnerable for many years, including Cisco Migration Mode Can be vulnerable to dictionary attack 2009/2010 attack demonstrations Easily Cracked Can be attacked, especially 8 char PSKs Targeted in POC End-users have now become the low-hanging fruit!!!

Summary of 802.11 Vulnerabilities Type Attacks Tools Reconnaissance Sniffing Masquerade Insertion Denial-of-Service Rogue APs Open/Misconfigured APs Ad Hoc stations WEP, WPA, LEAP cracking Dictionary attacks Leaky APs MAC spoofing AirSnarf/HotSpot attacks Evil Twin/Wi-Phishing attacks Multicast/Broadcast injection Routing cache poisoning Man in the Middle attack Disassociation Duration field spoofing RF jamming Netstumbler, Kismet, Wellenrighter AirSnort, Wepcrack, Cowpatty, Wireshark, Cain, Ettercap AirSnarf, Hotspotter, HostAP, SMAC Airpwn, WepWedgie, ChopChop, Vippr, irpass, CDPsniffer AirJack, void11, Bugtraq, IKE-crack

Reconnaissance - Wired-Side Leakage Wired Side Leakage (Router Broadcast Traffic) Password for H/A on Core Router! Note that this is leaking from the wired network into the wireless airspace, unencrypted, even though the AP is using encryption for wireless users

Mobile Workers are the new low hanging fruit!!! HOTEL COFFEE SHOP AIRPORT Am I connected to an insecure access point? Am I connected to a real hotspot connection? Am I connected to another passenger in ad-hoc mode? HOME HEADQUARTERS BRANCH OFFICE Is my laptop probing for SSIDs not on the safe list? Are my employees using Municipal WiFi? Do I have wired & wireless on at the same time?

Wireless Phishing Old School Method Hotspot Evil Twin Mobile Users 1 Hotspot Phishing Data Leakage Tools such as Karma can Respond to ANY Client Probe Request Variety of Services (POP, FTP and HTTP) to Lure Unsuspecting Users No Authentication of Pervasive Wireless Cloud Automatic Network Selection in Windows (Zero Configuration Client)

Corporate Network Malicious Associations 1 Laptop sends Probe Request 2 AP responds with Probe Response User Station 3 Naïve user Associates with Fake AP AP provides IP address to User 4 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop (Soft AP)

Hotspot Phishing, Evil Twin, SoftAP, etc. New School Method - Direct attacks on Wireless Clients using Cellphone Palm Pre with Hacked Mobile Hotspot Corporate Hotspot Evil Twin X Mobile User 2 New School Hotspot Phishing Data Leakage Attack vector on any wifi enabled cell phone Got a WiFi ipad, ipod, Mac?

Corporate Network Malicious Associations - Cell Phone hotspot 1 Laptop sends Probe Request 2 Fake Pre-AP responds w/ Probe Response 3 Naïve user Associates with Fake AP AP provides IP address to User 4 User Station 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop

Captive Portal Bypass Guest Access Captive portal doesn t allow access until authenticated via the portal But it does allow access to the wireless network, and provides an IP What can I do with access to the local network? Unless PSPF is enabled, hacker can scan and target other users of the wireless network Exploit their laptop and steal credentials for other wireless networks (metasploit anyone?) Validate if portal ACL rules are properly prohibiting access Virtually every captive portal we tested was only controlling HTTP/HTTPS access to the Internet and internal networks We could ping, ssh, telnet, ftp, etc. without EVER authenticating to the portal!!! IP: 192.168.1.45 DNS: 10.5.1.10 Appsvr1.corp.com 10.5.1.15 Credit card system exposed to the wireless network! WAN! Appsvr1.corp.com

Captive Portal Bypass Captive Portals We later determined that the attackers got to the corporate network through a unauthorized wired bridge installed by an employee This secondary local subnet was discovered by listening to wireless traffic for the entire airspace, and identifying IPs for the corporate network They then attempted to access the network through the captive portal, and were successful. And this DIDN T require any authentication to the captive portal! They already had access to the local network!!! CAPTIVE PORTALS COMMONLY ALLOW THE PORTAL TO BE BYPASSED!!!

Intrusion Detection & Forensic Analysis Wireless attacks Layer 1 RF Jamming Bluetooth Malicious Interference Layer 2 Impersonation Attacks Active Attacks DoS Rogue Activity Anomalous Behavior Extrusions Performance List does on and on Layer 3 and above Impersonation Attacks Active Attacks DoS Rogue Activity Anomalous Behavior Performance Possibilities are endless

Incident Response Old School of thought Network Edge Blurred, New Attack Vectors Behind the Firewall Hacker Server AP INTERNET INTRANET Laptop Hotspot Evil Twin Desktop If I m only looking At my firewall, access Point, and servers, What have I missed??? Muni Wi-Fi or Neighbors ALMOST EVERYTHING!!!

Wireless Incident Response and Forensics Requires Wireless Analysis!!! Let s begin with Live Analysis 18

Layer 1 Spectrum Analysis Android WiFi Analyzer App - Nice (and free) WiFi Analyzer - Handy for walking around watching the signal strength get stronger as you get closer to the suspect AP - Limited to 802.11b/g (no 802.11a)

Layer 2 - Wireless Analyzer Wireless Analyzer Netstumbler/Kismet Great (and free) tools BUT: - Are you scanning 802.11a and 802.11n also? If you re built-in card only supports 802.11b/g, then you re missing 802.11a devices!!! (>50% of the PCI QSA reports we ve seen, do not include any 802.11a analysis, that s means they ve missed half of the potential wireless devices, therefore Rogues may still exist in your environment) Make sure your analysis is COMPREHENSIVE!!! USE A DUAL- BAND CARD Otherwise you may be missing half the picture!

Layer 2 - Wireless Sniffing Wireshark Wireless Sniffing on Windows usually requires a licensed product - note that we re sniffing Layer 2 WiFi packets, not Layer 3 as if you were already connected to the AP and have an IP address Use your laptop with BackTrack and a compatible wireless card and you can perform wireless sniffing for free! - New Link: http://www.backtrack-linux.org - Some 802.11a/b/g Card Options: - Ubiquiti (can have external antennas) - NetGear WAG511 What about 802.11n? Remember that 802.11n APs operate in both the 2.4GHz and 5GHz spectrums and are typically visible in either spectrum and backward compatibility, so you re probably good!

Layer 2 - Wireless Sniffing Sniffing with BackTrack 1. Enable monitor mode for the wireless card to allow packet capture # airmon-ng start wifi0

Layer 2 - Wireless Sniffing Sniffing with BackTrack 2. Run airodump with the following options: # airodump-ng -c <channel> --bssid <MAC of AP> ath1 -w <target capture file>

Corporate Network Comparing packets from Access Points versus Wireless Clients Why is a Palm Pre sending Beacons & probe responses??? 1 Laptop sends Probe Request 2 Pre fake AP responds with Probe Response 3 Naïve user Associates with Fake AP AP provides IP address to User 4 User Station 5 6 Scan laptop for vulnerabilities & compromise it Use station as a launch pad Intruder Laptop

Wireless Layer 2 Suspicious Activity Hotspot Phishing, Evil Twin, SoftAP attacks

Know your perpetrator Hidden Identity An experience hacker will most likely change his MAC address Many times these modified MACs standout as anomalies -55:44:33:22:11:00 common -8F:21:47:AB:55:70 unknown OUI, suspicious - Organizationally Unique Identifier (OUI) 1 st Three Octets -Duplicate MACs, two different devices, different RSSI values - Received Signal Strength Indication Lookout for strange MAC addresses, wireshark mappings to OUIs can easily help you identify these oddities

Layer 3 Evidence Rogue Wireless Client IP Spoofing and MITM Attacks Valid wireless client Valid wired host Where might evidence of the breach reside? Rogue wireless client spoofs IP

Some of the other attack vectors that we re seeing lately 28

Bluetooth Hacks picking up steam (again) Bluetooth Hacks PIN pads replaced at a fast food chain to steal payment card details More payment cards have been skimmed (financial details hijacked) as a result of PIN pads being replaced. This time the breach occurred at a fast food chain in a busy part of Edmonton, Canada. A "Bluetooth" device was used in the phony PIN pads to transmit all the card details, using a wireless connection. The fraud was discovered when a large number of Edmonton cards started showing up with unusual activity in Montreal. Edmonton Police, March 18, 2007

Bluetooth Specs Bluetooth All Bluetooth devices operate at the 2.4 GHz band Bluetooth defines 79 channels for communication on the 2.4 GHz band each channel being separated by 1 MHz The frequency range 2.402 GHz - 2.480 GHz Allows for 1600 frequency hops per second Class Maximum Permitted Power mw dbm Range (approximate ) Class 1 100 20 ~100 meters Class 2 2.5 4 ~10 meters Class 3 1 0 ~1 meters

Bluetooth Intrusion Detection Kit Bluetooth USB Class 2 Dongle & Backtrack Intrusion detection kit Also a Hacker kit for targeting cell phones

Bluetooth Detection Kit Identifying the services on the bluetooth device Backtrack: hcitool identify devices sdptool identify services on device Using this approach we can identify Bluetooth devices within 10 meters, and distinguish the radio types Bottomline, we re looking for anomalies (strange bluetooth radios that might be imbedded in a POS system)

Windows 7 Virtual WiFi Windows 7 A whole new possibility of Rogue AP threats Windows 7 (all version) provide Virtual Wifi with the operating the system, essentially allowing any desktop user to setup a Virtual Wireless Access Point!!! Note that this is not an adhoc network, but an actually virtual access point that behaves, lives, and breathes like an actual Access Point!

Windows 7 Virtual WiFi How? Setup at the DOS Prompt Share either a Wired or Wireless connection The user can share their own desktop (like an ad-hoc network) And the user can share their network connection with others Wireless network may use authentication and encryption, BUT the user can share that connection with others, allowing those users to connect to the corporate network with weaker authentication & encryption Note: This is native to the operating system! In all versions of Windows 7 (Starter through Ultimate)

Windows 7 Virtual Wifi Windows 7 Virtual WiFi Rogue AP on Wired Network Passerby Windows 7 Virtual WiFi Rogue AP on Wire Contractor or Friend Hacker in Parking Lot INTERNET Sanctioned Access Point Users

Windows 7 Virtual Wifi Windows 7 Virtual WiFi Rogue AP on Wireless Network Passerby Windows 7 Virtual WiFi Rogue AP on Wireless (Wireless Bridge) Contractor or Friend Hacker in Parking Lot INTERNET Sanctioned Access Point Users

Corporate Network Win7 - Comparing packets from Access Points versus Wireless Clients Your Windows 7 Laptop is now a Rogue AP on your network How many Windows 7 laptops are in your network??? 1 Laptop sends Probe Request 2 Win7 responds with Probe Response 3 Win7 provides IP address to User User Station 4 Intruder Intruder on Network Laptop

Wireless Layer 2 Use are previous approach to detect Win7 Virtual WiFi

Incident Response & Forensic Analysis Sources for analyzing wireless attacks Historical Device logs/syslog Firewall logs (wireless switches, Access Points, Wired Firewall) Wireless IDS alarms, events, logs Wired IDS alarms, events, logs Remnants on wireless clients (registry, saved wireless networks, etc.) Live Wired Sniffing Wireless Sniffing Spectrum Analysis Bluetooth RF Analysis, Heat Maps/Location Tracking Live analysis on IPS, WIPS, Firewalls, etc. Roaming behavior (from AP to AP, or client to client attacks) Others

Recommendations Final words Live Analysis Great, but you re probably conducting it post-breach still helpful if suspicious devices are still present Wired Firewall, Access Points, Wireless Switches, and Servers may provide very limited visibility into wireless attacks Probably NO visibility into wireless client attacks Windows SMS policies can possibly be used to disable Win7 Virtual WiFi note that other operating systems are working on this feature as well Currently available on Windows Server 2008, Windows 7, and drivers for Windows XP available from the Microsoft Research website

Final words Recommendations Mobile devices such as wifi-enabled phones are just as susceptible to wireless sniffing and wireless attacks, especially in insecure deployments. Products exist for enforcing policies on mobile phones Wireless Intrusion Detection & Prevention can provide 24/7 monitoring Historical audit trails and forensic analysis of the steps leading up to a breach Mitigation & prevention of many of the aforementioned attacks Whether you have wireless or not, this is a must-have for a critical network.

Wireless Intrusion Detection & Prevention Attack Visuals Remote packet capture Track Sequence of Attack

Additional reading materials Sites The Greatest Hacking Breach in Cyber History http://hakin9.org/magazine/1528-email-security Joshua Wright http://www.willhackforsushi.com/ AirDefense.net What Hackers know that you don t (whitepaper) Wireless Security Blog http://communities.motorola.com/

Q&A Thank You mraggo@accuvant.com C O M P A N Y C O N F I D E N T I A L 44