802.11 Security. Inaccessible Star? Philippe TEUWENCédric BLANCHER. Hack.lu 2006 October 19-21 http://hack.lu/



Similar documents
WiFi traffic injection based attacks

WiFi traffic injection based attacks

Attacking WiFi networks with traffic injection

MITM Man in the Middle

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless Networks. Welcome to Wireless

Wireless Security: Secure and Public Networks Kory Kirk

Linux Network Security

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

The Trivial Cisco IP Phones Compromise

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

GregSowell.com. Mikrotik Security

Security of IPv6 and DNSSEC for penetration testers

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Protecting and controlling Virtual LANs by Linux router-firewall

Hole196 Vulnerability in WPA2

A S B

Bridgewalling - Using Netfilter in Bridge Mode

The Use of Mikrotik Router Boards With Radius Server for ISPs.

Securing end devices

All You Wanted to Know About WiFi Rogue Access Points

J ai pas de TUN et je m en TAP

VLANs. Application Note

Packet Sniffing on Layer 2 Switched Local Area Networks

Hacking. Aims. Naming, Acronyms, etc. Sources

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Lecture 17 - Network Security

How To Secure Wireless Networks

Lucent VPN Firewall Security in x Wireless Networks

Firewalls. Chien-Chung Shen

Lab VI Capturing and monitoring the network traffic

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

C)PTC Certified Penetration Testing Consultant

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WIRELESS NETWORKING SECURITY

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Security Awareness. Wireless Network Security

Sniffing in a Switched Network

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Industrial Communication. Securing Industrial Wireless

Configuring the Transparent or Routed Firewall

WiFi Security Assessments

Wireless Mesh Networks under FreeBSD

Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Link Layer and Network Layer Security for Wireless Networks

Wireless LAN Pen-Testing. Part I

Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Legacy Security

Accelerator Control-System Network Diamond Light Source. Mike Leech, Controls Group Computer Systems Manager

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Introduction to Network Security Lab 1 - Wireshark

Unix System Administration

Own your LAN with Arp Poison Routing

Tools for Attacking Layer 2 Network Infrastructure

Certified Wireless Security Professional (CWSP) Course Overview

Cisco AnyConnect Secure Mobility Solution Guide

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CSC574 - Computer and Network Security Module: Firewalls

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Information Security Training. Assignment 1 Networking

IPv6 Network Security.

CS5008: Internet Computing

Ethical Hacking as a Professional Penetration Testing Technique

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

APPENDIX 3 LOT 3: WIRELESS NETWORK

Port stealing and ARP poisoning attack simulation with NETKIT

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

1. LAB SNIFFING LAB ID: 10

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Performance Evaluation of Linux Bridge

Topics in Network Security

NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Firewall. June 2011 Revision 1.0

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

Guideline for setting up a functional VPN

Chapter 1 Network Security

Securing Networks with PIX and ASA

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Introduction to Analyzer and the ARP protocol

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Design and Implementation Guide. Apple iphone Compatibility

Exam Questions SY0-401

A Research Study on Packet Sniffing Tool TCPDUMP

Transcription:

Inaccessible Star? Philippe TEUWEN Cédric BLANCHER Hack.lu 2006 October 19-21 http://hack.lu/

Agenda 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Agenda 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Open wireless networks Anybody can access network Zero conf. or so Services open to anyone Anybody can access/play/attack...

Open wireless networks Anybody can access network Zero conf. or so Services open to anyone Anybody can access/play/attack...

Security specifics Security? No authentication/authorization No message authenticity No confidentiality Etc. Some clients isolation measures

Open networks Open infrastructure network : anyone can join Generous users who share their access Any traffic allowed to Internet Sometimes some restrictions (ports, bandwidth) Legal issues? Internet

Captive portal Open infrastructure network : anyone can join Outbound traffic is filtered out HTTP traffic is redirected to auth. portal Once registered, client can access Internet Internet Authenticated Client New client

Mesh networks Adhoc based network Clients to clients links Clients can join/move/leave Dynamic and adaptative routing AODV, OLSR provide dynamic and adaptative routing Internet

Agenda 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Rogue AP Attack principles Classical, unexpensive, well known layer 1/2 attack Set up AP with same configuration Power-up and associate clients Divert client traffic and play Easy, efficient, powerful tools available[krm] Internet Joker RogueAP Legitimate AP Batman

Rogue AP Application to hotspots Take advantage from traffic redirection Credentials interception Crypto MiM attack a Assisted registration Not very practical if not gifted with impressive 6th sense Internet Joker RogueAP Legitimate AP Batman a Who cares about that f**kin popup anyway?

Tracking authenticated clients Captive portal can only rely on network addresses for clients identification MAC address IP address Being able to spoof thoses addresses allows existing authorization takeover

MAC based authorization tracking Registered clients are identified by their MAC address MAC address is easy to spoof Batman MAC: Batman IP: Batman MAC: Batman IP: Joker Joker No MAC layer conflict on WiFi network Just need a different IP Access Point Internet Firewall

MAC based tracking practical bypass Change WiFi interface MAC address MAC spoofing joker# ifconfig wlan0 hw ether $MAC joker# ifconfig wlan0 $IP $NETMASK $BROADCAST joker# route add default $FIREWALL

IP based authorization tracking Registered clients are identified by their IP address IP address are just a little more tricky to spoof ARP cache poisoning helps redirecting traffic Traffic redirection allows IP spoofing So called Smart Spoofing a a See my LSM 2002 talk[bla02], arp-sk website[arps] for details Batman Access Point Traffic sorting Joker ARP cache poisoning on Batman IP Internet Joker spoofs Batman IP Firewall All traffic to Batman IP goes to Joker

IP based tracking practical bypass Smart spoofing IP spoofing joker# echo 1 > /proc/sys/net/ipv4/ip_forward joker# arp-sk -i ath0 -w -d $FIREWALL -S $BATMAN \ -D $FIREWALL joker# iptables -t nat -A OUTPUT -d! $LAN \ -j SNAT --to $BATMAN joker# iptables -t mangle -A FORWARD -d $BATMAN \ -j TTL --ttl-inc 1

MAC+IP addresses based authorization tracking Traffic Teh-Smart tracking technic? Batman Joker sorting Previous technic won t help because of MAC address checking ARP cache poisoning on Batman IP Send traffic with spoofed MAC address Access Point Internet ARP cache poisoning and IP spoofing for answers redirection Joker spoofs Batman MAC _and_ IP Firewall All traffic to Batman IP goes to Joker

Why does MAC+IP does not help either? Layer2 and Layer3 are close to independant Batman Joker Traffic sorting No correlation between ARP cache and filtering ARP cache poisoning on Batman IP Joker s MAC spoofed frames are accepted Access Point Internet Returning frames are sent with Joker s MAC address Firewall Joker spoofs Batman MAC _and_ IP All traffic to Batman IP goes to Joker

MAC+IP tracking bypass Joker uses ebtables[ebt] to have output frames spoofed MAC+IP spoofing joker# modprobe bridge joker# brctl addbr br0; brctl addif br0 ath0 [configure bridge interface br0] joker# ebtables -t nat -A POSTROUTING -o ath0 \ -d $FW_MAC -j snat \ --to-source $BATMAN_MAC Then IP spoofing can be done, performing Smarter spoofing :)

Demo Demo Captive portal bypass MAC+IP spoofing

Few other technics Misconfigurations DNS based communication[ozy] or tunneling[nstx] Administration network on the same VLAN, accessible through WiFi ESTABLISHED,RELATED -j ACCEPT prevents connections drop when authorization expires on Linux based systems Etc.

1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Dynamic routing Mesh networks relies on dynamic routing Neighbourhood discovery Network announces Link table Routing table Lots of networks use OLSR

Dynamic routing abuse No authentication/integrity measure Anybody can announce anything Scenario Use a powerful antenna Announce Internet connectivity Gather traffic from part of network Play with connections Internet Malicious announces

Dynamic routing abuse No authentication/integrity measure Anybody can announce anything Scenario Use a powerful antenna Announce Internet connectivity Gather traffic from part of network Play with connections Internet Malicious announces

Multipoint route injection One can just inject OLSR messages without being part of network to multiple links Route injection Includes neighbourhood Becomes more consistent Stays more stealth Can use arbitrary messages using Wifitap Internet Injected malicious announces

Agenda Bidirectional station isolation bypass 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Bidirectional station isolation bypass All known LAN attacks are available LAN attacks (ARP, DHCP, DNS, etc.) Traffic interception and tampering Direct station attacks Think of infamous personal firewalls exception for local network or loose firewall settings...

Bidirectional station isolation bypass 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Bidirectional station isolation bypass WiFi communication can be listened on the air Listen to WiFi traffic Spot interesting requests Inject your own crafted answers You ve done airpwn-like[airp] tool Applications : ARP spoofing, DNS spoofing, malicious data injection, etc. Server Internet Joker @Src = Server @Dst = Robin From-DS = 1 @Src = Robin @Dst = Server To-DS = 1 Robin

Demo Bidirectional station isolation bypass Demo DNS Spoofing Ping answering machine

Bidirectional station isolation bypass 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Stations isolation Bidirectional station isolation bypass Security feature that blocks traffic within BSS Usually known as station isolation Station sends To-DS frame AP sees destination is in BSS AP drops the frame No From-DS frame, so no communication a : stations can t talk to each other... a Does not work between 2 APs linked via wired network Batman To = Robin To-DS = 1 Batman To = Robin To-DS = 1 Access Point X Access Point Without PSPF To = Robin From-DS = 1 Robin With PSPF Robin

Isolation bypass using traffic injection Bidirectional station isolation bypass Joker Joker can inject From-DS frames directly No need for AP approval You can spoof about anyone You re still able to sniff traffic Traffic injection allows complete isolation bypass To = Batman From-DS = 1 Batman To = Robin To-DS = 1 X Access Point To = Robin From-DS = 1 Robin

Bidirectional station isolation bypass Bidirectionnal communication with injection Sending packets the ninja way Sending traffic directly to stations allows direct station to station communication, even if : Joker To = Robin From-DS = 1 AP applies restrictions AP refuses association AP is out of reach Batman To = Joker To-DS = 1 Robin Talking to stations the ninja way, without being associated To = Robin To-DS = 1 X X X To = Batman To-DS = 1

Attacking stations Proof of concept : Wifitap Bidirectional station isolation bypass Needed a PoC for Cisco PSPF bypass and wrote Wifitap Written in Python[PYTH] Relies on Scapy[SCAP] Uses tuntap device and OS IP stack Use WiFi frame injection and sniffing Wifitap allows communication with station despite of AP restrictions Wifitap works for mesh networks as well

Wifitap usage Bidirectional station isolation bypass #./wifitap.py -h Usage: wifitap -b <BSSID> [-o <iface>] [-i <iface> [-p]] [-s <SMAC>] [-w <WEP key> [-k <key id>]] [-d [-v]] [-h] -b <BSSID> specify BSSID for injection -o <iface> specify interface for injection -i <iface> specify interface for listening -s <SMAC> specify source MAC address -w <key> WEP mode and key -k <key id> WEP key id -d activate debug -v verbose debugging -h this so helpful output

Wifitap in short Bidirectional station isolation bypass How does it work? Sending traffic Read ethernet from tuntap Add 802.11 headers Set BSSID, From-DS and WEP if needed Inject frame over WiFi Receiving traffic Sniff 802.11 frame Remove WEP if needed and 802.11 Build ethernet frame Send frame through tuntap Attacker does not need to be associated (AP or Adhoc)

Wifitap in short Bidirectional station isolation bypass How does it work? Sending traffic Read ethernet from tuntap Add 802.11 headers Set BSSID, From-DS and WEP if needed Inject frame over WiFi Receiving traffic Sniff 802.11 frame Remove WEP if needed and 802.11 Build ethernet frame Send frame through tuntap Attacker does not need to be associated (AP or Adhoc)

Wifitap in short Bidirectional station isolation bypass How does it work? Sending traffic Read ethernet from tuntap Add 802.11 headers Set BSSID, From-DS and WEP if needed Inject frame over WiFi Receiving traffic Sniff 802.11 frame Remove WEP if needed and 802.11 Build ethernet frame Send frame through tuntap Attacker does not need to be associated (AP or Adhoc)

Demo Bidirectional station isolation bypass Demo Wifitap in action

Hotspots with isolation Bidirectional station isolation bypass Some hotspots implement isolation to prevent clients from attacking each other Does not protect against session hijacking Attacker must then to take over victim s session Victim does not have access anymore, and still pays for it And among all, it s pretty useless...

More hotspot bypassing... Bidirectional station isolation bypass Hijacking people authorization is not very kind Use Wifitap to bypass isolation Now you can route back his traffic to your victim Your victim and you are both able to surf transparently Now, you can be a true gentlemanly [h cr]acker [ISCD];)

Agenda 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

So you thought dropping the wire was that easy? No privacy, no integrity Public accesses are just so insecure Crackers do know about that

What do we do to fix that? Clients Open network services can t be trusted Open network traffic neither Think authentication, encryption, VPN Don t forget to tunnel DNS as well :) Infrastructure Considering WEP? Forget it! Consider real stuff : WPA/WPA2 w/eap Now supported on most devices/os

What do we do to fix that? Clients Open network services can t be trusted Open network traffic neither Think authentication, encryption, VPN Don t forget to tunnel DNS as well :) Infrastructure Considering WEP? Forget it! Consider real stuff : WPA/WPA2 w/eap Now supported on most devices/os

What do we do to fix that? Clients Open network services can t be trusted Open network traffic neither Think authentication, encryption, VPN Don t forget to tunnel DNS as well :) Infrastructure Considering WEP? Forget it! Consider real stuff : WPA/WPA2 w/eap Now supported on most devices/os

Thank you for your attention and... Greetings to... BCS Asia 2006 people, partners and sponsors EADS CRC/DCR/STI/C team Rstack.org team http://www.rstack.org/ MISC Magazine http://www.miscmag.com/ French Honeynet Project http://www.frenchhoneynet.org/ Download theses slides from http://sid.rstack.org/

Agenda Demos Bibliography 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Demos Bibliography 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Demos Demos Bibliography Captive portal bypass Bidirectional isolation bypass

Demos Bibliography 1 2 3 Bidirectional station isolation bypass 4 5 Demos Bibliography

Bibliography I Demos Bibliography [ABOB] Bernard Aboba, The Unofficial Web Page, http://www.drizzle.com/ aboba/ieee/ [BLA02] C. Blancher, Switched environments security, a fairy tale, 2002, http://sid.rstack.org/pres/0207 LSM02 ARP.pdf [BLA03] C. Blancher, Layer 2 filtering and transparent firewalling, 2003 http://sid.rstack.org/pres/0307 LSM03 L2 Filter.pdf [BLA06] C. Blancher, WiFi traffic injection based attacks, 2005-2006 http://sid.rstack.org/pres/0602 Securecon WirelessInject

Bibliography II Demos Bibliography [AIRP] Airpwn, http://www.evilscheme.org/defcon/ [ARPS] Arp-sk, http://sid.rstack.org/arp-sk/ [EBT] Ebtables, http://ebtables.sourceforge.net/ [KRM] Karma, http://theta44.org/karma/ [NSTX] Nstx, http://nstx.dereference.de/nstx/ [OZY] OzymanDNS, http://www.doxpara.com/ozymandns src 0.1.tgz [PYTH] Python, http://www.python.org/ [SCAP] Scapy, http://www.secdev.org/projects/scapy/

Bibliography III Demos Bibliography [WTAP] Wifitap, http://sid.rstack.org/index.php/wifitap EN [ISCD] ISC Handler s Diary, http://isc.sans.org/diary.php?date=2005-06-26