Wireless LAN Security I: WEP Overview and Tools



Similar documents
Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security in IEEE WLANs

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WLAN and IEEE Security

Wireless Networks. Welcome to Wireless

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Chapter 6 CDMA/802.11i

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wireless LAN Security Mechanisms

Wireless security. Any station within range of the RF receives data Two security mechanism

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Your Wireless Network has No Clothes

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

WiFi Security: WEP, WPA, and WPA2

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

WPA Migration Mode: WEP is back to haunt you...

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless LAN Security: Securing Your Access Point

Linux Access Point and IPSec Bridge

Chapter 2 Wireless Networking Basics

IEEE Wireless LAN Security Overview

WiFi Security Assessments

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

The Basics of Wireless Local Area Networks

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

The next generation of knowledge and expertise Wireless Security Basics

9 Simple steps to secure your Wi-Fi Network.

The Importance of Wireless Security

Security in Wireless Local Area Network

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

WIRELESS NETWORKING SECURITY

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

ECE 4893: Internetwork Security Lab 10: Wireless Security

Wireless Local Area. Network Security

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Security Awareness. Wireless Network Security

Topics in Network Security

CSC574: Computer and Network Security

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

WIRELESS SECURITY IN (WI-FI ) NETWORKS

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

United States Trustee Program s Wireless LAN Security Checklist

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Advanced Security Issues in Wireless Networks

Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Developing Network Security Strategies

Key Management (Distribution and Certification) (1)

Lecture 2 Secure Wireless LAN

Tutorial 3. June 8, 2015

Wireless Local Area Network Security Obscurity Through Security

Authentication in WLAN

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

CS 356 Lecture 29 Wireless Security. Spring 2013

Setting up a WiFi Network (WLAN)

Security in Wireless and Mobile Networks

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

Network Security Protocols

Distributed Systems Security

Chapter 2 Configuring Your Wireless Network and Security Settings

Network Access Security. Lesson 10

Network Security Concepts: Review

Transport Level Security

Wireless Security: Token, WEP, Cellular

Securing end devices

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

802.11b and associated network security risks for the home user

Recommended Wireless Local Area Network Architecture

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Network Security Best Practices

Transcription:

Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/ 19-1

Overview Wi-Fi Operation Wired Equivalent Privacy (WEP) Problems with WEP Attack tools 19-2

Wi-Fi Operation Station Access Point Access Points (APs) periodically broadcast a beacon with SSID (service set ID) and security level Subscriber stations listen to these beacons, measure signal strength and determine which AP to join Subscribers can also send a Probe to find AP s in the neighborhood AP authenticates the subscriber station using shared keys Subscriber stations and AP exchange encrypted packets Subscriber station send a Disassociate message and log off 19-3

MAC Address Filtering Access Point contains MAC addresses of user NICs (Network Interface Cards) Prevents from casual guests logging into the wireless network Problem: Easy to find good MAC addresses by sniffing and then address spoofing 19-4

Wired Equivalent Privacy (WEP) WEP Privacy similar to a wired network Intellectual property not exposed to casual browser Not protect from hacker First encryption standard for wireless. Defined in 802.11b Provides authentication and encryption Shared Key Authentication Single key is shared by all users and access points Two modes of authentication: Open system and Shared Key Shared Key: Challenge-response verifies client has the key Manual key distribution If an adapter or AP is lost, all devices must be re-keyed 19-5

WEP Keys Default Key: Also known as shared key, group key, multicast key, broadcast key. 40-bit or 104 bit. Static. Key mapping key: Also known as individual key, per-station key, unique key. Access points need to keep a table of keys. Not generally implemented. To allow smooth change over, two default keys are required (old and new). WEP allows 4 default keys. Keys are numbered 0..3. Can use different keys in two directions. Base key is combined with a 24-bit initialization vector (IV) Different key for each packet WEP does not specify how to select IV. Many vendors generate random IV. 19-6

WEP Details Each device has 4 static WEP keys 2-bit key ID sent w Initialization Vector (IV) in clear in each packet Per-Packet encryption key =24-bit IV + one of pre-shared key Encryption Algorithm: RC4 Standard: 24 + 40 = 64-bit RC4 Key Enhanced: 24 + 104 = 128 bit RC4 key WEP allows IV to be reused CRC-32 = Integrity Check Value (ICV) Data and ICV are encrypted under per-packet encryption key 802.11 Header Data CRC 802.11 Header IV Data ICV 19-7

WEP Encapsulation CRC-32 WEP Keys K1 K2 K3 K4 Data Xor ICV RC4 Keystream IV WEP Key MAC hdr IV Pad KID Cipher text CRC 19-8

WEP Decapsulation MAC hdr IV Pad KID Cipher text CRC WEP Keys K1 K2 K3 K4 Xor IV WEP Key Data ICV RC4 Keystream CRC-32 = No Fail Yes Success 19-9

Ron's Cipher 4 (RC4) Developed by Ron Rivest in 1987. Trade secret. Leaked 1994. Stream Cipher A pseudo-random stream is generated using a given key and xor'ed with the input Pseudo-random stream is called One-Time pad Key can be 1 to 256 octet See the C code in the textbook [KPS]. Encryption Key K Plain text data byte p Random byte b Pseudo-random # generator Cipher text data byte c 19-10

WEP Authentication Authentication is a via Challenge response using RC4 with the shared secret key. Station Response (Nonce RC4 encrypted under shared key) Access Point Challenge (Nonce) Decrypted nonce OK? 19-11

WEP Review Four 40-bit or 104-bit Keys are manually programmed in each subscriber station and AP A 24-bit IV and WEP key is used to form a 64b or 128b RC4 key A keystream is generated using the RC4 key A 32-bit CRC is added as Integrity check value (ICV) to the packet Plain text and keystream is xor ed. A 32-bit CRC is added in clear. 19-12

Problems with WEP Authentication Record one challenge/response Both plain text and encrypted text are available to attacker XOR the two to get the keystream Use that keystream and IV to encrypt any subsequent challenges Station Response (Nonce RC4 encrypted under shared key) Access Point Challenge (Nonce) Decrypted nonce OK? 19-13

Problem with Stream Cipher Consider two packets with the same IV Same keystream b c1 = p1 b; c2 = p2 b c1 c2=p1 p2 Two packets w same IV XOR = Difference in plain text 50% chance of using the same IV in 4823 packets. Recovered ICV matches Plain text is correct Possible to recover all 2 24 keystreams in a few hours 19-14

Problems with WEP ICV CRC is used as ICV CRC: Message polynomial is shifted and divided by CRC polynomial, the remainder is sent as CRC p = p n x n + p n 1 x n 1 + + p 0 x 0 Remainder(p+q, c) = Remainder(p, c) + Remainder(q, c) ICV is linear: ICV(p+q) = ICV(p) + ICV(q) Conclusion: XOR any CRC-32 valid plain text to encrypted packet. The modified packet will pass the ICV after decryption. 19-15

More WEP Problems No centralized key management Manual key distribution Difficult to change keys Single set of Keys shared by all Frequent changes necessary No mutual authentication No user management (no use of RADIUS) IV value is too short. Not protected from reuse. Weak integrity check. Directly uses master key No protection against replay 19-16

Attack Tools 1. Tools to find wireless networks 2. Tools to monitor traffic 3. Tools to analyze traffic 19-17

Wardriving Driving by in a car to find open Wi-Fi networks Based on "War Dialing" to dial all numbers to find modem pools A commonly used tools is netsumbler, http://netstumbler.com/ Also, Warstrolling and Warflying Warchalking: Signposting open access points on sidewalk or wall 19-18

Wardriving Tools See http://www.wardriving.com/code.php for a list of 40 wardriving tools Sample Network stumbler, http://netstumbler.com Kismet, http://kismetwireless.net Mac Stumbler, http://www.macupdate.com/info.php/id/8035 for Macs KisMAC, http://en.wikipedia.org/wiki/kismac BSD Airtools: A set of free BSD tools for FreeBSD dstumbler for wardriving - w GPS interface, http://www.bawug.org/howto/reviews/dstumbler.html Bootable CD from www.warbsd.com 19-19

Windows based Network Stumbler Records SSIDs and can interface with GPS Ministumbler runs on PDAs and pocket PCs 19-20

http://kismetwireless.net Kismet Linux-base wardriving tool Reads out names of networks as they are discovered (eye-free feature for drivers) Can dump printable strings (may include passwords) List of networks in a CSV file Dump of all packets Dump of packets with weak IV for WEP key finding 19-21

Wireless Sniffing Tools Public Domain: See list at http://wiki.personaltelco.net/wirelesssniffer Airsnort (Linux / BSD?), http://airsnort.shmoo.com Airosniff (FreeBSD), http://www.freewebs.com/blacknet/download.html APsniff (Windows), http://www.monolith81.de/apsniff.html Aerosol (Windows), http://www.monolith81.de/mirrors/index.php?path=aerosol/ Mognet (Java/Linux), http://www.monolith81.de/mognet.html Kismet (Linux), http://www.kismetwireless.net/ Wellenreiter, http://sourceforge.net/projects/wellenreiter/ 19-22

Wireless Sniffing Tools (Cont) wlandump (Linux-WLAN), http://www.linuxwlan.com/download.shtml WLAN Expert (Windows), http://www.vector.kharkov.ua/download/wlan/wlanexpert.zi p - More of a site survey tool Commercial: Airopeek, http://download.cnet.com/airopeek/3000-2651_4-14808.html AP Scanner (Mac), http://ap-scanner.mac.findmysoft.com/ Grasshopper, http://download.rhino3d.com/download_rel.asp?rel=427 - handheld wireless receiver Wireless Snif, www.ufasoft.com/sniffer/ More tools at http://www.wi-foo.com/index-3.html 19-23

Packet Analyzers Tcpdump, http://www.tcpdump.org/, command-line network analyzer for UNIX windump, http://www.winpcap.org/windump/, Windows version of tcpdump dsniff, http://www.monkey.org/~dugsong/dsniff/, captures passwords omnipeek, http://www.wildpackets.com/, packet analysis platform with plugin API snoop, http://en.wikipedia.org/wiki/snoop_%28software%29, command-line packet sniffer for Solaris Wireshark (aka Ethereal) (Linux or FreeBSD), http://www.wireshark.org Ngrep, http://ngrep.sourceforge.net/ -string matching in network traffic 19-24

Summary WEP uses RC4 stream cipher with a fixed set of keys Plain text is xor ed with a keystream Authentication challenge is sent in clear getting keystream is trivial CRC is used for integrity Easy to modify Plenty of tools to find WiFi APs, monitor and analyze traffic Process of finding open APs is called Wardriving 19-25

Acronyms AP Access Point API Application Programming Interface BSD Berkeley System Distribution CD Compact Disk CRC Cyclic Redundancy Check CSV Comma Separated Values ICV Integrity Check Value ID Identification IV Initialization Vector MAC Media Access Control RADIUS Remote Authentication of Dial-In Users Service RC4 Ron's Code #4 19-26

Acronyms (Cont) SSID UNIX WEP WLAN WPA XOR Service Set Identifier Named as a pun on MULTICS operating system Wired Equivalant Privacy Wireless Local Area Networks Wireless Protected Access Exclusive-Or 19-27

Read Reading Assignment Jesse Walker, Unsafe at any Key Size. An Analysis of the WEP Encapsulation, Oct 2000, http://www.dis.org/wl/pdf/unsafew.pdf Abdel-Karim R. Al Tamimi, Security in Wireless Data Networks : A Survey Paper, http://www.cse.wustl.edu/~jain/cse574-06/ftp/wireless_security/index.html Michale Roche, Wireless Hacking Tools, http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/index.html 19-28

References The following books are on 2-hour reserve at the WUSTL Olin Library: J. Edney and W.A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i, Addison- Wesley, 2004, 481 pp., ISBN:0321156209 Krishna Shankar, et al, "Cisco Wireless LAN Security," Cisco Press, 2005, 420 pp, ISBN:1587051540 See also, 802.11 Security links, http://www.wardrive.net/security/links 19-29