SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. E-mail: pro09020@fe.up.pt Dez 2009. Dez 2009 1



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless Networks. Welcome to Wireless

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WLAN and IEEE Security

WIRELESS NETWORKING SECURITY

Chapter 6 CDMA/802.11i

CS549: Cryptography and Network Security

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Wireless security. Any station within range of the RF receives data Two security mechanism

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

CS 356 Lecture 29 Wireless Security. Spring 2013

Security in IEEE WLANs

How To Secure Wireless Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Wireless LAN Security Mechanisms

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Wireless LAN Security: Securing Your Access Point

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Wireless Encryption Protection

WEP WPA WPS :: INDEX : Introduction :

Security in Wireless Local Area Network

Authentication in WLAN

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

The next generation of knowledge and expertise Wireless Security Basics

Your Wireless Network has No Clothes

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

WIRELESS SECURITY IN (WI-FI ) NETWORKS

CSC574: Computer and Network Security

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Vulnerabilities in WEP Christopher Hoffman Cryptography

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

MOHAMMAD YASIN ARASHPOUR

WPA Migration Mode: WEP is back to haunt you...

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Chapter 2 Wireless Networking Basics

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

ECE 4893: Internetwork Security Lab 10: Wireless Security

The Basics of Wireless Local Area Networks

Wireless Security for Mobile Computers

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Wi-Fi Client Device Security and Compliance with PCI DSS

GSM and UMTS security

Configure WorkGroup Bridge on the WAP131 Access Point

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Chapter 2 Configuring Your Wireless Network and Security Settings

Cipher Suites and WEP

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

WiFi Security Assessments

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

WLAN Authentication and Data Privacy

chap18.wireless Network Security

Wireless LAN Security I: WEP Overview and Tools

Advanced Security Issues in Wireless Networks

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Wireless Security: Token, WEP, Cellular

Security Awareness. Wireless Network Security

Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model


2. WLAN SECURITY MECHANISMS AND PROTOCOLS 1. INTRODUCTION

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

WEP WPA WPS :: INDEX : Introduction :

Wireless Local Area. Network Security

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Distributed Systems Security

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Configuring Security Solutions

Security in Wireless and Mobile Networks

ALL Mbits Powerline WLAN N Access Point. User s Manual

Tutorial 3. June 8, 2015

Transcription:

SSI Commons Wireless Protocols WEP and WPA2 Bertil Maria Pires Marques E-mail: pro09020@fe.up.pt Dez 2009 Dez 2009 1

WEP -Wired Equivalent Privacy WEPisasecurityprotocol,specifiedintheIEEEWireless Fidelity (Wi-Fi) standard, that is designed to provide a wireless local area network(wlan). Two types of authentication were introduced with the original 802.11 standard: Open and shared key authentication. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks. Whenintroducedin 1997,WEP wasintendedtoprovide confidentiality comparable to that of a traditional wired network. Dez 2009 2

WEP -Wired Equivalent Privacy The first function of 802.11 standard algorithm is to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. This function is not an explicit goal in the 802.11 standard, but it is frequently considered to be a feature of WEP. WEP relies on a secret key that is shared between a mobile station (eg. a laptop with a wireless ethernet card)andanaccesspoint(ie.abasestation)orbetween 2 mobile station. Dez 2009 3

WEP -Wired Equivalent Privacy The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit. The standard does not discuss how the shared key is established. WEP uses the stream cipher RC4 for confidentiality, and the CRC-32 checksum for integrity. Basic WEP encryption RC4 keystream XORed with plaintext Dez 2009 4

WEP -Wired Equivalent Privacy Problems!! WEP uses the RC4 encryption algorithm, which is known as a stream cipher. A stream cipher operates by expanding a short key into an infinite pseudo-random key stream. The sender XORs the key stream with the plaintext to produce ciphertext. The receiver has a copy of the same key, and uses it to generate identical key stream. XORing the key stream with the ciphertext yields the original plaintext. This mode of operation makes stream ciphers vulnerable to several attacks. Dez 2009 5

WEP -Wired Equivalent Privacy Identified Attacks Passive Attack to Decrypt Traffic A passive eavesdropper can intercept all wireless traffic, until an IV collision occurs. Active Attack to Inject Traffic An attacker knows the exact plaintext for one encrypted message. He can use this knowledge to construct correct encrypted packets Active Attack from Both Ends The attacker makes a guess not about the contents, but rather the headers of a packet. Table-based Attack The small space of possible initialization vectors allows an attacker to build a decryption table. Dez 2009 6

WPA -WiFiProtected Access Before WPA were in use, some companies tried to secure their WLANs by filtering MAC addresses and not broadcasting SSIDs. Following the weakness of WEP-based security, there was a period of interim security measures. Vendors such as Cisco, wanting to meet the demand for better security, developed their own systems while simultaneously helping to evolve the 802.11i standard. On the way to 802.11i, the TKIP (Temporal Key Integrity Protocol is a WPA feature used to ensure integrity in wireless data transmission) encryption algorithm was created, which waslinkedtowifiprotectedaccess-wpa-securitymethod. Dez 2009 7

WPA -WiFiProtected Access TKIP is the encryption method certified as WPA. It provides support for legacy WLAN equipment by addressing the original flaws associated with the 802.11 WEP encryption method. Itmakesuseoftheoriginalencryptionalgorithmusedby the original encryption algorithm used WEP. TKIP has two primary functions: ItencryptstheLayer2payload. It carries out a message integrity check (MIC) in the encrypted packet. This helps ensure against a message being tampered with. Dez 2009 8

WPA2 -WiFiProtected Access The standard that should be followed in most enterprise networks is the 802.11i standard. This is similar to the Wi-Fi Alliance WPA2 standard. In networks that have stricter security requirements, an additional authentication or login is required to grant clients such access. This login process is managed by the Extensible Authentication Protocol (EAP). EAP is a framework for authenticating network access. IEEE developed the 802.11i standard for WLAN authentication and authorization to use IEEE 802.1x. Dez 2009 9

WPA2 -WiFiProtected Access Dez 2009 10

WPA2 -WiFiProtected Access Dez 2009 11

WPA2 -WiFiProtected Access Two enterprise-level encryption mechanisms specified by 802.11i are certified as WPA and WPA2 by the Wi-Fi Alliance: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard(AES). The AES encryption of WPA2 is the preferred method, because it brings the WLAN encryption standards into alignment with broader IT industry standards and best practices, most notably IEEE 802.11i. AEShasthesamefunctionsasTKIP,butitusesadditionaldata from the MAC header that allows destination hosts to recognize if the non-encrypted bits have been tampered with. Italsoaddsasequencenumbertotheencrypteddataheader. Dez 2009 12

Wireless Protocol Overview Dez 2009 13

WEP ProtocolCracking.. Search for desired software. UseaWEPkeywith128bits. Turnoffwirelessinterfacetosoftwaretakecareofit: ifconfig wlan0 down Afterwewillmake: ifconfig wlan0 hw ether 00:00:00:00:23:24 (give a fake address Ethernet to cover the trail ) Dez 2009 14

WEP ProtocolCracking.. Verify the existing networks around: airodump-ng wlan0 Dez 2009 15

WEP ProtocolCracking.. We are only interested on IV pakages [-i ] the only ones with information WEP to crack [-t WEP] in channel 6 [-c6] and write on file named listagem [-w listagem] airodump-ng wlan0 -i -t WEP -c6 -w listagem Dez 2009 16

WEP ProtocolCracking.. Command result. Dez 2009 17

WEP ProtocolCracking.. Command to begin aircrack-ng listagem-01.ivs Dez 2009 18

To End WEP ProtocolCracking.. Dez 2009 19

WEP ProtocolCracking.. Some Conclusions: As result encryption and key have changed. When in listen Mode, several wireless cards were detectedinthearea. [Figurepage17] Listen time 15 hours(stayed overnight). There exist faster methods, but this one is the simplest and the least intrusive. ItiseasyfindwirelessnetworksWEP. Dez 2009 20

Curiosities found.. WhenresearchingontheInternet,Ifoundaboutthistopics: Brazilian books published Redes, Guia Prático Autor: Carlos E. Morimoto Páginas: 560 Formato: 23 x 16 cm Editora:GDH Presse Sul Editores ISBN: 978-85-99593-09-7 Lançado em: Abril de 2008.Ao longo do livro, você. Uso de utilitários de segurança para capturar tráfego da rede, detectar brechas e quebrar os sistemas de encriptação das redes wireless. Dez 2009 21

Curiosities found.. American magazine about haking Dez 2009 22

Wireless Protocols WEP/WPA/WPA2 Thankyou you, Anyquestions? Dez 2009 23