The BYOD PEAP Show. isec Partners



Similar documents
GPC JagTalk Secure Wireless Network. Connection Instructions

GSU JagTalk Secure Wireless Network. Connection Instructions

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check

How to Access Coast Wi-Fi

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

WIRELESS LAN SECURITY FUNDAMENTALS

Enrollment System THE AGING OF PEAP/MSCHAPV2: UNDERSTANDING THE DRIVERS OF OBSOLESCENCE

User Guide for eduroam

WiFi troubleshooting. How s your WiFi signal? Android WiFi settings. ios WiFi settings

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops

The Evil Twin problem with WPA2-Enterprise. Ludwig Nussel SUSE Linux Products GmbH

Setting up SJUMobile (Wireless Internet Access for personal devices)

Mac OS X Secure Wireless Setup Guide

Wireless Network Configuration Guide

Connec ng to Northwest s WIFI with Windows 7

6. After connecting reopen the wireless connections window. Right click on RamNet and select properties. Page 2 of 7

Authentication in WLAN

Wi-Fi in Healthcare:

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Configuring Windows 7 for eduroam at DkIT

Connecting to Secure Wireless (iitk-sec) on Fedora

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops

Eduroam wireless network Windows Vista

WiFi for mobile devices

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

How to Connect to UCO s Wireless Network on an Android Device

ClickShare Network Integration

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR

DIGIPASS Authentication for Cisco ASA 5500 Series

How to connect to the diamonds wireless network with Vista.

Network Services One Washington Square, San Jose, CA

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

How To Protect A Wireless Lan From A Rogue Access Point

Edith Cowan University Information Technology Services Centre

Eduroam wireless network Apple Mac OSX 10.4

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

Extension Wireless Access (EWA) v2.0

The Importance of Wireless Security

Wi- Fi settings for Windows XP

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0

Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet)

MC3WAVES Wireless Connection Wizard

PEAP: Pwned Extensible Authentication Protocol

Version 5 - July 2015 IT Services Page 2

Wi-Fi Client Device Security & HIPAA Compliance

Manual Configuration Instructions

Eduroam wireless network Apple Mac OSX 10.5

Workday Mobile Security FAQ

Wireless Security for Mobile Computers

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Creating and Installing a Self Signed Certificate for PEAP/EAP-TLS Authentication

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Pulse Policy Secure. Device Access Management Framework Feature Guide. Product Release 5.1. Published: Document Revision 1.

Configuring Eduroam in Windows Vista

govroam Web Interface User Guide

The following chart provides the breakdown of exam as to the weight of each section of the exam.

iphone in Business Security Overview

Workplace-as-a-Service BYOD Management

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows Vista

Connecting to UNOSECURE using Windows 7

Student BYOD - Olathe Public Schools

Wi-Fi Client Device Security and Compliance with PCI DSS

Application Note. Onsight Device Certificate Management

Security Guide. BES12 Cloud. for BlackBerry

Information Assurance Software with Reliable Access Client. Instructions

WIRELESS SETUP FOR WINDOWS 7

vwlan External RADIUS 802.1x Authentication

A Threat Analysis of The Extensible Authentication Protocol

Internet access system through the Wireless Network of the University of Bologna (last update )

BRING YOUR OWN DEVICE (BYOD)

ipads and iphone 5 Connecting your own device to school wifi

Massey University Wireless Network - Client

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

IT Quick Reference Guides Connecting to SU-Secure using Windows 8

ipad in Business Security

Configuring an Android device to access Staff Wi-Fi and .

How to configure Mac OS X Server

How To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An

Deploying and Configuring Polycom Phones in 802.1X Environments

Eduroam wireless network - Windows 7

Securing Wireless LANs with LDAP

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

IT user guide. Campus WiFi eduroam. September Information Services

Deploying iphone and ipad Virtual Private Networks

WPA2 Instructions for Blackberry Instructions for Installing BlackBerry Desktop Manager (BBDM) with Certificate Synchronization

Wireless computer access at K-State

Belnet Networking Conference 2013

CruzNet Secure Set-Up Instructions for Windows Vista

Canterbury College Eduroam Wi-Fi Guide

Windows Phone 8.1 in the Enterprise

OTC Student Wireless Network

Transcription:

The BYOD PEAP Show Mobile Devices Bare Auth Josh Yavor isec Partners DEF CON XXI August, Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome A Perfect Storm 1 1 noaa.gov Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome PEAP: Pwned Extensible Authentication Protocol Joshua Wright & Brad Antoniewicz - ShmooCon It s amazing to me that lots of people seemed to have missed this issue in PEAP and other EAP methods, as it s still extremely useful in most of the pen-tests I engage in. Joshua Wright, May 1 Windows and OS X FreeRADIUS-WPE PEAP and TTLS can be secure when deployed carefully 1 http://www.willhackforsushi.com/?page_id=37 Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Bring Your Own Device All the cool kids are doing it Growth %- % of companies Bring Your Own Definition EAP Types Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome CloudCracker Moxie Marlinspike, David Hulton, Marsh Ray - DEF CON XX Enterprises who are depending on the mutual authentication properties of MS-CHAPv for connection to their WPA Radius servers should immediately start migrating to something else. Moxie Marlinspike, July, 2 Divide and conquer = % in hours 2 https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/ Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Take Aways Spoiler Alert Real-world deployments are messy PEAP is unsafe for BYOD environments Impact is enormous Immediate corrective action required No easy fix Users are in control Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Bottom Line Defense Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Bottom Line Offense Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Some Disagree In a properly implemented wireless network, this MS-CHAPv exploit is a non-issue. There is no need for Wi-Fi network administrators to abandon PEAP. Period. 3 3 revolutionwifi.blogspot.com/ / /is-wpa -security-broken-due-to-defcon.html Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, /

Introduction Welcome Risk Characteristics Lower Risk Individual users (depends) Smaller organizations Static user base Higher Risk Internal network assets Larger organizations Transient user base

Introduction Welcome Misconfiguration is Everywhere Be cruel to your school

Introduction Welcome For Mobile Devices

Introduction Welcome Even for Windows

Introduction Prerequisite Knowledge PEAP Why is PEAP so popular? EAP Type Support ios Android Windows Phone BlackBerry PEAP Yes Yes Yes Yes EAP-TLS Yes Yes No Yes EAP-TTLS Yes Yes No Yes EAP-FAST Yes No No Yes

Introduction Prerequisite Knowledge Wireless Authentication Comparison Access Control Granularity Open WPA WPA Ent. None Group of users who know password Individual user accounts wifi? ok! getyourownwifi evaldoer / p

Introduction Prerequisite Knowledge Wireless Authentication Comparison Response to Credential Compromise Open WPA WPA Ent. N/A Change password, update all devices Modify single user account wifi? ok! getyourownwifi Error: User account locked

WPA Ent. &. X PEAP Association to AP.thisOneGoesTo

WPA Ent. &. X PEAP Outer Authentication Thanks to Brad & Joshua

WPA Ent. &. X PEAP Inner Authentication with MSCHAPv Thanks to Moxie

Mobile Platforms Mobile Platforms 2 2 ocio.osu.edu

Mobile Platforms Android Android

Mobile Platforms Android Android EAP Types

Mobile Platforms Android Android PEAP Configuration

Mobile Platforms Android Android CA Configuration

Mobile Platforms Android Android Inner Authentication

Mobile Platforms ios ios 3 3 apple.com

Mobile Platforms ios ios PEAP Configuration

Mobile Platforms ios ios CA Configuration

Mobile Platforms ios ios Cert Details

Mobile Platforms BlackBerry BlackBerry

Mobile Platforms BlackBerry BlackBerry EAP Types

Mobile Platforms BlackBerry BlackBerry PEAP Configuration

Mobile Platforms BlackBerry BlackBerry CA Configuration

Mobile Platforms Windows Phone Windows Phone 4 4 microsoft.com

Mobile Platforms Windows Phone Windows Phone PEAP Configuration

Mobile Platforms Windows Phone Windows Phone CA Configuration

Mobile Platforms Windows Phone Windows Phone Cert Details

Attacking PEAP Methodology Single Network Traditional attack Story time: - users, shared building >, users, campus Extra credit

Attacking PEAP Methodology Multiple Networks Curated Lists Geographical, industry, other? Story time: Industry Geographical Extra credit

Attacking PEAP Methodology All The Devices Everything (almost) Challenges Story time

Attacking PEAP It s Tool Time! Pwning Single target Multiple targets

Attacking PEAP It s Tool Time! Existing Tools FreeRADIUS-WPE hostapd & hostapd-wpe DD-WRT & OpenWrt

Attacking PEAP It s Tool Time! The Goal

Attacking PEAP It s Tool Time! What s Next? *WRT scripts *WRT integration hostapd-python-script 5 5 github.com/nims /hostapd-python-script

Attacking PEAP It s Tool Time! Getting Fancy Dynamic target selection GPS (wigle.net?) Single tool

Solutions How do we fix this? Hide yo kids, hide yo WiFi

Solutions How do we fix this? EAP-TLS Better Mobile Device Management

Solutions PEAP vs EAP-TLS Feature PEAP EAP-TLS Support Nearly Universal Nearly Universal Server Authentication Yes Yes User Authentication MSCHAPv Certificate Easy to Configure Yes No Easy to Manage Yes No

Solutions PEAP Mitigations Doing PEAP Right Mobile Device Management Custom CA vs Public CA Separate accounts

Solutions PEAP Mitigations Doing PEAP Right Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August 4, 2013 50 / 55

Demo DefConSecure Hacking the hackers

Demo Victims Needed Fair warning Turn off all of your WiFi devices if you do not wish to participate Targeting only DefConSecure No Man-in-the-Middle Username and MSCHAPv challenge/response collected Username and response displayed Brief Denial of Service Yes, I could crack your password later, but I know you didn t reuse an important one (right?) I expect to capture only a handful, but maybe we ll get lucky

Demo Additional Resources Windows Phone WiFi Configuration Guide - http://www.windowsphone. com/en-us/how-to/wp8/start/connect-to-a-wi-fi-network Apple ios WiFi Deployment Guide - http://images.apple.com/iphone/business/docs/ios_6_wifi_sept12.pdf Smart Phone WiFi Certifications - http://certifications.wi-fi.org/search_products.php?search=1&lang= en&filter_category_id=24&listmode=1 Android WPA Enterprise UI Bug - https://code.google.com/p/android/issues/detail?id=1386

Demo Thank Yous DEF CON isec Partners / NCC Group EFF The victims

Demo Josh Yavor Senior Security Engineer isec Partners https://www.isecpartners.com @schwascore