Introduction to WiFi security and Aircrack-ng. Thomas d Otreppe, Author of Aircrack-ng



Similar documents
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wifi Penetration. Wireless Communication and Computer/Network Forensics

MITM Man in the Middle

Wireless LAN Pen-Testing. Part I

Offensive Security. Wireless Attacks - WiFu

WEP WPA WPS :: INDEX : Introduction :

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Chapter 6 CDMA/802.11i

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

ALEXANDRE BORGES BLOG

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

WEP WPA WPS :: INDEX : Introduction :

IEEE Technical Tutorial. Introduction. IEEE Architecture

ECB GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

Chapter 2 Wireless Networking Basics

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

ENHWI-N n Wireless Router

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Basic processes in IEEE networks

Lecture 17: Wireless Networking"

Cisco Aironet Wireless Bridges FAQ

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Networks. Welcome to Wireless

The next generation of knowledge and expertise Wireless Security Basics

CS549: Cryptography and Network Security

Security in IEEE WLANs

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

CS 356 Lecture 29 Wireless Security. Spring 2013

Wireless g CF Card User Manual

CWNA Instructor Led Course Outline

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

WiFi Security Assessments

PENETRATION TESTING ON A WIRELESS NETWORK.

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Wiereless LAN

The Wireless Network Road Trip

Advanced Security Issues in Wireless Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

2.4GHz n Outdoor CPE Model:WLAN-LCCPE28-1

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment.

How To Analyze The Security On An Ipa Wireless Sensor Network

Tube-U(G) Long-Range Outdoor IEEE g USB Adapter User s Guide

Authentication in WLAN

Long-Range 500mW IEEE g Wireless USB Adapter. User's Guide

Chapter 7 Low-Speed Wireless Local Area Networks

Wireless Hacking Haifux. Wireless Hacking. Edri Guy. Mar 04,2013. See-Security. Mar Wireless Hacking - Haifux

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

WUA Mbps Wireless USB Network Adapter

A Technical Tutorial on the IEEE Protocol

Chapter 2 Wireless Settings and Security

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

EWLEA a/b/g/n WLAN MiniPCI Express card

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

... neither PCF nor CA used in practice

Wireless LAN Security Mechanisms

A6210 WiFi USB Adapter ac USB 3.0 Dual Band User Manual

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Wireless Network Risks and Controls

WPA Migration Mode: WEP is back to haunt you...

802.11n a/b/g wifi 3x3 mini-pci module, MB82/AR9160+AR9106. Model: DNMA-83

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

Cryptanalysis of IEEE i TKIP

USER GUIDE Cisco Small Business

Wireless Technology Seminar

GTER 26 tudo o que você. quer saber sobre n

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

750Mbps ac Wireless Broadband Router

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Huawei WLAN Authentication and Encryption

User s Manual. Wireless LAN Access Point. Model No.: SP918GK

Golden N Wireless Mini USB Adapter. Model # AWLL6075 User s Manual. Rev. 1.2

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

CSC574: Computer and Network Security

Wireless Troubleshooting

Concurrent 2.4 and 5 GHz Performance. Backward Compatible. Fast Roaming through 802.1X PMK Caching. Power over Ethernet Port. Secure Communications

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

Attacks against the WiFi protocols WEP and WPA

S /3133 Networking Technology, laboratory course A/B

Cisco Aironet 1130G Series IEEE g Access Point

Wireless Network Standard and Guidelines

Wi-Fish Finder: Who will bite the bait?

Section 1 Wireless Packet Captures & Connection Analysis- A Review

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

OpenWIPS-ng A modular and Open source WIPS. Thomas d Otreppe, Author of Aircrack-ng

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

TL-WN310G 54M Wireless CardBus Adapter

Transcription:

Introduction to WiFi security and Aircrack-ng Thomas d Otreppe, Author of Aircrack-ng 1

~# whoami Author of Aircrack-ng and OpenWIPS-ng Work at NEK Advanced Securities Group 2

Agenda IEEE 802.11 Wifi Networks Wireless Frames Network interaction Choose hardware Aircrack-ng suite 3

IEEE 802.11 Institute of Electrical and Electronics Engineers Leading authority Split in committees and working groups 802 committee: Network related norms.11 working group: Wireless LAN Texts available for download 4

802.11 Protocols Lots of them Main protocols: 802.11 802.11a/b/g/n/ac 802.11i 5

802.11 Standard released in 1997 Rates: 1-2Mbit Infrared/Radio (DSSS/FHSS) CSMA/CA 6

802.11b Amendment CCK coding New rates: 5.5 and 11Mbit 2.4GHz ISM band 14 overlapping channels 22MHz channels 7

8 802.11b (2)

802.11a 5GHz band More expensive => less crowded More than 14 channels (no overlap) OFDM Max rate: 54Mbit 9

802.11g ~= 802.11a on 2.4GHz Backward compatible with 802.11b 10

802.11n Work started in 2004 Final: September 2009 Single user MIMO 2.4GHz and 5GHz 40/80MHz channels MCS rates - http://mcsindex.com Greenfield mode 11

12 802.11n (2)

802.11ac Ran out of single letters, hence why 2 letters First draft: January 2011 5GHz only Multi user MIMO Different MCS rates Up to 1Gbit/s+/user 80/160MHz channels 13

14 802.11ac MCS rates 1x1

802.11 Networks 3 main modes of wireless operations Infrastructure WDS Ad Hoc Monitor Mode 15

16 802.11 Networks - Infrastructure

17 802.11 Networks - WDS

18 802.11 Networks Ad Hoc

802.11 Frames Frame format 3 Types of frames Management Control Data 19

20 802.11 Frame

802.11 Frame ToDS/FromDS fields ToDS FromDS Address 1 Address 2 Address 3 Address 4 0 0 DA SA BSSID 0 1 DA BSSID SA 1 0 BSSID SA DA 1 1 RA TA DA SA DA: Des.na.on Address RA: Recipient Address SA: Source Address TA: Transmi:er Address BSSID: Basic Service Set Iden.fier MAC of the Access Point 21

802.11 Frames Management Frames Type Subtype Meaning 0 0 Associa.on Request 0 1 Associa.on Response 0 2 Reassocia.on Request 0 3 Reassoca.on Response 0 4 Probe Request 0 5 Probe Response 0 6 Measurement Pilot 0 7 Reserved 22

802.11 Frames Management Frames (2) Type Subtype Meaning 0 8 Beacon 0 9 ATIM 0 10 Disassocia.on 0 11 Authen.ca.on 0 12 Deauthen.ca.on 0 13 Ac.on 0 14 Ac.on No ACK 0 15 Reserved 23

802.11 Frames Control Frames Type Subtype Meaning 1 0-6 Reserved 1 7 Control Wrapper 1 8 Block ACK request 1 9 Block ACK 1 10 PS Poll 1 11 RTS 1 12 CTS 1 13 ACK 1 14 CF End 1 15 CF End + CF ACK 24

802.11 Frames Data Frames Type Subtype Meaning 2 0 Data 2 1 Data + CF ACK 2 2 Data + CF Poll 2 3 Data + CF ACK + CF Poll 2 4 Null Func.on (no data) 2 5 CF ACK (no data) 2 6 CF Poll (no data) 2 7 CF ACK + CF Poll (no data) 25

802.11 Frames Data Frames (2) Type Subtype Meaning 2 8 QoS data 2 9 QoS data + CF ACK 2 10 QoS data + CF Poll 2 11 QoS data + CF ACK + CF Poll 2 12 QoS Null (no data) 2 13 Reserved 2 14 QoS CF Poll (no data) 2 15 QoS CF ACK (no data) 26

Network interaction Connection to a network Open networks WEP networks WPA networks 27

28 Network interaction

Network interaction Open Networks Network_Interaction.pcap 29

Network Interaction - WEP Wired Equivalent Privacy RC4 24 bit Initialization Vector Key Scheduling Algorithm Pseudo Random Generation Algorithm CRC32 30

31 Network Interaction WEP - Encrypt

32 Network Interaction WEP - Decrypt

33 Network Interaction WEP

Network Interaction WPA IEEE created 802.11i working group when WEP flaws discovered 2 Link layer protocols TKIP -> WPA1 CCMP -> WPA2 2 flavors Personal: PSK Enterprise 34

Network Interaction WPA WPA 1 Based on 3 rd draft of 802.11i Uses TKIP Backward compatible with old hardware WPA 2 802.11i Uses CCMP (AES) Not compatible with old hardware 35

36 Network Interaction WPA PSK

37 Network Interaction WPA Authentication

38 Network Interaction WPA GTK

Network Interaction WPA PTK Construction 39

Network Interaction WPA Encryption and data integrity TKIP: MIC + ICV CCMP MIC 40

Choosing hardware Wireless adapter Antenna Omni vs directional Antenna pattern Some math 41

Choose a card Recommended chipsets Atheros (Internal/PCI/Cardbus/Expresscard) Realtek 8187 Ralink (802.11n) Better if with an antenna connector How to find the chipset? Sometimes advertised Run Linux and use airmon-ng/dmesg/lspci/lsusb Through Windows driver 42

Choose an antenna Omni/directional Bigger!= Better Different gain = different RF propagation Omnidirectional: Radiate in all directions, like a light bulb Directional: Radiate in a single direction, like a camera zoom 43

44 Choose an antenna Omnidirectional

45 Choose an antenna Omnidirectional (2)

46 Choose an antenna Omnidirectional (3)

47 Choose an antenna Directional

48 Choose an antenna Directional (2)

Choose an antenna - Math db measures signal against normalized value: 1mW db power = 10 * log (signal / reference) How much db is 100mW? 10* log(100mw/1mw) = 20dBm 49

Choose an antenna dbm - mw A 3dB increase = 2 times the power dbm mw 0 1 10 10 15 32 17 50 20 100 23 200 27 512 30 1000 50

Choose an antenna Cables/connectors Cables & connectors add loss If broken, even more Adapters: ~0.5db Cables: depends on thickness 51

Choose an antenna - Exercise Example with an antenna and then add a cable (real values) Alfa AWUS036H: 500mW Antenna: 5dB Cable: RG58, 2 meters (~1dB/meter) 52

Aircrack-ng suite What is it? Different tools Installation Drivers installation 53

Aircrack-ng suite What is it? Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. Lots of scripts use it Important to know the tools to correctly use the scripts 54

55 Airmon-ng

56 Airodump-ng

57 Aireplay-ng

Packetforge-ng Generates WEP encrypted frame (ping/arp/ ) Requires keystream (XOR file) 58

59 Aircrack-ng

60 Airbase-ng

Airdecap-ng Decrypt captures (WEP/WPA) Confirm key/passphrase 61

Other tools Airolib-ng Airtun-ng Ivstools Etc Scripts Airgraph-ng Airoscript-ng Etc 62

Aircrack-ng - Installation Compilation of stable or latest devel is the same Requirements: Gcc/make: build-essential OpenSSL development: libssl-dev or openssl-dev Optional: SQLite development package 63

Aircrack-ng Installation (2) make && make install Options: unstable: easside-ng, tkiptun-ng, etc: sqlite: Airolib-ng Can be combined: make sqlite=true unstable=true make sqlite=true unstable=true install 64

Aircrack-ng Compat-wireless Up to date wireless drivers for stable kernels No need to patch it anymore Most cases: Latest version I ve heard funny names for it ;) Compact wireless Combat wireless 65

Aircrack-ng Compat-wireless (2) Requires Kernel headers/sources Gcc/make Download latest stable Two step installation process 1. make 2. make install Sometimes install firmware 66

Break 15 minutes break 67

Exercises WEP With client Without client WPA With client Without AP 68

Exercises Important notes Kill network managers/other software using the card to avoid issues Target: ESSID: aircrackng 69

Exercise WEP Cracking With client 1. Put the card in monitor mode 2. Identify network 3. Record traffic on fixed channel 4. Deauth client Will generate ARP ARP will be replayed 5. Crack capture file 70

Exercise WEP Cracking Without client 1. Put the card in monitor mode 2. Identify network 3. Record traffic on fixed channel 4. Fake client Fake authentication Several options ARP Replay Interactive frame replay Chopchop Fragmentation 5. Crack capture file 71

Exercise WPA Cracking Hard and easy to crack Easy: just get the handshake Hard: Need to be close to target(s) Passphrase length: 8-63 chars No real client => No handshake => No cracking 72

Exercise WPA Cracking With AP 1. Put the card in monitor mode 2. Identify network 3. Deauth client or wait for connection 4. Crack the capture 73

Exercise WPA Cracking Without AP 1. Put the card in monitor mode 2. Identify client through probes 3. Start airbase-ng in WPA mode 4. Crack capture file 74

75

Links - Contact Learn more: http://aircrack-ng.org http://www.nekasg.com 2 day training @ DerbyCon: http://www.derbycon.com 802.11 Wireless Networks, Matthew Gast Contact: tdotreppe@aircrack-ng.org thomas.dotreppe@nekasg.com Business cards are on the desk 76