DEVELOPING A WIRELESS PENETRATION TESTING TOOL IN LINUX PLATFORM NOR ARLIZA BINTI ABDULLAH



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

The next generation of knowledge and expertise Wireless Security Basics

Wireless Pre-Shared Key Cracking (WPA, WPA2)

CS 356 Lecture 29 Wireless Security. Spring 2013

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Chapter 6 CDMA/802.11i

WiFi Security Assessments

chap18.wireless Network Security

9 Simple steps to secure your Wi-Fi Network.

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Industrial Communication. Securing Industrial Wireless

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Certified Wireless Security Professional (CWSP) Course Overview

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Car Rental Management System (CRMS) Lee Chen Yong

Wireless security. Any station within range of the RF receives data Two security mechanism

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

Implementing Security for Wireless Networks

Building secure wireless access point based on certificate authentication and firewall captive portal

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

WEP WPA WPS :: INDEX : Introduction :

WLAN Authentication and Data Privacy

Huawei WLAN Authentication and Encryption

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The Importance of Wireless Security

Wireless Security for Mobile Computers

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Security in Wireless Local Area Network

Wireless LAN Security Mechanisms

Chapter 3 Safeguarding Your Network

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA

Chapter 2 Wireless Networking Basics

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Wireless Network Standard and Guidelines

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Network Security Best Practices

Chapter 2 Configuring Your Wireless Network and Security Settings

ALL Mbits Powerline WLAN N Access Point. User s Manual

CS549: Cryptography and Network Security

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

How To Manage An Wireless Network At A University

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Recommended Wireless Local Area Network Architecture

Advanced Security Issues in Wireless Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Secure Wireless Networks

Wireless Encryption Protection

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

The following chart provides the breakdown of exam as to the weight of each section of the exam.

WIRELESS SECURITY IN (WI-FI ) NETWORKS

How To Secure A Wireless Network With A Wireless Device (Mb8000)

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Configure WorkGroup Bridge on the WAP131 Access Point

Authentication in WLAN

WLAN Information Security Best Practice Document


Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Securing your Linksys WRT54G

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

MITM Man in the Middle

P r o t o l ck w fi ma a n ger User s Guide

Chapter 2 Wireless Settings and Security

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Performance evaluation of wireless networks speed depending on the encryption

Wireless Technology Seminar

Securing Wireless LANs with LDAP

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Computer Networks. Secure Systems

Wireless Networks. Welcome to Wireless

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Wireless LAN Security: Securing Your Access Point

Particularities of security design for wireless networks in small and medium business (SMB)

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

Transcription:

DEVELOPING A WIRELESS PENETRATION TESTING TOOL IN LINUX PLATFORM NOR ARLIZA BINTI ABDULLAH This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Computer Networking) FACULTY OF INFORMATION TECHNOLOGY AND COMMUNICATION UNIVERSITI TEKNIKAL MALAYSIA MELAKA 2013

i DECLARATION I hereby declare that this project report entitled DEVELOPING A WIRELESS PENETRATION TESTING TOOL IN LINUX PLATFORM is written by me and is my own effort and that no part has been plagiarized without citations. STUDENT : Date: (NOR ARLIZA BINTI ABDULLAH) SUPERVISOR : Date: (DR.WAHIDAH BINTI MD SHAH)

ii DEDICATION Alhamdulillah and praise to Allah S.W.T, with His will, I able to complete this project successfully. This dissertation is dedicated to my beloved parents Hj. Abdullah bin Ahmad and Hjh. Shuaini binti Suib who have supported me all the way since the beginning of my study and always supporting me. I also want to thank my supervisor Dr.Wahidah binti Md Shah for the guidance and encouragement for me during conducting this project.

iii ACKNOWLEDGEMENT Firstly, I would like to express my gratitude to God for all the understanding during these three years in gathering and compiling this project. I also would like to thank my parents for keep praying and supporting and never let me give up in my study. I also would like to thank my Projek Sarjana Muda supervisor, Dr.Wahidah binti Md Shah for sacrificing her valuable time to assist me and thanks for her comments, motivations and idea and encouragement during this semester. I also would like to thank my classmates who encourage me to accomplish this project and willing to help if their help is needed. Finally, I would like to thank and appreciate all individuals who directly or indirectly took part in making this project successful.

iv ABSTRACT Wireless Local Area Network (WLAN) has been popular and more preferred by the users compared to wired ones. This is because wireless has more advantages compared to wired technology such as more cost effective and mobility issue. The disadvantage of using wireless technology is it has high risk of the threat. This research is focused on wireless fidelity (wifi) keys. There are three encryption types for wireless security which are Wired Equivalent Protocol (WEP), Wireless Protected Access (WPA) and Wireless Protected Access 2 (WPA2). This project was proposed to help to carry out wifi penetration testing. This penetration testing was conducted to determine wireless vulnerabilities in these three encryption types and to study the differences between them. The contribution of this project is to guide to carry out penetration testing and as an exposure on how the attack had been done by the crackers.

v ABSTRAK Rangkaian tanpa wayar telah menjadi popular dan menjadi pilihan oleh pengguna berbanding rangkaian dengan wayar. Ini kerana rangkaian tanpa wayar memberi lebih banyak faedah jika dibandingkan dengan teknologi rangkaian dengan wayar seperti ia lebih murah dan tidak membataskan pergerakkan. Kelemahan penggunaan rangakaian tanpa wayar adalah ia lebih berisiko. Kajian ini tertumpu kepada kekunci rangkaian tanpa wayar. Terdapat tiga jenis enkripsi untuk rangkaian tanpa wayar iaitu Wired Equivalent Protocol (WEP), Wireless Protected Access (WPA), dan Wireless Protected Access 2 (WPA2).. Projek ini telah dicadangkan untuk membantu memudahkan ujian penembusan rangkaian tanpa wayar. Ujian penembusan ini dijalankan bertujuan utuk mengenalpasti kelemahan yang ada pada ketiga-tiga jenis enkripsi ini serta mengkaji perbezaan di antara ketiga-tiga jenis enkripsi ini. Sumbangan projek ini adalah untuk member panduan untuk menjalankan ujian penembusan dan mendedahkan bagaimana serangan keatas rangkaian dilakukan oleh penggodam.

vi TABLE OF CONTENTS DECLARATION... i DEDICATION... ii ACKNOWLEDGEMENT... iii ABSTRACT... iv ABSTRAK... v LIST OF TABLES... ix LIST OF FIGURES... x LIST OF ABBREVIATIONS... xii CHAPTER 1 INTRODUCTION 1.1 Introduction... 1 1.2 Problem Statements... 3 1.3 Objectives... 5 1.4 Scope... 6 1.4.1 Software... 7 1.4.2 Hardware... 8 1.5 Expected Output... 9 1.6 Report Organization... 9 1.7 Conclusion... 9 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction... 10 2.2 Related work... 11 2.2.1 Vulnerabilities of Wifi... 12 2.2.1.1 Wired equivalent privacy (WEP)... 12

vii 2.2.1.2 Wi-Fi Protected Access (WPA)... 17 2.2.1.3 Wi-Fi Protected Access version 2 (WPA2)... 20 2.2.2 Differences of encryption mechanism... 22 2.2.3 Penetration testing... 25 2.3 Analysis of current problem... 25 2.3.1 Security issue... 26 i) WEP security issue... 26 2.4 Proposed solution... 29 2.5 Conclusion... 31 CHAPTER 3 METHODOLOGY 3.1 Introduction... 32 3.2 System model analysis... 32 3.2.1 Incremental and Iterative model... 33 3.3 Project Phase... 35 3.4 Conclusion... 36 CHAPTER 4 DESIGN AND IMPLEMENTATION 4.1 Introduction... 37 4.2 High level design... 38 4.2.1 System Architecture... 38 4.2.2 System flowchart... 40 4.2.3 Use Case Diagram... 42 4.2.4 UML Statechart diagram... 44 4.3 Project Requirements... 45 4.3.1 Software Requirements... 45 i) Virtual Machine (VMWare Workstation)... 45

viii ii) Backtrack operating system... 46 4.3.2 Hardware Requirements... 46 i) Laptop... 46 ii) Wireless access point... 46 iii) USB wifi adapter (AZTEC Wireless-N WL568USB Adapter)... 47 4.4 Implementation... 47 4.4.1 Software Development Environment Setup... 47 4.4.2 Software Configuration Management... 48 4.5 Conclusion... 49 CHAPTER 5 TESTING AND ANALYSIS 5.1 Introduction... 50 5.2 Testing procedure... 50 5.3 Testing Result... 52 5.3.1 WEP decryption... 52 5.3.2 WPA decryption... 57 5.3.3 WPA2 decryption... 62 5.4 Result analysis... 66 5.5 Conclusion... 70 CHAPTER 6 CONCLUSION 6.1 Introduction... 71 6.2 Future work... 71 6.3 Limitation... 72 6.4 Conclusion... 72 REFERENCES... 73 APPENDIX... 75

ix LIST OF TABLES Table 1.1: Problem Statement 4 Table 1.2 Research Problem..4 Table 1.3: Objective...6 Table 2.1: Comparison of WEP, WPA, and WPA2.24 Table 2.2: Security issue in encryption mechanism.28 Table 5.1: Description in console.54 Table 5.2: Target network....66 Table 5.3: Time taken for decryption...67 Table 5.4: Number of tested keys.68 Table 5.5: Password feature.69

x LIST OF FIGURES Figure 2.1: Encryption Process.13 Figure 2.2: WEP encryption process 14 Figure 2.3: Open authentication...16 Figure 2.4: Shared key authentication..16 Figure 2.5: WPA2 Authentication process... 22 Figure 2.6: Commands line..30 Figure 3.1: Incremental and Iterative model 34 Figure 4 1: System architecture.... 39 Figure 4.2: System flowchart...........41 Figure 4.3: Use Case diagram..43 Figure 4.4: UML Statechart diagram...44 Figure 4.5: Implementation..48 Figure 5.1: Script flow..51 Figure 5.2: Monitor mode. 52 Figure 5.3: Airodump-ng mon0 terminal.53 Figure 5.4: User target s network.55 Figure 5.5: Generate packet process.56 Figure 5.6: WEP key decrypted 56 Figure 5.7: Airodump-ng command for WPA.57

xi Figure 5.8: Airodump-ng channel 1.58 Figure 5.9: WPA handshake for nurul_wifi.59 Figure 5.10: Airodump-ng command for WPA...60 Figure 5.11: WPA decrypted key.61 Figure 5.12: Target WPA2 network.62 Figure 5.13: WPA network s information 63 Figure 5.14: Decrypted key for FluffyBoy network.63 Figure 5.15: WPA handshake...64 Figure 5.16: Passphrase not in dictionary.65 Figure 5.17: Time taken for decryption graph..67 Figure 5.18: Tested key graph..68

xii LIST OF ABBREVIATIONS AES - Advance Encryption Standard AP - Access point BSSID - Broadcast service set identifier CCMP - Cipher Block Chaining Message Authentication Code Protocol CIA - Confidentiality Integrity Authentication CPU - Central Processing Unit EAP - Extensible Authentication Protocol GUI - Graphical user interface GTK - Group Temporal Key ICV - Integrity check value ISP - Internet Service Provider IV - Initialization vector IEEE - Institute of Electrical and Electronics Engineer MAC - Media access control MPDU - Medium Access Control Protocol Data Unit MSDU - Medium Access Control Service Data Unit MIC - Message Integrity Code OS - Operating system PC - Personal computer

xiii PMK - Pair Master Key PSK - Pre-Shared Key PRNG - Pseudo Random Number Generator RADIUS - Remote Authentication Dial-In User Service RAM - Random Access Memory SDLC - System Development Life Cycle SSID - Service set identifier TKIP - Temporal key Integrity Protocol TLS - Transport Layer Security WAP - Wireless access points WEP - Wired Equivalent Privacy WPA - Wireless Protected Access WPA2 - Wireless Protected Access version 2 Wifi - Wireless Fidelity WLAN - Wireless Local Area Network

1 CHAPTER 1 INTRODUCTION 1.1 Introduction Two decades years back, it was hardly anyone heard of wireless internet. Nowadays, our technology devices mostly are wireless network-enabled devices. In wireless local area network (WLAN), big issues are associated with the security problems. According to Choi,M.K., et. al, the wireless signal of WLAN is broadcast in all directions through the air using radio frequencies [8]. The risk of interception is higher than compared with wired network and unauthorized people can easily capture the data transmitted illegally by exploit wireless vulnerability. Thus, wireless network is not a really secure connection. Referring to H,Halapacz, he stated that WLANs are increasingly used because of mobility, affordable prices for wireless devices, and convenience issue [10]. To test our wireless network security, we need to carry out penetration testing. Penetration testing or pen-test is an alternative to determine wifi network security by stimulating an attack from malicious outsiders which is unauthorized access. Before this, the penetration testing is carried out with command lines entered manually one by one.

2 Since there are a lot of commands, it will be inconvenient to enter manually. Therefore, this project is developed to ease the testing. The wide range of wifi usage emphasizes importance of having a secure network. In order to secure the network, mostly encryptions are likely to be used are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA/WPA2). This encryption will allow the data transmitted within network being encrypted. Security also interrelated with the security key or password. The password strength is determined by password complexity. The stronger the user s password strength caused difficulty for attacker to break the key. The Backtrack Linux distribution is built for computer security enthusiasts and pen-tester. This tool is developed using scripting language. This project is developed to study the vulnerability of wifi security encryption. Then, this project also developed to study the different of encryption mechanism used in WEP and WPA2. This bash script allowed few commands typed manually to be executed automatically. All the detail is discussed in this chapter.

3 1.2 Problem Statements 1. Lack of information on factors that lead to vulnerability of the wifi security mechanism which cause difficulty to ensure their wifi security on top level The vulnerability in the encryption mechanisms can be deployed to penetrate the network. Lack of information on factors that cause it leads to the penetration testing. 2. Lack of information on the difference between WEP and WPA2 Difficulty to differentiate between WEP and WPA2 encryption because of lack of information. The mechanisms used in these encryption types vary in a few aspects such as key length. The effectiveness of the mechanisms can only be known once the testing are done. 3. Difficulty using command lines entered manually to carry out this penetration testing for checking their wifi security purpose. Entering each command lines manually cause difficulty. If there is even small mistake in the command line, the command might be fail to be executed. So this project is developed to ease to carry out penetration testing.

4 Table 1.1: Problem Statement No Problem Statement RP1 Lack of information on factors that lead to vulnerability of the wifi security mechanism which cause difficulty to ensure their wifi security on top level. RP2 Lack of information on the difference between WEP and WPA2. RP3 Difficulty using command lines entered manually to carry out this penetration testing for checking their wifi security purpose. Table 1.2 : Research Problem RP RQ Research questions RP1 RQ1 What are the factors that cause vulnerability of wireless security mechanism? RP2 RQ2 What are the differences of mechanism used in WEP and WPA2? RP3 RQ3 How to ease the users to carry out the penetration testing for their wireless networks in more convenient way rather than enter each command line manually?

5 1.3 Objectives This project embarks on the following objectives: 1. To study the vulnerability of wifi security encryption type which is not exposed to the users such as weakness of encryption algorithm. 2. To discover the differences of encryption mechanism in WEP and WPA2. 3. To develop a penetration tool for wireless penetration testing which assist user to carry out the testing.

6 Table 1.3: Objective RP RQ RO Objectives RP1 RQ1 RO1 To study the vulnerability of wifi security encryption type which is not exposed to the users such as weakness of encryption algorithm. RP2 RQ2 RO2 To discover the differences of encryption mechanism in WEP and WPA2. RP3 RQ3 RO3 To develop a penetration tool for wireless penetration testing which assist user to carry out the testing 1.4 Scope The scope for this project includes: This project focuses on wireless LAN security. The users of this project are network administrator. Since they have been exposed to ethical work and company policy, it can prevent them from doing unethical thing. This project is a creation of bash script in Linux operating system. This tool will only work if it meets the all the requirement. In this section, all software and project requirement are described. For example, this system worked if wireless adapter used that support aircrack suite.

7 1.4.1 Software i) Virtual machine software (VMWareWorksation) Virtual machine enables users to set up multiple virtual machine (VMs). It allowed multiple virtual machines to be used concurrently along with the actual machine. Each virtual machine can execute its own operating system, such as Linux, Solaris and Microsoft Windows. VMware Workstation allows one physical machine to run multiple operating systems simultaneously. This software is developed and sold by VMWare.Inc. ii) Backtrack operating system In order to install Backtrack operating system, it needs a USB with minimum space of 4GB. The tool will be developed in Backtrack Linux operating system. Backtrack is a penetration testing Linux distribution which is your one-stop shop for learning penetration testing. Backtrack Linux is designed with the purpose of using it in penetration testing. In this operating system, bash script created contain all commands necessary for wireless penetration testing.

8 1.4.2 Hardware i) Laptop The laptop used in this project has been installed 3 GB random access memory (RAM), with 32-bit architecture. This laptop running on windows 7 platform with the processor Intel Core 2 Duo processor T6600 central processing unit (CPU) running at cpu minimum 2.20 GHz. ii) Wireless access point Wireless access point (APs or WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals and support Wi-Fi wireless communication standards. iii) USB wifi adapter (AZTEC Wireless-N WL568USB Adapter) This wifi dongle is Wireless N WL568USB speed up to 300Mbps makes it ideal for video streaming, online gaming and internet calls. This adapter is used because it has chipset that can support packet injection. It supports 64/128-bit strength WEP encryptions, as well as WPA/WPA2 encryptions and mechanisms encryption to prevent outside intrusion and protect your personal information from being exposed. The device is easy to install or use.

9 1.5 Expected Output The expected results from this project are to help to carry out wifi penetration testing using bash script. Other than that, this project also expected to expose about the vulnerability of the wifi security mechanism. Other than that, this tool can also help to set up the wifi setting in security aspect. 1.6 Report Organization This chapter consists of project background, problem statements, objectives, scope of this project and expected output from this project. Then, in chapter 2, related previous works is discussed. Analysis of current problem and proposed solution also is included in chapter 2. In chapter 3, methodology used for this project is explained in detail. Chapter 4 is discussed about design and implementation. All hardware and software requirement are stated in this chapter. In chapter 5, analysis and testing are done. All the steps on how to analyze are described in detail here. In chapter 6, the limitations, contributions, and future works are discussed there. 1.7 Conclusion As a conclusion, the expectation output from this project is to resolve all the problems stated and the objectives achieved within the time allocated. In this chapter, three objectives, scope of the project, and the software and hardware used are identified. Chapter 2 is discussed about the related previous works, analysis of current problem and proposed solution for the problems identified.

10 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction A literature review is a text description of the literatures related to any particular topic. It is also a survey of existing writing within the scope. It gives an overview of what has been said, what hypothesis, and methodology used. The purpose of this literature review is to extract some valuable knowledge through summary, classification and comparison of prior research studies. In this chapter, all problems relevant to the wifi security are discussed. The purpose was to determine the vulnerability of wifi security mechanism which is not really exposed to us.