Hole196 Vulnerability in WPA2



Similar documents
CS 356 Lecture 29 Wireless Security. Spring 2013

All You Wanted to Know About WiFi Rogue Access Points

Security Awareness. Wireless Network Security

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

CYBERTRON NETWORK SOLUTIONS

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

How To Secure Wireless Networks

Authentication in WLAN

chap18.wireless Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CS5008: Internet Computing

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Wireless (In)Security Trends in the Enterprise

Certified Wireless Security Professional (CWSP) Course Overview

PCI Wireless Compliance with AirTight WIPS

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?


FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Packet Sniffing on Layer 2 Switched Local Area Networks

Detailed Description about course module wise:

Own your LAN with Arp Poison Routing

WiFi Security Assessments

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

CMPT 471 Networking II

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Wireless Security: Secure and Public Networks Kory Kirk

Network Attacks. Common Network Attacks and Exploits

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Lab VI Capturing and monitoring the network traffic

Closing Wireless Loopholes for PCI Compliance and Security

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 6 CDMA/802.11i

WIRELESS NETWORKING SECURITY

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Wireless LAN Pen-Testing. Part I

Security Technology White Paper

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wireless security. Any station within range of the RF receives data Two security mechanism

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

The Wireless Network Road Trip

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Technical Brief. Wireless Intrusion Protection

MITM Man in the Middle

Wireless Security with Cyberoam

Advanced Security Issues in Wireless Networks

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Securing end devices

Enterprise A Closer Look at Wireless Intrusion Detection:

Wireless Encryption Protection

PCI DSS 3.1 and the Impact on Wi-Fi Security

Course Content: Session 1. Ethics & Hacking

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Security in IEEE WLANs

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

WLAN w Technology

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Air Marshal. White Paper

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

Chapter 2 Wireless Networking Basics

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Chapter 8 Security Pt 2

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Wireless LAN Security: Securing Your Access Point

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless Pre-Shared Key Cracking (WPA, WPA2)

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Wi-Fish Finder: Who will bite the bait?

Packet Sniffer Detection with AntiSniff

CRYPTUS DIPLOMA IN IT SECURITY

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Network Security in Practice

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Transcription:

Hole196 Vulnerability in WPA2 1

Hole196 Vulnerability in WPA2 Presenters: Anthony Paladino, Managing Director, Systems Engineering Dr. Kaustubh Phanse, Principal Wireless Architect Md. Sohail Ahmad, Senior Security Researcher Moderator: Della Lowe, Sr. Director, Corporate Marketing 2

What happened last week in Las Vegas? Upshot of the WPA2 brouhaha WPA/WPA2 not as secure as we would like to believe How malicious insiders could hack your Wi-Fi -- easily! WPA2 vulnerability uncovered Hole196 3

This webinar What s wrong with WPA2 What s Hole196 Is there a fix? Should I worry about it But, I have heard that? 4

What s Hole196? Hole 196!!! It s right here! Buried inside the 1232-page IEEE 802.11 Standard (Revision, 2007) 5

WPA/WPA2 defines two types of keys to protect data frames Pairwise Transient Key (PTK) - Unique for each client - Protect unicast data frames Group Temporal Key (GTK) - Shared by all clients in a BSS - Protect group addressed data frames (e.g., broadcast, multicast) PTK 1 PTK 2 GTK Client 1 Client 2 Client 1 Client 2 6

GTK: Key to the kingdom! Parameters (GTK, KeyID and PN) required to send group addressed data frame is known to all connected clients GTK Client 1 Client 2 7

If you dream it, you can hide it! Overhear VoIP over Wi-Fi conversations Steal intellectual property/trade secrets Steal identity and password Sniff credit card transactions over Wi-Fi PoS Denial of Service (DoS) Port scanning, malware injection, key logger, etc. 8

What s your domestic policy? 51% of respondents were still victims of an insider attack. The most costly or damaging attacks are more often caused by insiders (employees or contractors with authorized access). 2010 CyberSecurity Watch Survey by CERT, CSO and Deloitte Breaches Down, Insider Attacks Up! 2010 Data Breaches Investigation by Verizon and U.S. Secret Service 9

10

Exploit #1: Stealth-mode man in the middle Wired LAN Victim s data encrypted with Attacker s PTK 3 2 Victim s data encrypted with Victim s PTK 1 Attacker I am the Gateway (Encrypted with GTK) Victim 1 Attacker injects fake ARP Request packet to poison client s cache for gateway. 2 3 Victim sends all traffic encrypted with its PTK to the AP, with Attacker as the destination (gateway) AP forwards Victim s data to the Attacker encrypting it in the Attacker s PTK. So Attacker can decrypt Victim s private data. 11

Exploit #1: Stealth mode man in the middle Wired LAN 4 Attacker I am the Gateway (Encrypted with GTK) Victim Victims 4 Attacker forwards victim data to actual Gateway to provide a transparent service to the victim 12

Open source software: Madwifi & WPA supplicant wpa_supplicant (0.7.0) Used to pass updated GTK and packet number (PN) to the madwifi driver Madwifi (0.9.4) Modified and used to create spoofed group addressed data frames with AP MAC address as the sender 13

But you can do ARP spoofing today over WPA2! So what s new? Wired LAN Segment Spoofed ARP Request (I am the Gateway) Existing wired IDS/IPS can catch ARP spoofing attack on the wire! WiFi Client 1 (Malicious Insider) WiFi Client 2 14

The footprint of ARP spoofing using GTK is limited to the air! Wired LAN Segment Spoofed ARP Request (I am the Gateway) WiFi Client 1 (Malicious Insider) WiFi Client 2 15

Packet trace of the stealth-mode ARP spoofing Packet capture on wired interface Broadcast attack frames not visible on the wire Packet capture on wireless interface Broadcast attack frames visible only in the air 16

If this is not a problem, what are you fixing? 3 Wired LAN Client isolation (or PSPF) X 2 1 Attacker Victim Not always practical Not the ultimate solution; can be bypassed ARP poisoning over the air & MITM on wire Other attacks possible that do not involve AP 17

Exploit #2: IP layer targeted attack Any data payload can be encapsulated in the GTK-encrypted group addressed 802.11 frames IP Layer Unicast Data Frame Flag Duration Address 1 = FF:FF:FF:FF:FF:FF Address 2 = AP s BSSID Address 3 = Src MAC Address Seq. No Encapsulated Data Payload FCS IEEE 802.11 Data Frame 18

Exploit #3: Denial of Service (DoS) A malicious insider can advance the locally cached PN (replay counter) in victim clients by forging a group addressed data frame with a very large PN Packet capture on wired interface Broadcast traffic visible Packet capture on wireless interface No Broadcast traffic is visible 19

Fixing the WPA2 protocol Deprecate use of GTK and group-addressed data traffic APs in controller based WLAN architectures often do not broadcast data frames over the air For backward compatibility, unique GTKs can be assigned to individual authorized Wi-Fi clients in the network If data frames have to be broadcast, then transmit as unicast Disadvantage May degrade WLAN throughput if broadcast traffic is sent as unicast Not going to happen overnight! 20

Wireless intrusion prevention system (WIPS) as an additional layer of defense 21

AirTight s SpectraGuard Enterprise WIPS 22

Anomalous Broadcast Traffic from Authorized AP [Cisco_A8:ED:70] Category: Man-in-the-Middle (MITM) 23

24

Physical location of the attacker 25

26

Concluding remarks Hole196: Allows an insider to bypass WPA2 inter-user data privacy All WPA and WPA2 networks are vulnerable No key cracking! No brute force! Client isolation or PSPF Use it as a first aid, but it s not the ultimate solution Proprietary fix to the WPA2 protocol (without breaking the interoperability) is possible WIPS as an additional layer of security A dedicated WIPS such as SpectraGuard Enterprise, monitoring the airspace 24/7, can protect enterprise networks from wireless threats 27

Thank You! For more information on wireless security risks, best practices, and solutions, visit: www.airtightnetworks.com blog.airtightnetworks.com The Global Leader in Wireless Security and Compliance Solutions For more information about our products and services, contact: +1 877 424 7844 sales@airtightnetworks.com 28

MITM attack using SSLStrip on top of the Hole196 exploit Username Password 29