OpenWIPS-ng A modular and Open source WIPS. Thomas d Otreppe, Author of Aircrack-ng



Similar documents
Introduction of Intrusion Detection Systems

Intrusion Detection Systems (IDS)

Network Intrusion Detection Systems. Beyond packet filtering

Network Management System (NMS) FAQ

Firewalls Netasq. Security Management by NETASQ

Avaya TM G700 Media Gateway Security. White Paper

Chapter 9 Firewalls and Intrusion Prevention Systems

Avaya G700 Media Gateway Security - Issue 1.0

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2

Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000

Who is Watching You? Video Conferencing Security

Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

OS/390 Firewall Technology Overview

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Network Monitoring with SNMP

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Secure Software Programming and Vulnerability Analysis

Using IPSec in Windows 2000 and XP, Part 2

Network Security Demonstration - Snort based IDS Integration -

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Wireless LAN Pen-Testing. Part I

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

How To Protect Your Network From Attack From Outside From Inside And Outside

ΕΠΛ 674: Εργαστήριο 5 Firewalls

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

cinderella: A Prototype For A Specification-Based NIDS

MITM Man in the Middle

Configuring Snort as a Firewall on Windows 7 Environment

11.1. Performance Monitoring

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Configuring Snort as a Firewall on Windows 7 Environment

Closing Wireless Loopholes for PCI Compliance and Security

COUNTERSNIPE

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CDH installation & Application Test Report

Linux VPS with cpanel. Getting Started Guide

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

ReadyNAS Remote White Paper. NETGEAR May 2010

Background (

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Firewalls Overview and Best Practices. White Paper

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).

PROFESSIONAL SECURITY SYSTEMS

Linux Network Security

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

SyncThru TM Web Admin Service Administrator Manual

PART OF THE PICTURE: The TCP/IP Communications Architecture

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention

Network Defense Tools

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Network Monitoring. Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014

Wireless Tools. Training materials for wireless trainers

Visualization Cluster Getting Started

Security Technology White Paper

Packet Level Authentication Overview

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

GlobalSCAPE DMZ Gateway, v1. User Guide

Enterprise A Closer Look at Wireless Intrusion Detection:

Moxa Device Manager 2.3 User s Manual

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Firewalls and Intrusion Detection

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

EZblue BusinessServer The All - In - One Server For Your Home And Business

2. Installation and System requirements

EZblue BusinessServer The All - In - One Server For Your Home And Business

Features Overview Guide About new features in WhatsUp Gold v14

McAfee Network Security Platform 8.2

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Computer Security: Principles and Practice

inforouter V8.0 Server & Client Requirements

Managed File Transfer

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Q&A. DEMO Version

Installation and Configuration Guide for Windows and Linux

Firewall Design Principles Firewall Characteristics Types of Firewalls

Aker Firewall. Version 5.0 Configuration Manual

Installing and Using the vnios Trial

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Computer Security DD2395

Magaya Software Installation Guide

Automate Your BI Administration to Save Millions with Command Manager and System Manager

Solving Monitoring Challenges in the Data Center

Internet Information TE Services 5.0. Training Division, NIC New Delhi

Transcription:

OpenWIPS-ng A modular and Open source WIPS Thomas d Otreppe, Author of Aircrack-ng 1

Agenda What is OpenWIPS-ng? Origin Architecture Internal design Release plan Demo

~# whoami Author of Aircrack-ng and this tool Work at NEK Advanced Securities Group

OpenWIPS-ng, WTF is that? Let's split that word to explain it Open: Open source 'W': Wireless IPS: Prevent intrusions on networks by reacting (active) IDS: Detect intrusions on networks by notifying (passive) Basically, it is a free Wireless Intrusion Prevention System.

Where did the idea come from? A project I started almost 2 years ago. Monitor all channels on 2.4Ghz

Where did it came from? 2 projects: Project scanning and I pushed it further.

Pushing the idea further Wireless IPS are freakin' expensive No existing open source solution. Don t want to spend $6-10K for a nice toy, so I applied the open source philosophy: do it yourself.

Architecture Three parts Sensor(s) Server Interface

Architecture

You said modular? Most of its detection functions are plugins Shared libraries (DLL or SO on linux) Some basic checks needs to be always run and run before plugins Advantages: No need to recompile the server If you have proprietary code, no need to distribute it DLL/SO can be given compiled. No licensing issue For developers, just a few functions to implement

Modularity Most plugins will run on the server CPU/GPU/FPGA power Where the packets are reassembled In some rare cases, it will run on the sensor Need to react really quickly

Modularity Plugin types Frame analysis (anomaly/attack detection/response) Logging Alert Database connection Script wrapper

Multiple sensors Yes, that can be a nightmare Sensors may overlap => see same traffic Sensors not always see the same traffic Sensors have small CPU Server reassemble data And remove duplicate traffic Then process it Intrusion prevention: Use sensor who see the most of the attack.

Intrusion prevention When attacked: In most cases, deauthenticate attackers Log it and alert the administrator If legitimate users are attacked: ban both from the network until the issue is solved or some time. Can prevent your users from connecting to other networks

And what about DoS Can detect Denial of Service All you can do is wait for it to finish Or make it stop An hardware add-on is capable to stop it. Must have for any network admin Cheap and widely available Gets the job done quickly

BBRoS* Locate the attacker accurately Guy who runs away (with a laptop) when you show up with the bat. $15-$30 on Amazon/Walmart Available in different sizes *Baseball Bat Restora-on of Service

Internal Design A bit more technical

Internal Design - Architecture

Internal design - Communication Similar to FTP Command channel Sensor authenticate to server Establish the remote PCAP link. Data channel: Remote PCAP Binary data Same structure as a packet in a PCAP file (header, packet) Both channels encrypted by default

Internal design Communication (2)

Internal design - Plugins Type of plugins Frame analysis (attack detection/response) Logging Alert Database connection Script Wrapper Wrapper to use a scripting language For any type of plugin

Internal design Plugins (2) Very easy How? 1. Implementation Use any programming language that can create a shared object Implement common functions to all plugins Implement functions specific to the type of plugin The server takes care of the packet list so no need to manage it 2. Compile it 3. Edit configuration file 4. (Re)start OpenWIPS-ng server

Internal design Plugins (3) Script Wrapper For any type of plugin (Frame analysis, Logging, etc) Wrapper to use a scripting language Same function names to implement Is a plugin itself but needs parameters At least the path to the script and the language Any parameter the script needs/accept

Internal design Plugins (4) Let s see how a script is made Functions to implement Example implementation Makefile Installation

Internal design Packet reassembly Data can come from several devices Those devices view different parts of the communication Sometimes the same Sometimes completely different parts How packet reassembly works: 1. Gather packet from all the sources 2. Discard duplicate 3. Sometimes needs reordering

Releases 0.1 beta available (close to 0.1 stable) 0.1.1, 0.2 and 0.3: More modules, features 1.0: Rewrite in C++ Graphical User Interface

v0.1 Sensor Server Single sensor support Built-in logging (none/file/syslog) Plugins available: Frame analysis Partially work on OSX Lion Documentation Installation, configuration and usage Plugin development

v0.1 Plugins Anomaly check FromDS/ToDS fields Management frames IE Frame type/subtype Attack detection Fragmentation Deauthentication Replay detection

v0.1.1 Server Rewrite attack detection system Parse prism and PPI headers (might happen sooner) Full Windows support (server/sensor) Airpcap only

v0.2 v0.3 v0.2: Sensor: channel hopping Server Multiple sensor support Encrypted communications v0.3 Web interface More plugins Bug fixes (obviously)

v1.0 Rewrite in C++ No change in how plugins work Real remote PCAP GUI

Following versions Detailed planning available on the website

Video Demo Murphy s law: A live demo always work as expected, nothing wrong ever happens. Or maybe is it the other way around? Especially with wireless traffic which is unpredictable And nobody is ever going with mess with it. Let s see it in action.

I want it Subversion: http://svn.openwips-ng.org http://openwips-ng.org #openwips-ng on Freenode.net tdotreppe@openwips-ng.org Ideas? Features request? Email me

That's all folks Picture from sharkfest

http://openwips-ng.org #openwips-ng on Freenode.net tdotreppe@openwips-ng.org We need your ideas/remark/suggestions. If you want to help/join.