Wireless Network Risks and Controls



Similar documents
Wireless Tools. Training materials for wireless trainers

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wifi Penetration. Wireless Communication and Computer/Network Forensics

CYBERTRON NETWORK SOLUTIONS

MITM Man in the Middle

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

Wireless Auditing on a Budget

DefCon 22. Wireless Penetration Testing and How to WCTF

Topics in Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Introduction. Course Description

Offensive Security. Wireless Attacks - WiFu

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Detailed Description about course module wise:

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

WiFi Security Assessments

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

June 2014 WMLUG Meeting Kali Linux

CEH Version8 Course Outline

Hole196 Vulnerability in WPA2

2016 TÜBİTAK BİLGEM Cyber Security Institute

Closing Wireless Loopholes for PCI Compliance and Security

Network Attacks. Common Network Attacks and Exploits

Wireless LAN Pen-Testing. Part I

ENHWI-N n Wireless Router

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Kali Linux Cookbook. Willie L. Pritchett David De Smet. Chapter No. 9 "Wireless Attacks"

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

New Avatars of Honeypot Attacks on WiFi Networks

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

United States Trustee Program s Wireless LAN Security Checklist

Malicious Network Traffic Analysis

WEP WPA WPS :: INDEX : Introduction :

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

INFORMATION SECURITY TRAINING CATALOG (2016)

WIRELESS SECURITY TOOLS


iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Chellam a Wi-Fi IDS/Firewall for Windows. SecurityTube.net

Wireless Security, Authentication and Attacks

How To Protect A Wireless Lan From A Rogue Access Point

Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Wireless Networks. Welcome to Wireless

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

The next generation of knowledge and expertise Wireless Security Basics

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Security Awareness. Wireless Network Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Enumerating and Breaking VoIP

Network Attacks and Defenses

Technical Brief. Wireless Intrusion Protection

Output Power (without antenna) 5GHz 2.4GHz

Network Security Best Practices

INFORMATION SECURITY TRAINING CATALOG (2015)

Building secure wireless access point based on certificate authentication and firewall captive portal

FSP-201: Ethical Hacking & IT Security

Using Wireless Technology Securely

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

13 Ways Through A Firewall

Exam Questions SY0-401

The Top Seven Security Problems of Wireless

All You Wanted to Know About WiFi Rogue Access Points

A Study on Wireless Intrusion Prevention System based on Snort

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Penetration Testing with Kali Linux

802.11b and associated network security risks for the home user

Course Content: Session 1. Ethics & Hacking

INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide

Securing end devices

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Networking: EC Council Network Security Administrator NSA

Wireless (In)Security Trends in the Enterprise

Ethical Hacking Course Layout

Penetration Testing for iphone Applications Part 1

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

5GHz 300Mbps 13dBi Outdoor CPE

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Transcription:

Wireless Network Risks and Controls Offensive Security Tools, Techniques, and Defenses 22 January 2015 ISACA Phoenix Chapter Phoenix, AZ Presented by: Ruihai Fang Dan Petro Bishop Fox www.bishopfox.com

Introduction/Background GETTING UP TO SPEED 2

3 Used to be a Pain Lots to of heavy things to carry

Kali VM and USB Adapter N O W E A S Y Kali Linux VM + TP-LINK - TL-WN722N (USB) + 4

Laptops, Netbooks (easier to conceal), and adapters Asus EEPc TP-Link Adapter Capable of attaching a YAGI antenna

YAGI Antennas Directional Very good for attacking from a distance, like from the comfort of your hotel room.

Antenna Connector Cables are Necessary

WiFi Hacking Using Android Phones StarTech Micro USB On-the-go Adapter Samsung Galaxy S3 Alfa 1000mW 1W 802.11b/g USB WiFi Adapter. Uses RTL8187 Chipset.

Wireless Hacking Tools ACROSS VARIOUS OS S 9

Wireless Tools Discovery Supported operating systems Supported wireless protocols Active vs. passive scanning Packet capturing and decoding Distinguishes between AP, ad hoc, and client devices Statistics and reporting capabilities User interface Price 10

NirSoft Wireless Tools W I N D O W S H A C K I N G T O O L S NirSoft WirelessNetView NirSoft WifiInfoView NirSoft - Wireless Network Watcher 11

inssider Wi-Fi Scanner WIN DOWS HAC KIN G TOOLS 12

Aircrack-ng Suite LINUX HACKING TOOLS 13

Kismet LINUX HACKING TOOLS 14

Kismac MAC OS X HAC KING TOO LS 15

inssider for Mac MAC OS X HAC KING TOO LS 16

Wi-Fi Pineapple W IRELESS PENET R AT IO N T EST ING RO UT ER 17

Features W HAT CAN IT DO? Wireless Jamming (De-auth Attack) Man-in-the-Middle attack DNS Spoof on lure client Web base management Tether via Mobile Broadband Battery power and portable 18

Specs T HE HARDW ARE Atheros AR9331 SoC at 400MHz 802.11 b/g/n 150 Mbps wireless 2x Ethernet, one PoE (Power-Over-Ethernet) capable USB 2.0 for expanded storage, WiFi Interface and Mobile Broadband Fast Linux Kernel 3.2 based Jasager Firmware 19

Methodology Social Engineering 1. Karma (Rogue AP) 2. DNS Spoof & MITM 3. Phishing 20

Auto-Association PRO BLEM TO EX PLO IT 21

Karma HO W DO ES IT W O RK? Listen to wireless probes from nearby wireless devices Impersonate as the requested wireless AP 22

Karma RO G UE AP 23

DNS Spoof PO ISO NING YO UR DNS Modify DNS records and point to a malicious site Man-in-the-middle between the victim and Internet reddit.com reddit.com Malicious site 24

Phishing PHISHING AT TACK Clone the official website (reddit.com) Implement key logger Deploy malware or backdoor on the forged website Compromise the victim 25

DEMO 26

Mitigation Things that you should be doing 1. Disable the Connect Automatically setting on all unsecured wireless networks. 2. Use DNS Crypt or Google DNS 3. Don t connect to any unsecured or unknown wireless network 4. Use a trusted VPN tunnel to encrypt the traffic on public network 27

Raspberry Pi FRUITY WIFI Raspberry Pi cheap alternative (~$35) Fruity WiFi Raspberry Pi version of the WiFi Pineapple 28

Easy-creds AUTO MAT ING W IFI CLIENT AT TACKS 29

Dumping Keys CLIENT EX PLO IT ING 30

Cracking WPA2-PSK with Pyrit 31

Using Kismet We ve Decided on our Target Network

Pyrit https://code.google.com/p/pyrit/ Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATIStream, Nvidia CUDA and OpenCL, it is currently by far the most powerful attack against one of the world's most used security-protocols.

During Recon Find What Channel Your Target is on and Capture only on that Channel to Increase Your Chances of Getting a Valid WPA Handshake CorpWiFi9 on Channel 6

Passive Monitoring with Kismet Running Kismet for 12 hours will capture lots of packets and PCAP files can be large.

DEMO 36

Stripping a PCAP File with Pyrit

Randomly Captured WPA2 Handshake After Running Kismet for 12 hours in my apartment

A Typical Windows 7 Wireless Client Using WPA2

WPA 4-Way Handshake

WPA 4-Way Handshake

Decrypting WPA Packet Captures with Found Key in Wireshark

Before and After Decryption in Wireshark Before Applying WPA Key After Applying WPA Key

Mobile WiFi Security Tools 44

Popular Mobile WiFi Hacking Tools WiFi Sniffing on Android in Monitor Mode http://www.kismetwireless.net/android-pcap/ Password Sniffing & Session Hijacking Using dsploit http://dsploit.net/ iphone-wireless https://code.google.com/p/iphonewireless/wiki/stumbler

More Discreet Monitoring Using Alpha 1 802.11b/g Model Number AWUS036H. This uses the RTL8187 Wireless Chipset.

Android PCAP Monitor Mode on a Galaxy S3

Arp Spoofing & Detection 88:32:9b:0b:a8:06 is actually the Android Phone pretending to be the default gateway at 192.168.1.254

Web Session Hijacking using dsploit

PwnPad NEXUS 7 PENTEST DEVICE 51

Defenses A V O I D B E I N G P R O B E D 52

Defenses R E C O M M E N D A T I O N S Conduct regular wireless assessments Employ strong encryption and authentication methods Employ wireless IDS/IPS Secure wireless clients (laptops, phones, ) 53

Defenses R E C O M M E N D A T I O N S Use wireless checks of network vulnerability scanners 54

Defenses R E C O M M E N D A T I O N S Physically track down rogue access points and malicious devices 55

Thank You Bishop Fox see for more info: http://www.bishopfox.com/ 56