Wireless Auditing on a Budget

Similar documents
Wireless Tools. Training materials for wireless trainers

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WIRELESS SECURITY TOOLS

Introduction. Course Description

Security Awareness. Wireless Network Security

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

CYBERTRON NETWORK SOLUTIONS

Build Your Own Security Lab

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

MITM Man in the Middle

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Penetration testing & Ethical Hacking. Security Week 2014

CEH Version8 Course Outline

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Wireless Network Risks and Controls

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

FinIntrusion Kit / Release Notes FINUSB SUITE SPECIFICATIONS. FINFISHER: FinIntrusion Kit 2.2 Release Notes

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Chapter 3 Safeguarding Your Network

New Avatars of Honeypot Attacks on WiFi Networks

June 2014 WMLUG Meeting Kali Linux

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Ralink Utility User Guide/PC/MAC

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

An Experimental Study Analysis of Security Attacks at IEEE Wireless Local Area Network

Wireless LAN Security: Securing Your Access Point

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

WarDriving and Wireless Penetration Testing with OS X

Wifi Penetration. Wireless Communication and Computer/Network Forensics

Professional Penetration Testing Techniques and Vulnerability Assessment ...

ICP DAS WF-2571 FAQ. FAQ Version 1.0. ICP DAS Co., Ltd

Closing Wireless Loopholes for PCI Compliance and Security

BYOD: End-to-End Security

Securing end devices

Audit Tools That Won t Break the Bank

Deciphering The Prominent Security Tools Ofkali Linux

Tutorial on Smartphone Security

Offensive Security. Wireless Attacks - WiFu

Kali Linux Cookbook. Willie L. Pritchett David De Smet. Chapter No. 9 "Wireless Attacks"

A New Era. A New Edge. Phishing within your company

Wireless Network Security When On the Road

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

9 Simple steps to secure your Wi-Fi Network.

WEP WPA WPS :: INDEX : Introduction :

Vulnerability Assessment and Penetration Testing

Wireless LAN Security I: WEP Overview and Tools

Healthcare Information Security Governance and Public Safety II

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

300Mbps. Wi-Fi Range Extender TL-WA855RE. Highlights. Description

Wireless (In)Security Trends in the Enterprise

Ethical Hacking Course Layout

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Topics in Network Security

Certified Ethical Hacker (CEH)

Mobile Device Manual for 3G DVRs

N600 WiFi USB Adapter

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync

Why The Security You Bought Yesterday, Won t Save You Today

Cloud Print Edition Quick Start Guide

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Exactly the Same, but Different

FORBIDDEN - Ethical Hacking Workshop Duration

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

This User Manual (Ver. 2013/04) is for Firmware Version: Ver1.0.x / pdapp Version: Ver:1.0.x

InfoSec Academy Pen Testing & Hacking Track

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Hello Modem. Today I would like

Technical Brief. Wireless Intrusion Protection

Detailed Description about course module wise:

How To Manage A System Vulnerability Management Program

Transcription:

Wireless Auditing on a Budget Open Source on Low Cost Hardware James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology Solutions

Agenda & Presentation Goals Background & Experience Wireless Handhelds Past Present Future Wireless 802.11 Auditing Access Point mapping Rogue Access Point discovery Wireless Security testing Wireless client security Bluetooth Wireless Auditing Current Android Tools Questions

Agenda & Presentation Goals Provide detailed documentation on using the hardware and software discussed during this presentation. Continue to update the documentation and provide support for any audit team interested in using the hardware and tools discussed.

Background & Experience From 2004-2009 I was the an IT Auditor responsible for Penetration Testing for the audit shops in NY and GA. Specialized in Wireless Auditing using Open Source software.

Commercial Wireless Tools PROS: Commercial Support Simple, easy to use, interface Enterprise Solution CONS: Cost Enterprise Solution WiFi Only Lack of audit features

Wireless Handheld History Fluke Networks Waverunner Wireless Network Analyzer $7,000 Fluke Networks OptiView Wireless Network Analyzer $11,000 AirMagnet Handheld for Pocket PC $5,000 Commercial Handhelds

Wireless Handheld History Compaq Ipaq Two slot PCMCIA backpack Familiar Linux Kismet SMC 802.11 b External Antenna Compaq/HP Ipaq & Open Source Software

Wireless Handheld History Holux GPS Compact Flash Open Source Software and the Ipaq allowed for access point mapping with GPS

Wireless Handhelds Today Fluke Networks AirCheck Wi-Fi Tester $2,000 Fluke Networks EtherScope Series II Network Assistant $7,000 Commercial Handhelds

Wireless Handhelds Today Nokia N810 Internet Tablet Maemo Linux 802.11g, Bluetooth, & GPS

Nokia Internet Tablets 4.13 in diagonal screen Maemo Linux Operating System Customized Debian Linux USB Host Mode (external 802.11 a/b/g/n and Ethernet adapters) Bluetooth GPS support Large hacker community supporting the devices and the operating system Hardware hacking Porting software

Nokia Internet Tablets Nokia N770 Released November 2005 Maemo Linux OS 2006 Nokia N800 Released January 2007 Maemo Linux OS 2007 (Chinook) Front Camera added Nokia N810 Released January 2007 Maemo Linux OS 2008 (Diablo) Keyboard & GPS added Nokia N900 Released November 2009 Maemo Linux 5 (Fremantle) Smartphone

Wireless Auditing with the N810 Identify and mapping WiFi access points Tracking down potential rogue access points Testing WiFi Access Point security Testing WiFi client security Identify Bluetooth devices

Wireless Auditing with the N810 Kismet 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Aircrack-ng 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. Impersonate an access point to test wireless client security. Btscanner Bluetooth scanner and brute-force tool

Nokia N810 802.11 Hardware Internal 802.11 wireless No Opensource drivers for internal 802.11 wireless Kismet does not support signal strength on internal wireless Great for war driving/walking to map access points External 802.11 wireless USB adapter Packet injection for AP/Client security testing Signal strength readings for rogue access point tracking

Kismet (Oldcore) on Nokia N810

Kismet (Newcore) on Nokia N810

Plotting Access Points

Kismet: Tracking Rogue APs Kismet signal strength readings can be useful in tracking where rogue access points are located. Signal strength numbers vary by wireless chipset. You must always compare the numbers from the same card. Test the wireless card on an AP you control to determine what signal readings MAC addresses obtained from Kismet can be researched to identify the manufacturer.

Aircrack-ng: Encryption Testing Don t even bother WEP cracking is trivial and only should be done in a penetration testing environment where you need to access the network. WPA/WPA2 have no weaknesses in the implementation of the protocol. Cracking an 8 character alphanumeric password will take 33 years using the best GPUs available.

Aircrack-ng: Client Security The airbase-ng command of the Aircrack-ng suite allows you to configure a decoy access point to test client side wireless security. Airbase-ng will mimic the name of any access point the client sends a probe request for. If a client has previously connected to an access point at a coffee shop, airport, or hotel, it will save that information and send out a probe request in an attempt to connect to those access points when the wireless interface starts up. Clients that connect to airbase-ng can be flagged for audit remediation steps. Advanced client side testing can leverage Metasploit for password sniffing and browser exploit attacks.

Aircrack-ng: Client Security Windows wireless client software will show all the access points available that airbase-ng is serving. These access points are names of all access points this client has connected to in the past.

Aircrack-ng: Client Security Client Associates with fake AP

Bluetooth Security Btscanner Text menu based Bluetooth sniffer that identifies all Bluetooth devices communicating in your environment.

Bluetooth Device Identification Btscanner Device scanning

Bluetooth Device Identification Btscanner Device details

Bluetooth Vulnerabilities Microsoft Security Bulletin MS11-053 - Critical Vulnerability in Bluetooth Stack Could Allow Remote Code Execution http://www.microsoft.com/technet/security/bulletin /MS11-053.mspx Effects fully patched (as of 7/12/2011) Windows 7 and Vista.

Bluetooth Vulnerabilities http://krebsonsecurity.com/2011/07/microsoft-fixes-scary-bluetooth-flaw-21-others/

Wireless Handheld Future

Wireless Handheld A Peak into the Future HTC Droid Android Linux 802.11g, Bluetooth, & GPS

WiFi Analyzer

Wardrive Map access points using the phones internal wireless, GPS, and Google Maps.

WiFi Tracker

Questions

Contact Information James A. Edge Jr. james.edge@cbts.cinbell.com james.edge@jedge.com http://www.jedge.com