Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Awareness Chapter 5 Wireless Network Security.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
How To Not Make a Secure Protocol WEP Dan Petro.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Security.
Securing a Wireless Network
Norman SecureSurf Protect your users when surfing the Internet.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Wireless Hotspot Security
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
KARMA KARMA Attacks Radioed Machines Automatically Kurt GrutzmacherGarrett Gee BayLISA – 02/18/06.
Implementing Network Access Protection
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Wireless Networking & Security Greg Stabler Spencer Smith.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Wireless Ethernet Programming
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Security Ian Bodley.
802.11b Wireless Network Security
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Network hardening Chapter 14.
Presentation transcript:

Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay

We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred Microsoft engineers filled the cavernous executive briefing center recently at the company's sprawling campus outside Seattle. Within minutes after their meeting was convened, however, the hall became hushed. Hackers had successfully lured a Windows laptop onto a malicious wireless network. 'It was just silent,' said Stephen Toulouse, a program manager in Microsoft's security unit. 'You couldn't hear anybody breathe.' The demo was part of an extraordinary two days in which outsiders were invited into the heart of the Windows empire for the express purpose of exploiting flaws in Microsoft computing systems. The event, which Microsoft has not publicized, was dubbed 'Blue Hat' -- a reference to the widely known 'Black Hat' security conference, tweaked to reflect Microsoft's corporate color."lured a Windows laptop onto a malicious wireless network

Agenda Motivation What is Automatic Wireless Network Selection? Windows XP Wireless Auto Configuration (WZCSVC) Algorithm Wireless Auto Configuration Weaknesses and Vulnerabilities KARMA: Wireless Client Attack Assessment Toolkit

Motivation Wireless LANs now can be and increasingly are quite secure Improved encryption systems (WPA) MAC address filtering Hidden networks (SSID cloaking) Mobile clients bridge networks across time Connect to secure networks as well as insecure networks (conferences, hotels, airports, cafes) Can be compromised on airplane and spread compromise to secure network at work Security of most secure network depends on security of least secure network

Motivation Paradigm shift to new wireless threat Attacking wireless clients Nightmare scenario Target: Identify wireless clients Position: Get on same network as victim Attack: Exploit client-side vulnerabilities to install persistent agent Subvert: Agent gives attacker remote access to secure networks that client connects to

Automatic Wireless Network Selection Purpose: Automatically (re)connect to trusted known wireless networks Operating System maintains list of Trusted/Preferred wireless Networks Records (SSID, Cleartext/WEP/WPA) Preferred Networks are automatically connected to when available Windows: Continually search when wireless card is on and not associated to another wireless network MacOS X: Search for networks when user logs in or machine wakes from sleep

Microsoft Windows XP Wireless Auto Configuration Algorithm First, Client builds list of available networks Send broadcast Probe Request on each channel

Wireless Auto Configuration Algorithm Access Points within range respond with Probe Responses

Wireless Auto Configuration Algorithm If Probe Responses are received for networks in preferred networks list: Connect to them in preferred networks list order Otherwise, if no available networks match preferred networks: Specific Probe Requests are sent for each preferred network in case networks are “hidden”

Wireless Auto Configuration Algorithm If still not associated and there is an ad- hoc network in preferred networks list, create the network and become first node Uses self-assigned IP address ( Y.Z)

Wireless Auto Configuration Algorithm Finally, if “Automatically connect to non-preferred networks” is enabled (disabled by default), connect to networks in order they were detected Otherwise, wait for user to select a network or preferred network to appear Set card’s desired SSID to random 32-char value, Sleep for minute, and then restart algorithm

Weaknesses in Wireless Auto Configuration Information Disclosure Specific Probe Requests reveal SSIDs of preferred networks Spoofing Unencrypted networks are identified and authenticated only by SSID Unintended Behavior An ad-hoc network in Preferred Networks List turns a wireless client into an Access Point

Positioning for Attack Against Wireless Clients  Join ad-hoc network created by target  Sniff network to discover self-assigned IP ( Y.Z)  Create a stronger signal for currently associated network  While associated to a network, clients send Probe Requests for same network to look for stronger signal  Create a (more) Preferred Network  Spoof disassociation frames to cause clients to restart scanning process  Sniff Probe Requests to discover Preferred Networks  Create a network with SSID from Probe Request

Attacking Wireless Auto Configuration Attacker spoofs disassociation frame to victim Client sends broadcast and specific Probe Requests again Attacker discovers networks in Preferred Networks list (e.g. linksys, MegaCorp, t-mobile)

Attacking Wireless Auto Configuration Attacker creates a rogue access point with SSID MegaCorp

Attacking Wireless Auto Configuration Victim associates to attacker’s fake network Even if preferred network was WEP (XP SP 0) Attacker can supply DHCP, DNS, …, servers Attacker exerts a significant amount of control over victim

Improving the Attack Parallelize Attack multiple clients at once Expand scope Act as any networks that any client is looking for Simplify Don’t require learning preferred networks before beginning attack Increase availability Attack continuously

Attack Implementation Most wireless cards have firmware that enforce frame restrictions Prism II HostAP mode doesn’t pass Probe Requests to Operating System Atheros-based cards don’t have firmware Hardware Abstraction Layer (HAL) and all frame handling in driver software Attack implemented as modified Linux MADWiFi Driver Respond to Probe Request frames for any SSID Allow Assoc Request to any SSID

Performing The Attack Laptop runs software base station Possibly with antenna, amplifiers AP responds to any Probe/Assoc Request Clients within range join what they think is one of their Preferred Networks Client A thinks it is on “linksys” Client B thinks it is on “t-mobile” Client C thinks it is on “hhonors” Any client with at least one unencrypted preferred network will join if no legitimate preferred networks are present

Wireless Auto Configuration Vulnerabilities Remember how SSID is set to random value? The card sends out Probe Requests for it We respond w/ Probe Response Card associates Host brings interface up, DHCPs an address, etc. Verified on Windows XP SP2 w/ PrismII and Orinoco (Hermes) cards Fixed in Longhorn

Packet trace of Windows XP associating using random SSID 1) 00:49: BSSID:ff:ff:ff:ff:ff:ff DA:ff:ff:ff:ff:ff:ff SA:00:e0:29:91:8e:fd Probe Request (^J^S^V^K^U^L^R^E^H^V^U...) [1.0* 2.0* 5.5* 11.0* Mbit] 2) 00:49: BSSID:00:05:4e:43:81:e8 DA:00:e0:29:91:8e:fd SA:00:05:4e:43:81:e8 Probe Response (^J^S^V^K^U^L^R^E^H^V^U...) [1.0* 2.0* Mbit] CH: 1 3) 00:49: BSSID:00:05:4e:43:81:e8 DA:00:05:4e:43:81:e8 SA:00:e0:29:91:8e:fd Authentication (Open System)-1: Succesful 4) 00:49: BSSID:00:05:4e:43:81:e8 DA:00:e0:29:91:8e:fd SA:00:05:4e:43:81:e8 Authentication (Open System)-2: 5) 00:49: BSSID:00:05:4e:43:81:e8 DA:00:05:4e:43:81:e8 SA:00:e0:29:91:8e:fd Assoc Request (^J^S^V^K^U^L^R^E^H^V^U...) [1.0* 2.0* 5.5* 11.0* Mbit] 6) 00:49: BSSID:00:05:4e:43:81:e8 DA:00:e0:29:91:8e:fd SA:00:05:4e:43:81:e8 Assoc Response AID(1) :: Succesful

“First of all, there is no ‘we’…”

Vulnerable PNL Configurations If there are no networks in the Preferred Networks List, random SSID will be joined If all networks in PNL are encrypted, random SSID will have left-over WEP configuration (attacker will have to guess key) We supply the challenge, victim replies with challenge XOR RC4 keystream Our challenge is … We get first 144 bytes of keystream for a given IV If there are any unencrypted networks in PNL, host will associate to our modified Access Point.

Apple MacOS X MacOS X AirPort (but not AirPort Extreme) has similar issues MacOS X maintains list of trusted wireless networks User can’t edit it, it’s an XML file base64-encoded in another XML file When user logs in or system wakes from sleep, a probe is sent for each network Only sent once, list isn’t continuously sent out Attacker has less of a chance of observing it If none are found, card’s SSID is set to a dynamic SSID With 40-bit WEP enabled … but to a static key After waking from sleep, SSID is set to “dummy SSID” Will associate as plaintext or 40-bit WEP with above key MacOS X 10.4 (“Tiger”) has GUI to edit list of trusted wireless networks

Defenses Keep wireless card turned off when not using a wireless network Only keep secure networks in Preferred Networks List Remove insecure network from PNL immediately after done using it Prevent mobile clients from connecting to sensitive networks

KARMA: A Wireless Client Assessment Tool Track clients by MAC address Identify state: scanning/associated Record preferred networks by capturing Probe Requests Display signal strength of packets from client Allows targeting a specific client Create a network they will automatically associate to Identify insecure wireless clients that will join rogue networks “Kismet” for wireless clients

KARMA Probe Monitor

Karma Attacks Radioed Machines Automatically Wireless and client-side attack and assessment toolkit Modules attack multiple layers as hostile server or Man-in-the-Middle : Modified MADWiFi driver answers all Probe/Assoc Requests DHCP: Rogue DHCP server points client at our DNS server DNS: Rogue DNS Server responds to all queries with our IP address POP3/FTP: Servers capture plaintext credentials HTTP: Attack web server redirects any query to browser exploits or acts as transparent proxy

Conclusion Demonstrated weaknesses and vulnerabilities in Automatic Wireless Network Selection Allows attacker to put victim on hostile subnet Firewalls commonly on by default, but clients still initiate a lot of traffic Automatic updates Browsing (NetBIOS, Rendezvous/Bonjour) Rise in client-side vulnerabilities Mobile clients are a risk to secure networks Assess risk of wireless clients with KARMA