Bh-us-02-lynn-802.11attack
Download
Report
Transcript Bh-us-02-lynn-802.11attack
Advanced 802.11 Attack
Mike Lynn
&
Robert Baird
7/31/2002
Black Hat 2002, Las Vegas NV
What Is NOT Covered
Wired Equiv. Privacy (WEP) vulnerabilities
WEP Key cracking techniques
Radio signal amplification
Suggested changes to the IEEE 802.11b
specification
Wireless network discovery tools
7/31/2002
Black Hat 2002, Las Vegas NV
What Will Be Covered
Wireless network best practices
Practical attacks
The focus of the attack(s)
The network layers
The bottom 2 layers
Custom (forged) 802.11b management frames
The Tool Box
7/31/2002
Drivers
Utilities
Proof of concept code
Black Hat 2002, Las Vegas NV
What Will Be Covered
Attack Scenarios
Denial of service
Masked ESSID detection
802.11b layer MITM attack
Inadequate VPN implementations
Mitigation Strategies
7/31/2002
Black Hat 2002, Las Vegas NV
Wireless Best Practices
Enable WEP - Wired equivalent privacy
Key rotation when equipment supports it
Disable broadcast of ESSID
Block null ESSID connection
Restrict access by MAC address
Use VPN technology
Use strong mutual authentication
7/31/2002
Black Hat 2002, Las Vegas NV
Practical Attacks
WEP – Can be cracked passively
Masked ESSID – Can be passively observed
in management frames during association
Block null ESSID connects – Same problem
Install VPN – Weakly authenticated VPN is
susceptible to active attack (MITM)
Strong mutual authentication - ?
7/31/2002
Black Hat 2002, Las Vegas NV
The Network Layers
7/31/2002
Black Hat 2002, Las Vegas NV
The Bottom Layers
Manipulating the bottom 2 layers of the
OSI
Data Link (Layer 2)
Media Access Control (MAC) – Access to medium
Logical Link Control (LLC) – Frame sync, flow
control
Physical (Layer 1)
Radio bit stream
Divided into channels
7/31/2002
Black Hat 2002, Las Vegas NV
The Bottom Layers
7/31/2002
Black Hat 2002, Las Vegas NV
Management Frames
Management frames can control link
characteristics and physical medium
properties
802.11b management frames are NOT
authenticated
7/31/2002
Why is this bad?
Black Hat 2002, Las Vegas NV
The Tool Box
Custom Drivers
Air-Jack
Custom driver for PrismII (HFA384x) cards
MAC address setting/spoofing
Send custom (forged) management frames
AP forgery/fake AP
Lucent/Orinoco
Linux driver modified to allow MAC address
setting/spoofing from the command line
Utilities
7/31/2002
User space programs – wlan-jack, essid-jack,
monkey-jack, kracker-jack
Black Hat 2002, Las Vegas NV
Air-Jack Driver
Allows control of wireless card modes
Modes 0 and 1 standard documented modes
BSS (infrastructure) (1) or IBSS (0) (Ad-hoc)
Pseudo-IBSS (3) mode
Control channel selection
Firmware handles timing sensitive functions
Mode 5 - undocumented
Channel selection
Firmware handles time sensitive functions
No beacons sent
Very little firmware intervention
7/31/2002
Black Hat 2002, Las Vegas NV
Air-Jack Driver
Mode 6 – Host Access Point mode
Sends Beacons (firmware control)
Responds to Probe request
Handles time sensitive functions
Can enable PrismII monitor mode
Uses Linux PF_PACKET interface for RX
and TX of raw frames
7/31/2002
Black Hat 2002, Las Vegas NV
Air-Jack Driver
void send_deauth (__u8 *dst, __u8 *bssid)
{
struct {
struct a3_80211hdr;
__u16
reason;
}frame;
memset(&frame, 0, sizeof(frame));
frame.hdr.mh_type = FC_TYPE_MGT;
frame.hdr.mh_subtype = MGT_DEAUTH;
memcpy(&(frame.hdr.mh_mac1), dst, 6);
memcpy(&(frame.hdr.mh_mac2), bssid, 6);
memcpy(&(frame.hdr.mh_mac3), bssid, 6);
frame.reason = 1;
send(socket, &frame, sizeof(frame), 0);
}
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
Denial of Service – De-authentication
Use MAC address of Access Point
Send deauthenticate frames
Send continuously
Send to broadcast address or specific MAC
Users are unable to reassociate with AP
Air-Jack + WLAN-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
Airopeek Trace
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
Airopeek Trace
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
Decode of Deauthentication Frame
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
This is your connection
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – WLAN-Jack
This is your connection
on WLAN-Jack.
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – ESSID-Jack
Is the ESSID a shared secret?
If I mask the ESSID from the AP
beacons then unauthorized users will
not be able to associate with my AP?
Discover Masked ESSID
7/31/2002
Send a deauthenticate frame to the
broadcast address.
Obtain ESSID contained in client probe
request or AP probe response.
Black Hat 2002, Las Vegas NV
Attack Scenarios – ESSID-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios - ESSID-Jack
Airopeek Trace
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – ESSID-Jack
Airopeek Trace
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Monkey-Jack
MITM Attack
Taking over connections at layer 1 and 2
Insert attack machine between victim and
access point
Management frames
Deauthenticate victim from real AP
Send deauthenticate frames to the victim using
the access point’s MAC address as the source
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Monkey-Jack
Victim’s 802.11 card scans channels to search
for new AP
Victim’s 802.11 card associates with fake AP
on the attack machine
Fake AP is on a different channel than the real one
Attack machine’s fake AP is duplicating MAC
address and ESSID of real AP
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Monkey-Jack
Attack machine associates with real AP
Attack machine duplicates MAC address of the
victim’s machine.
Attack machine is now inserted and can
pass frames through in a manner that is
transparent to the upper level protocols
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Monkey-Jack
Before Monkey-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios Monkey-Jack
After Monkey-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios - Monkey-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
Dangers of wireless MITM
Wireless networks are more vulnerable to
MITM attacks than wired networks.
Many security solutions are implemented with
an assumption of a secure layer 1 and 2
Many VPN solutions are implemented with
inadequate authentication for protection
against wireless MITM attacks.
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
WAVEsec
An open source software solution for
securing wireless networks
Uses FreeS/WAN IPSEC implementation
Will thwart passive eavesdropping of
wireless network communications.
Implementation options
X.509 Certificates
Secure DNS
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
Authenticating with WAVEsec gateway
7/31/2002
Client sends modified DHCP request with
client’s public key
WAVEsec gateway inserts client’s public
key into DNS record
Client obtains WAVEsec gateway’s public
key by requesting it from the DNS server
IPSEC tunnel setup
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
Using Kracker-Jack
KJ inserts to 802.11 layer (like monkey-jack)
KJ, using a DNS request, gets victims public
key from DNS server
KJ, using the victims MAC address sends DHCP
request with its own key to replace the victim’s
key in the DNS server
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
KJ initiates ISAKMP main mode SA with the
WAVEsec server
KJ initiates ISAKMP main mode SA with victim
Victim gets new server key by DNS request
serviced by KJ
Two separate IPSEC tunnels are now setup
All traffic passes through KJ unencrypted
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
IKE – ISAKMP/Oakley
Phase 1
Messages 1 and 2 – negotiate characteristics of
security association; no authentication
Messages 3 and 4 – exchange random values
(nonce) and execute Diffie-Hellman exchange to
establish a master key (SKEYID); no authentication
Messages 5 and 6 – exchange information for
mutually authenticating the parties; identity
payload, signature payload, and OPTIONAL
certificate payload
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios – Kracker-Jack
IKE – ISAKMP/Oakley
Phase 2 – Oakley Quick Mode
Define Security Associations
Define keys used to protect IP datagrams
7/31/2002
Black Hat 2002, Las Vegas NV
Attack Scenarios
Shared key authentication attack
7/31/2002
Observe plain text challenge
Observe cipher text response
XOR plain text with cipher text to get key
stream
XOR IP packet with key stream re-using IV
Broadcast ping
Black Hat 2002, Las Vegas NV
Mitigation Strategies
Big guy with a stick
Wireless IDS and Monitoring
AirDefense http://www.airdefense.net
VPN + Strong mutual authentication
RF Signal shaping – Avoiding signal
leaks
7/31/2002
Antennas with directional radiation pattern
Lower Access Point power
Black Hat 2002, Las Vegas NV
Summary
Wireless networks are more susceptible to
active attacks than wired networks
Enable all built-in security capabilities
Use VPN with strong mutual authentication
Monitor wireless network medium (air
space) for suspicious activity
Updates – Black Hat web site or
http://802.11ninja.net
7/31/2002
Black Hat 2002, Las Vegas NV
Advanced 802.11 Attack
Robert Baird
&
Mike Lynn
7/31/2002
Black Hat 2002, Las Vegas NV