4 Attacks on Wireless Networks Wired Equivalent Privacy WEP Protocol o Mechanism o Weaknesses in the WEP Scheme Wi-Fi Protected Access WPA IEEE 802.11i/WPA2 Virtual Private Netw
Trang 1NETWORK SECURITY
WIRELESS SECURITY ISSUES
MAI Xuân Phú xuanphu150@gmail.com
1
Trang 22
Attacks on Wireless Networks
Wired Equivalent Privacy (WEP) Protocol
o Mechanism
o Weaknesses in the WEP Scheme
Wi-Fi Protected Access (WPA)
IEEE 802.11i/WPA2
Virtual Private Network (VPN)
o Point-to-Point Tunneling Protocol (PPTP)
o Layer-2 Transport Protocol (L2TP)
Internet Protocol Security (IPSec)
Trang 44
Attacks on Wireless Networks
Wired Equivalent Privacy (WEP) Protocol
o Mechanism
o Weaknesses in the WEP Scheme
Wi-Fi Protected Access (WPA)
IEEE 802.11i/WPA2
Virtual Private Network (VPN)
o Point-to-Point Tunneling Protocol (PPTP)
o Layer-2 Transport Protocol (L2TP)
Internet Protocol Security (IPSec)
Trang 5Internet security threats
o nmap (http://www.insecure.org/nmap/) mapper:
“network exploration and security auditing”
Countermeasures?
5
Source: Jim Kurose & Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet,
3rd edition, Chapter 8: Network Security
Trang 6Internet security threats
o record traffic entering network
o look for suspicious activity (IP addresses, pots being scanned sequentially)
6
Trang 7Internet security threats
Packet sniffing:
o broadcast media
o promiscuous NIC reads all packets passing by
o can read all unencrypted data (e.g passwords)
o e.g.: C sniffs B’s packets
Source: Jim Kurose & Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet,
3rd edition, Chapter 8: Network Security
Trang 8Internet security threats
Packet sniffing: countermeasures
o all hosts in organization run software that checks periodically if host interface
Trang 9Internet security threats
Source: Jim Kurose & Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet,
3rd edition, Chapter 8: Network Security
Trang 10Internet security threats
IP Spoofing: ingress filtering
o routers should not forward outgoing packets with invalid source addresses (e.g., datagram source address not in router’s network)
o great, but ingress filtering can not be mandated for all networks
Trang 11Internet security threats
Denial of service (DOS):
o flood of maliciously generated packets “swamp” receiver
o Distributed DOS (DDOS): multiple coordinated sources swamp receiver
o e.g., C and remote host SYN-attack A
A
B
C
SYNSYNSYN
SYN
SYNSYN
SYN
Countermeasures?
11
Source: Jim Kurose & Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet,
3rd edition, Chapter 8: Network Security
Trang 12Internet security threats
Denial of service (DOS): countermeasures
o filter out flooded packets (e.g., SYN) before reaching host: throw out good with bad
o traceback to source of floods (most likely an innocent, compromised machine)
A
B
C
SYNSYNSYN
SYN
SYNSYNSYN
12
Trang 13Wireless Network Security
Wireless stations, or nodes, communicate over a wireless medium
Security threats are imminent due to the open nature of communication
o Two main issues: authentication and privacy
o Other serious issues: denial-of-service…
A categorization is required to understand the issues in each situation
13
Source: K Kothapalli & B Bezawada, Security Issues and Challenges in Wireless Networks
Trang 14Wireless Threats
Medium is open to most attackers in the neighborhood of a wireless node
o Near-impossibility of establishing a clear physical security boundary
• Higher gain antennas can be used to overcome distance or a weak signal
Remote attackers can aim at:
o The physical layer
o The link layer
• Media Access Control (MAC)
• Logical link
o The network layer 14
Trang 15o Capture passwords, authentication tokens, etc
Authentication and Accountability attacks
o Anonymity for attacker
o Reassign accountability to network or account owners 15
Source: Pascal Meunier, Network Security, Section 7
Trang 16Threats in Present Solutions MAC Layer
Denial of Service
o Can hog the medium by sending noise continuously.
o Can be done without draining the power of the adversary.
o Depends on physical carrier sensing threshold.
16
z
A
Trang 17Threats in Present Solutions MAC Layer
802.11 standard uses Access Control Lists for admission control.
If MAC address not in the list, then the node is denied access.
o But easy to spoof MAC addresses.
00:1A:A0:FD:FF:2E00:0C:76:7F:DF:4900:13:D3:07:2F:A800:2F:B8:77:EA:B5
17
Source: K Kothapalli & B Bezawada, Security Issues and Challenges in Wireless Networks
Trang 18Threats in Present Solutions Network Layer
Ad hoc networks
Trang 19Threats in Present Solutions Network Layer
Denial-of-service
o Easy to mount in wireless network protocols.
o One strategically adversary can generally disable a dense part of the network.
Trang 20Can simply engage in conversation and drain battery power of other nodes – power exhaustion attack
o Send lot of RREQ messages but never use the routes.
z
A
RREQ(a) RREQ(b) RREQ(c)
….
Threats in Present Solutions Network Layer
20
Trang 21Threats in Present Solutions Network Layer
Broadcast nature of communication
o Each message can be received by all nodes in the transmission range
o Packet sniffing is a lot easier than in wired networks.
o Poses a data privacy issue
s t
A
21
Source: K Kothapalli & B Bezawada, Security Issues and Challenges in Wireless Networks
Trang 22Threats in Present Solutions Network Layer
Route discovery in ad hoc networks
o AODV discovers route by RREQ/RREP.
o Few adversarial nodes can fail route discovery.
o Difficult to detect route discovery failures.
o Also vulnerable to RREP replays.
RREQ
RREQ
22
Trang 23Threats in Present Solutions Network Layer
Packet dropping
o Wired networks can monitor packet drops reasonably
o Such mechanisms are resource intensive for wireless networks
o AODV has timeouts but no theoretical solutions
• Difficult to distinguish packet drops, say RREQs, from existence of route itself
non-o Nnon-odes snon-ome times behave selfishly to preserve resources
23
Source: K Kothapalli & B Bezawada, Security Issues and Challenges in Wireless Networks
Trang 24Threats in Present Solutions Network Layer
attacks
Attacker reveals paths but does not forward data along these paths.
s t
24
Trang 25Easy to infect mobile devices.
Rerouting content through the base station poses privacy issues.
o Bluetooth networks and ad hoc networks do not have
a base station facility.
Contrast with wired networks with firewalls, filters, sandboxes.
Threats in Present Solutions Application Layer
25
Source: K Kothapalli & B Bezawada, Security Issues and Challenges in Wireless Networks
Trang 26Wireless Network Attack Types
Access control attacks
Trang 27Access control attacks
Type of Attack Description Methods and Tools
War Driving
Discovering wireless LANs by listening to beacons or sending probe requests, thereby providing launch point for further attacks
Airmon-ng, DStumbler, KisMAC, MacStumbler, NetStumbler, Wellenreiter, WiFiFoFum
Rogue Access Points
Installing an unsecured AP inside firewall, creating open backdoor into trusted network
Any hardware or software AP
Ad Hoc Associations
Connecting directly to an unsecured station to circumvent AP security or
wicontrol
802.1X RADIUS Cracking
Recovering RADIUS secret by brute force from 802.1X access request, for use by evil twin AP
Packet capture tool on LAN
or network path between
AP and RADIUS server
27
Trang 28Confidentiality attacks
Type of Attack Description Methods and Tools
Eavesdropping Capturing and decoding unprotected application traffic to obtain potentially
sensitive information
bsd-airtools, Ettercap, Kismet, Wireshark, commercial analyzers
WEP Key Cracking Capturing data to recover a WEP key using passive or active methods
Aircrack-ng, airoway, AirSnort, chopchop, dwepcrack, WepAttack, WepDecrypt, WepLab, wesside
Evil Twin AP Masquerading as an authorized AP by beaconing the WLAN's service set
identifier (SSID) to lure users
cqureAP, D-Link G200, HermesAP, Rogue Squadron, WifiBSD
AP Phishing Running a phony portal or Web server on an evil twin AP to "phish" for user
logins, credit card numbers
Airpwn, Airsnarf, Hotspotter, Karma, RGlueAP
Running traditional man-in-the-middle
28
Trang 29Integrity attacks Type of Attack Description Methods and Tools
802.11 Frame Injection Crafting and sending forged 802.11 frames.
Airpwn, File2air, libradiate, void11, WEPWedgie, wnet dinject/reinject
802.11 Data Replay Capturing 802.11 data frames for later (modified) replay Capture + Injection Tools
802.1X EAP Replay
Capturing 802.1X Extensible Authentication Protocols (e.g., EAP Identity, Success, Failure) for later replay.
Wireless Capture + Injection Tools
between station and AP
802.1X RADIUS Replay
Capturing RADIUS Accept or Reject messages for later replay.
Access-Ethernet Capture + Injection Tools
between AP and authentication server 29
Trang 30Authentication attacks - 1
Type of Attack Description Methods and Tools
Shared Key Guessing
Attempting 802.11 Shared Key Authentication with guessed, vendor default or cracked WEP keys
WEP Cracking Tools
Application Login Theft
Capturing user credentials (e.g., e-mail address and password) from cleartext application protocols
Ace Password Sniffer, Dsniff, PHoss,
WinSniffer
Domain Login Cracking
Recovering user credentials (e.g., Windows login and password) by cracking NetBIOS password hashes, using a brute-force or dictionary attack tool
John the Ripper, L0phtCrack, Cain
VPN Login
Recovering user credentials (e.g., PPTP password or IPsec Preshared ike_scan and ike_crack (IPsec), 30
Trang 31Authentication attacks – 2
Type of Attack Description Methods and Tools
802.1X Identity Theft
Capturing user identities from cleartext 802.1X Identity Response
802.1X Password Guessing
Using a captured identity, repeatedly attempting 802.1X authentication to guess the user's password.
Password Dictionary
802.1X LEAP Cracking
Recovering user credentials from captured 802.1X Lightweight EAP (LEAP) packets using a dictionary attack tool to crack the NT password hash.
Anwrap, Asleap, THC-LEAPcracker
802.1X EAP Downgrade
Forcing an 802.1X server to offer a weaker type of authentication using forged EAP-Response/Nak packets File2air, libradiate 31
Trang 32Availability attacks - 1
Type of Attack Description Methods and Tools
AP Theft Physically removing an AP from a public space. "Five finger discount"
Queensland DoS
Exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy
An adapter that supports
CW Tx mode, with a level utility to invoke continuous transmit
low-802.11 Beacon Flood
Generating thousands of counterfeit 802.11 beacons to make it hard for stations to find a legitimate AP
FakeAP
802.11 Associate / Authenticate Flood
Sending forged Authenticates or Associates from random MACs
to fill a target AP's association table
FATA-Jack, Macfld
802.11 TKIP MIC
Generating invalid TKIP data to exceed the target AP's MIC error File2air, wnet dinject, 32
Trang 33Availability attacks - 2
Type of Attack Description Methods and Tools
802.11 Deauthenticate Flood
Flooding station(s) with forged Deauthenticates or Disassociates
to disconnecting users from an AP
Aireplay, Airforge, MDK, void11, commercial WIPS
802.1X EAP-Start Flood
Flooding an AP with EAP-Start messages to consume resources or crash the target QACafe, File2air, libradiate802.1X EAP-Failure
Observing a valid 802.1X EAP exchange, and then sending the station a forged EAP-Failure message
QACafe, File2air, libradiate
802.1X Death
EAP-of-Sending a malformed 802.1X EAP Identity response known to cause some APs to crash QACafe, File2air, libradiate
802.1X EAP Length Attacks
Sending EAP type-specific messages with bad length fields to try to crash an AP or RADIUS
server
QACafe, File2air, libradiate
33
Trang 3434
Attacks on Wireless Networks
Wired Equivalent Privacy (WEP) Protocol
o Mechanism
o Weaknesses in the WEP Scheme
Wi-Fi Protected Access (WPA)
IEEE 802.11i/WPA2
Virtual Private Network (VPN)
o Point-to-Point Tunneling Protocol (PPTP)
o Layer-2 Transport Protocol (L2TP)
Internet Protocol Security (IPSec)
Trang 35Wired Equivalent Privacy (WEP):
authentication as
o host requests authentication from access point
o access point sends 128 bit nonce
o host encrypts nonce using shared symmetric key
o access point decrypts nonce, authenticates host
no key distribution mechanism
authentication: knowing the shared key is enough
35
Source: Jim Kurose & Keith Ross, Computer Networking: A Top Down Approach Featuring the Internet,
3rd edition, Chapter 8: Network Security
Trang 36WEP data encryption
Host/AP share 40 bit symmetric key permanent)
(semi-Host appends 24-bit initialization vector (IV) to create 64-bit key
64 bit key used to generate stream of keys, kiIV
kiIV used to encrypt ith byte, di, in frame:
ci = di XOR kiIV
IV and encrypted bytes, ci sent in frame
36
Trang 38802.11 WEP encryption
Sender-side WEP encryption
38
IV (per frame)
KS: 40-bit secret symmetric
key k1IV k2IV k3IV … kNIV kN+1IV… kN+1IV
d1 d2 d3 … dN CRC1 … CRC4
c 1 c 2 c 3 … c N c N+1 … c N+4
plaintext frame data plus CRC
key sequence generator ( for given KS, IV)
802.11 header IV
WEP-encrypted data plus CRC
Figure 7.8-new1: 802.11 WEP protocol
Trang 39WEP Weakness
39
Trang 40Breaking 802.11 WEP encryption
Security hole:
24-bit IV, one IV per frame, -> IV’s eventually reused
IV transmitted in plaintext -> IV reuse detected
Attack:
o Attacker causes victim to encrypt known plaintext d 1 d 2 d 3 d 4 …
o Attacker sees: c i = d i XOR k i IV
o Attacker knows c i d i , so can compute k i IV
o Attacker knows encrypting key sequence k 1 IV k 2 IV k 3 IV …
o Next time IV is used, attacker can decrypt!
40
Trang 4141
Attacks on Wireless Networks
Wired Equivalent Privacy (WEP) Protocol
o Mechanism
o Weaknesses in the WEP Scheme
Wi-Fi Protected Access (WPA)
IEEE 802.11i/WPA2
Virtual Private Network (VPN)
o Point-to-Point Tunneling Protocol (PPTP)
o Layer-2 Transport Protocol (L2TP)
Internet Protocol Security (IPSec)
Trang 42WPA Overview
Published in 2003 by the Wi-Fi Alliance
Based on an early version (draft 3) of the IEEE 802.11i standard
Three major objectives:
o Correct all the security flaws in WEP
o Make existing WEP hardware also support WPA
o Ensure WPA is compatible with the 802.11i standard
Use 802.1X for authentication
Temporal Key Integrity Protocol (TKIP):
o Use Michael Algorithm, a specifically designed integrity check algorithm
o Use a new key structure to prevent message replays and de-correlate public
initialization vectors from weak RC4 keys 42
Trang 43Device Authentication and Access Control
Home-and-small-office WPA:
o For home and small office
o Use WEP’s preset secret key
Enterprise WPA:
o Secure corporate WLANs
o Uses Authentication Server (AS)
o Different user has different pre-shared secret key with the AS
o Pre shared secrets are presented in the form of passwords
o Adopts 802.1X Port Based Network Access Control protocol to
authenticate STAs
43
J Wang Computer Network Security Theory and Practice Springer 2008
Trang 44802.1X in a Nutshell
1 STA sends a request to
AP AP asks for the identity of STA.
2 STA sends AP its identity
and signature using the master key shared with the AS AS verifies STA and passes decision to
AP AP then informs STA about AS’s decision.
3 STA is granted access to
WLAN
44