Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Wifi Security  -or- Descending Into Depression  and Drink Mike Kershaw / Dragorn [email_address]
 
802.11 2.4 and 5.8 GHz
Multiple data encodings depending on spec (11b/a/g/n)
All fundamentally spread-spectrum
This means we can interact with it easily
Packing your bags Unlike frequency-hopping protocols, trivial to capture 802.11
Generic Wifi card (Alfa 11g is cheap to start with)
Support in the OS (more on this later)
Total cost of ownage: $50 or so
I come not to bury 802.11... We've got a pretty good idea about 802.11 security by now
By “we” I mean “security professionals”
But even “the great unwashed” are clueing in, kind of.  Encryption on home nets is up
Secure configurations WiFi is secure in proper deployments
WPA-Enterprise
Per-user authentication
Per-user keying
Mutual auth via certificates
Strong encryption We've got a pretty solid crypto system
AES used in WPA-CCMP as yet unbroken
TKIP showing flaws, but is already past sell-by date, move to CCMP
“Done Properly” WPA-Enterprise secure “done correctly”
Opportunities for failure exist if users don't validate certs (or are allowed to say 'ok')
TKIP will eventually fall
802.11 AP Defense We've been doing this for a long time now
Best defense: Strong network architecture (again, WPA)
Monitoring for conflicting or spoofed access points
Client protection attempts to defend known good users
Client Protection Inter-client traffic can be blocked at the AP
Defending clients on a strong network is easy since the AP controls crypto
Defending clients on open AP is very hard
Denial of Service Attacks Management frames unprotected
Spoof AP, tell all clients to disconnect
Pure channel denial (flood channel with noise)
“ Crowbar” defense – find the person doing it and hit them with a crowbar.
Punching 802.11 in the gut Absurdly  easy
Management frames are totally unprotected
Open networks are un-authenticateable
It's shared media
Strangers with candy Avoiding hostile networks requires  smart  users
Users are – typically – bad decision makers
The OS doesn't help: It likes to join networks it's seen before
It's hard to tell what's real, assuming the user even looks
 
Going viral Users  like  free wi-fi
Who  wouldn't  want to join “ Free Public Wi-Fi ”?
Once, long ago, this network probably existed
When windows can't find a network, it likes to make an ad-hoc version...
Then someone else tries to join
Sore throats Of course, this junk ad-hoc network doesn't go anywhere
Unless, say, someone brought up a network with the same name...
…  And handed out IP addresses...
Which would get us LAN access to the system
But that would never happen, right?
Being too trusting Clients are  really  trusting
If you say you're network  Foo , you  must  be, right?
It's very hard to avoid really bad behavior as a user
Roaming sure looks a lot like spoofing
802.11 Roaming Multiple AP with same SSID
Client assumes the SSID is a common network
Roams to the strongest signal
Data handoff responsibility of backend (controller or common L2 network)
Only differentiator is MAC addr
 
The packets must flow So if an attacker has a stronger radio than the AP...
You may not be talking to who you think you're talking to
So long as the packets go through, the user never knows
Man in the middle = Win
Stuck in the middle with... Dual-interface attacker
Interface 1 connects to legitimate network (any network, or cell data, or...)
Interface 2 provides spoofed “Free Public Wifi” network.. or rhymes with “FarDucks”.. or...
More Man-in-the-middle Many sites encrypt login, but not session
Session cookies, data, etc vuln
“ The Middler”, SSLSniff, Cookie Monster
Hijack sessions via MITM
This bores me All of these attacks are really pretty boring
Why?  They're really obvious.
Might still get some users, but it'll be pretty blatant
Points  ARE  awarded for style.  Or at least, for stealth.
So wait... Didn't we say 802.11 is  shared media !?
We just found  the best time machine ever !
 
And not some hippy do-gooder  time machine, either
 
But one where we get to bring back  weapons from the future
 
The bad old days Hair metal, grunge, ripped jeans
Unswitched shared media Ethernet...
Sniffing the entire segment …
TCP session hijacking...
That's too easy It'd never be  that  easy, right?
Right ?
People  have  to have gotten smarter by now...
You'd  never  take a system from a secure network to an insecure network,  right ?
 
Mmm, latte … and airports
The gym
A hotel
Bookstores
McDonalds
… shmoocon?
Making a mess Management frames have no protection
Open networks have no client protection
Nothing stops us from spoofing the AP and talking directly to a client!
No protection AP may try to filter inter-client communication by blocking packets when they hit the AP
By generating an 802.11 header FROM the AP and TO the client
The client thinks the packet is legit
The AP has no opportunity to act on it
We can communicate directly with “protected” clients on open networks
Making it easy: LORCON Writing the same injection code for every app sucks

More Related Content

Wifi Security, or Descending into Depression and Drink