War Driving, Why and How

Post on 11-Jan-2016

34 views 2 download

Tags:

description

George Beranek gberanek@anl.gov (630) 252-7219 Senior Security and Network Administrator Argonne National Laboratory NETSECURE 06, Illinois Institute of Technology's Rice Campus Center for Professional Development 08-Mar-2006 Room 118 10:00 am – 11:30 am. War Driving, Why and How. - PowerPoint PPT Presentation

transcript

Argonne National Laboratory is managed by The University of Chicago for the U.S. Department of Energy

War Driving, Why and How

George Beranek gberanek@anl.gov (630) 252-7219

Senior Security and Network Administrator

Argonne National Laboratory

NETSECURE 06, Illinois Institute of Technology's Rice Campus Center for Professional Development

08-Mar-2006 Room 118 10:00 am – 11:30 am

2

What is War Driving?

war driving n. A computer cracking technique that involves driving through a neighborhood with a wireless-enabled notebook computer and mapping houses and businesses that have wireless access points.

Wardriving is driving around a city searching for the existence of Wireless LAN (802.11) Networks. It's locating and logging wireless access points while in motion. Often, this task is automated using dedicated wardriving software and a GPS unit.

Wardriving was invented by Peter Shipley and is now commonly practiced by hobbyists, hackers and security analysts worldwide.

"Wireless technology sets data free from the physical confines of wire — which also means that controlling who receives the data is problematic. Peter Shipley, the director of labs at OneSecure, told me about his new hobby of driving around Silicon Valley and picking up networks on his laptop. war driving is replacing war dialing in the wireless age." —Carole Fennelly, Unix Insider, December 2000

3

Why War Drive?

Do tech managers know where all their wireless LAN access points (AP) are? Since they can be plugged into a LAN and stashed almost anywhere, even by users, they can be a challenge to manage internally. Meanwhile, strangers can be discovering them be "war driving," cruising around with a wireless-enabled laptop seeking wireless LANs that can be entered and explored. —"IBM Tool Targets Wireless 'War Driving'," e-Business Advisor, August, 2002t

From a technical perspective War Driving can be very interesting, White Hat Hacking

As a hobbyist War Driving is both FUN technically challenging.

Bandwidth Stealers (warez sharing, etc...)

Anonymity Seekers (legal and illegal motives)

True Black Hat Hackers

4

Hardware

Required:

– A portable computer (laptop / palmtop)

– Dell Latitude D810 (ear bud recommended)

– A compatible built in or pcmcia Wireless NIC

• external antennae (omnidirectional / unidirectional)

– A GPS http://www.cantenna.com/

• http://www.deluoelectronics.com/ Optional: (but very very cool)

– Linksys WRT54G Wireless Router / Access Point

5

Netstumbler vs. Kismet (Windows vs. Linux) Netstumbler http://www.netstumbler.com/

– Runs on Windows XP

– Great for a quick war-walk / war-drive or a quick vulnerability assessment (rogue access point detection) or coverage / interference testing on an unprotected network, but....

– Netstumbler sends out 802.11 “Probe Request” frames for SSID “Any” providing no real advantage, but making it easily detectable.

– Netstumbler does not sniff. Kismet http://www.kismetwireless.net/

– Runs on Linux / Unix (client ported to Windows)

– Kismet puts your wireless NIC into RFMON mode and does Passive Scanning

– Kismet will discover and report the IP address, netmask, and default gateway as well as the SSID of “no ssid” sites if possible.

– Kismet sniffs and records packets for later use with Ethereal, AirSnort, AirCrack, etc...

– Kismet's intrusion detection feature will detect many probing / attack fingerprints including Netstumbler

6

Basic Software Packages that you'll need:

– gpsd GPS (Global Positioning System) service daemon http://gpsd.berlios.de/

– kismet Wireless 802.11b monitoring tool http://www.kismetwireless.net/

Packages that you'll want:

– Ethereal network traffic analyzer http://www.ethereal.com/

– gpsdrive Car navigation system http://gpsdrive.kraftvoll.at/

– festival general speech synthesis http://www.cstr.ed.ac.uk/projects/festival/

– MySQL database package http://www.mysql.com/

– xgps gui client for the GPS service daemon http://gpsd.berlios.de/xgps.html

– wifi-radar gui for managing Wi-Fi profiles http://www.bitbuilder.com/wifi_radar/

Other Packages:

– Airsnort WLAN sniffer http://airsnort.shmoo.com/

– Aircrack wireless WEP cracker http://www.wirelessdefence.org/Contents/AircrackMain.htm

– Dsniff sniffs network traffic for cleartext insecurities http://www.monkey.org/~dugsong/dsniff/

7

Setup

Install NIC, GPS, and Software Paclages Compile RFMON mode NIC driver kernel modules if necessary Setup the MySQL database

– mysql -u root -p < /usr/share/gpsdrive/create.sql (This will add a user : gast / gast)

Edit /etc/kismet/kismet.conf for your NIC and configuration.

– source=ipw2915,eth1,BuiltIn,6

– source=orinoco,eth2,BuiltIn,6

– source=cisco,eth2,BuiltIn,6

– source=kismet_drone,192.168.108.1:3501,drone

8

Execution

Start the GPS daemon:

– `ps -ef | grep -i gps` Kill gpsd -F /var/run/gpsd.sock if present

– `dmesg | grep -i usb` check to make sure your GPS has associated with a port

– `ln -s /dev/ttyUSB0 /dev/gps ; gpsd -K -f /dev/gps ; ps -ef | grep -i gps` make sure that mysqld is running `ps -ef | grep -i sql` , `/etc/init.d/mysql

restart` if not make sure festival is running `ps -ef | grep -i sql` , `festival --server &` if

not Add localhost to xhosts `xhost ; xhost + localhost ; xhost` Start xgps `xgps -speedunits mph -altunits ft &` Make sure that no kismet components are running `ps -ef | grep -i

kismet`, kill if present Start Kismet `kismet` Start gpsdrive `gpsdrive` Start wifi-radar `wifi-radar`

Now Do Your War Drive!

9

Kismet can be integrated with MySQL, GPSDrive, and SNORT

10

War Driving with Kismet http://www.kismetwireless.net/

Synthesized voice announces discoveries. (Great while driving, but an ear bud makes it even better)

Real Time Commands:

– s Sort network list

– l Show wireless card power levels

– i Detailed information about selected network

– r Packet rate graph

– a Statistics

– d Dump printable strings

– e List Kismet servers

– m Toggle muting of sound and speech

– c Show clients in current network

– H Return to normal channel hopping

– x Close popup window

– h Help (Many Other Controls)

11

Mapping the results

`gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers]`

12

Power

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

13

Power

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

14

IIT Rice Campus with Intel ipw2915 mini pci internal

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

15

IIT Rice Campus with Orinoco Gold pcmcia card and external antenna

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

16

IIT Rice Campus with Linksys WRT54G OpenWRT Kismet Drone

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

17

IIT Rice Campus aggregate of all 3 war drives

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

18

ShoniBrook I

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

19

ShoniBrook II

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

20

ShoniBrook III

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

21

1840

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

22

2648

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

23

FCC Berwyn

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

24

Argonne 200

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

25

Argonne 300

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

26

Unidirectional Antenna & War Walk to eliminate clutter

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

27

ShoniBrook GPSDrive with Kismet (friends mode)

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

28

ShoniBrook GPSDrive with MySQL

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

29

IIT Rice Campus GPSDrive with Kismet

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

30

IIT Rice Campus GPSDrive with MySQL

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

31

IIT Rice Campus using Orinoco NIC and Unidirectional Cantenna

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

32

A War Walk using Windows XP

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

33

NetStumbler War Walk of IIT Rice Campus

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

34

Results of Kismet IIT Rice Campus War Walk (No GPS indoors) Network 1: "rice_wireless" BSSID: "00:C0:49:A9:7B:B1" infrastructure 06

10.0.0.67 Network 2: "rice_wireless" BSSID: "00:C0:49:A9:75:5A" infrastructure 06 10.0.0.0 Network 3: "rice_wireless" BSSID: "00:C0:49:A9:A0:FF" infrastructure 06

10.0.0.173 Network 4: "rice_wireless" BSSID: "00:C0:49:A9:75:8E" infrastructure 01 10.0.0.1 Network 5: "voiplab" BSSID: "00:40:96:A1:11:1D" infrastructure 03 WEP Network 6: "tsunami" BSSID: "00:0D:28:8E:56:DE" probe 00 Network 7: "rice_wireless" BSSID: "00:C0:49:A9:75:7A" infrastructure 11

216.47.135.65 Network 8: "cuwireless.net" BSSID: "02:02:6F:21:E9:1A" ad-hoc 11

169.254.233.26 Network 9: "rice_wireless" BSSID: "00:C0:49:A9:75:80" infrastructure 11

192.168.1.3 Network 10: "rice_wireless" BSSID: "00:C0:49:A9:75:88" infrastructure 11

10.0.0.101 Network 11: "BlackHole" BSSID: "00:12:17:08:74:58" infrastructure 01 WEP Network 12: "wirelessR624" BSSID: "00:0F:3D:3B:42:A8" infrastructure 06 WEP Network 13: "2WIRE501" BSSID: "00:0D:72:D5:C3:99" infrastructure 06 WEP Network 14: "linksys" BSSID: "00:13:10:05:50:AE" infrastructure 06 Network 15: "2WIRE937" BSSID: "00:14:95:78:BE:B1" infrastructure 06 WEP Network 16: "<no ssid>" BSSID: "00:12:17:E4:CE:22" probe 00 Network 17: "2WIRE085" BSSID: "00:0D:72:A2:0D:F9" infrastructure 06 WEP Network 18: "Aegus 243" BSSID: "00:14:6C:45:8D:E6" infrastructure 11

35

Map Sources – GPS maps are available from many sources Mapblast http://www.slhonline.org/MapBlast! Mapblast!.htm

http://www.mapblast.com/ MapPoint http://mappoint.msn.com/ Terraserver http://www.terraserver.com/ http://terraserver.microsoft.com/ Tiger Census http://tiger.census.gov/cgi-bin/mapbrowse-tbl FreeGIS http://www.freegis.org/ http://www.freegis.org/browse.en.html NASA satellite topology maps

ftp://mitch.gsfc.nasa.gov/pub/stockli/bluemarble/ USGS http://www.usgs.gov/

• Netstumbler data can be plotted at a number of websites http://www.wifimaps.com/

36

Data Analysis (/var/log/kismet/Kismet-Mar-03-2006-10.dump) Kismet's .dump files can be read and analyzed by Ethereal, AirSnort,

AirCrack, etc... Kismet

37

Data Analysis

AirSnort – load pcap file Kismet-Feb-15-2006-3.dump

38

Data Analysis AirCrack – Kismet-Feb-15-2006-2.dump aircrack Kismet-Feb-15-2006-2.dump

39

Linux on the Linksys WRT54G

History

– The WRT54G was released in 2003 in anticipation of the 802.11g standard.

– In June 2003 some folks on the Linux Kernel Mailing List sniffed around the WRT54G and found that its firmware was based on Linux components. Because Linux is released under the GNU General Public License, or GPL, the terms of the license obliged Linksys to make available the source code to the WRT54G firmware. As most router firmware is proprietary code, vendors have no such obligation. It remains unclear whether Linksys was aware of the WRT54G’s Linux lineage, and its associated source requirements, at the time they released the router. But ultimately, under outside pressure to deliver on their legal obligation under the GPL, Linksys open sourced the WRT54G firmware in July 2003.

– With the code in hand, developers learned exactly how to talk to the hardware inside and how to code any features the hardware could support. It has spawning a handful of open source firmware projects for the WRT54G that extend its capabilities, and reliability, far beyond what is expected from a cheap consumer-grade router. Seattle Wireless is generally credited as being the first to upload new firmware to the WRT54G. You can now actually run snort or kismet right on your wireless router.

40

Linksys Firmware Replacements

There now exists plethora of firmware replacements for the WRT54G, such as:

– Sveasoft (no longer free) http://www.sveasoft.com/

– Wifi-Box https://sourceforge.net/projects/wifi-box

– BatBox http://www.batbox.org/wrt54g-linux.html These distributions can provide a lot of additional functionality:

– Radio Transmit power adjustment

– Antenna selection

– Iptables filtering / Shorewall firewall

– Snort intrusion detection

– Telnet, SSH, local caching DNS, SNMP daemons

– Kismet Drone With the right replacement firmware, it can do what you’d only expect to be

able to on a commercial-grade router costing several times as much BUT it can be difficult to find a firmware that contains exactly the functionality that you're looking for.

41

OpenWRT http://openwrt.org/

The OpenWRT firmware takes a completely different approach, turning your WRT54G into a complete generalized interactive Linux system including package (ipkg list) management. It is not based on Linksys code at all.

Some notable features are the ability to telnet/SSH to your router, install software such as Snort, Kismet, Mini-Sendmail, and Iptables, and create and control VLANs for every Ethernet port on the device.

By default, OpenWrt's installation emulates the normal Linksys firmware functionality. This means that although you installed OpenWrt, your router still acts as a wireless access point and switch. (nvram show | more)

OpenWrt obeys common networking conventions, taking advantage of route, ifconfig, and /etc/resolv.conf.

One of the great things about OpenWrt is its use of iPKG, a tiny package management system inspired by Debian's APT. With iPKG, installing packages, such as tcpdump, is simple as running a command like ipkg install tcpdump. Use ipkg update and ipkg list to see what add-on software is available.

You could use the WRT54G as a repeater or a bridge. Create a wireless distribution system (WDS) or a mesh network. Run a VPN server or a VoIP server or a managed hotspot with a RADIUS server. Manage bandwidth use per protocol. Control traffic shaping. Support IPv6. Boost antenna power. Remotely access router logs. Operate the router as a miniature low-power PC, running a variety of Linux applications. (UART hardware mod)

42

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/

43

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/cgi-bin/webif/wireless-config.sh

44

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/cgi-bin/webif/ipkg.sh

45

Wireless intrusion detection using stationary Kismet drones

Kismet will provide alerts based on fingerprints (specific netstumbler versions, other specific attacks) and trends (unusual probes, excessive disassociation, etc). Kismet focuses on the 802.11 (layer 2) network layer, and provides integration via named pipes with layer3+ IDS systems such as Snort.

You can create inexpensive Kismet drone(s) using WRT54G Wireless Routers and place them strategically at your facility. A single Linux system can act as the Kismet client for all of these drones. In this way your wireless installation can be continuously and inexpensively monitored. Logs can even be intelligently parsed for the appearance of rogue access points with perl, swatch, etc.

46

Turn your Wireless Laptop / Desktop into an Access Point

By building your own Access Point on a Linux server you can:

– Run an iptables firewall to protect your network

– Set up intrusion detection

– Build a captive portal

– Build a web caching server

– Actually you can do ALMOST ANYTHING!ALMOST ANYTHING! The ability to turn you laptop into a WAP can come in very handy at times. The ability to turn you laptop into a WAP can come in very handy at times.

It can overcome the disadvantages of ad-hoc mode. It can also be used It can overcome the disadvantages of ad-hoc mode. It can also be used to spoof an existing AP to attack / audit a wireless installation.to spoof an existing AP to attack / audit a wireless installation.

What is actually necessary to achieve access point functionality is to get your wireless NIC into MASTER mode or to emulate this mode. `iwconfig wlan0 essid myAP mode master`

This can be accomplished through the use of enhanced driver software depending upon your NIC's chipset: hostap for Prism / cisco Aironet , Hermes AP for Orinoco cards , madwifi for Atheros , etc.

47

Specialized Linux Distributions

If you're a Windows user who doesn't want to install Linux then here's a live filesystem CD distribution that will run everything you need without touching your hard drive!

– Knoppix STD (Security Tool Distribution) http://www.knoppix-std.org/

• Contains: http://www.knoppix-std.org/tools.html

– airsnarf : rogue AP setup utility

– airsnort : sniff, find, crack 802.11b

– airtraf : 802.11b network performance analyzer

– gpsdrive : use GPS and maps

– kismet 3.0.1 : for 802.11 what else do you need?

– kismet-log-viewer : manage your kismet logs

– macchanger : change your MAC address

– wellenreiter : 802.11b discovery and auditing

– patched orinoco drivers : automatic (no scripts necessary) WARLINUX

– an easy form of Linux with Kismet for windows users to try out https://sourceforge.net/projects/warlinux/

48

Some Useful Commands

iwconfig – used to configure the basic operating parameters of your wireless NIC.

cardctl - used to monitor and control the state of PCMCIA sockets iwlist - shows current parameters and available access points - `iwlist eth1

scanning` iwspy - shows quality of link parameters iwpriv – allows you to configure private wireless options specific to a

single wireless driver.

49

Wireless Security Countermeasures Change Default Administrator Passwords (and Usernames) Turn on highest level WPA / WEP Encryption Change the Default SSID Enable MAC Address Filtering Disable SSID Broadcast Assign Static IP Addresses to Devices Position the Router or Access Point Safely Turn Off the Network During Extended Periods of Non-Use Use strong encryption like ssh for all applications you use over the wireless network. Encrypt wireless traffic using a VPN Keep firmware up to date Authenticate wireless users with protocols like EAP Create a dedicated segment for your Wireless Network, and take additional steps to

restrict access to this segment Regularly TEST the security of your wireless network, using the latest Wardriving

Tools. Enable strict LOGGING on all devices and routinely audit these logs. Implement Wireless Intrusion Detection

50

Some Excellent References

Linux Unwired by Roger Weeks

– A comprehensive and thoroughly useful treatment of the basics of wireless Linux.

– Great sections on Blue Tooth and IR for Linux too.

– http://www.oreilly.com/catalog/lnxunwired/

WI-FOO : The Secrets of Wireless Hacking Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky

– A much more advanced reference.

– The definitive guide to wireless attack and defense.

– http://www.wi-foo.com/

51

QUESTIONS?

USE OPEN SOURCE http://www.opensource.org/ UBUNTU http://www.ubuntu.com/ FIREFOX http://www.mozilla.com/firefox/ Open Office http://www.openoffice.org/ http://www.anl.gov/ Argonne National Laboratory is located on 1,500 acres, 25 miles southwest of

downtown Chicago.

52

Speaker Bio

George Beranek began his professional computer career in the early 1980's as a test engineer / designer programming in HP Rocky Mountain Basic, Pascal, Fortran, and C supplying intelligent replacement for electro-mechanical test systems as an independent contractor for Eaton Corporation and Gould Research Center. In 1990 he transitioned into Unix System and Network administration at Motorola where he eventually headed a team of system administration and networking professionals dedicated to quick response and high performance technical computing for their Cellular Infrastructure International Systems Engineering Group during the peak of their cellular boom. George is presently a Senior Security and Network Administrator at Argonne National Laboratory where he essentially functions as an internal Linux consultant. George received a BS in Electrical Engineering and Computer Science from Northwestern University's Technological Institute and a MS in Electrical Engineering and Computer Engineering from IIT. He is also a RedHat Certified Engineer (RHCE) but of late has become passionate about the Debian based Ubuntu Linux distribution. George has been a member of the IEEE for the past 24 years.

53

The Advanced Photon Source (APS) is the nation’s brightest source of X-rays for research.