+ All Categories
Home > Documents > 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security...

2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security...

Date post: 15-Mar-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
79
2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp
Transcript
Page 1: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp: Wireless LAN Security Exercises

2013 JMU Cyber Defense Boot Camp

Page 2: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Questions

• Have you used a wireless local area network before?– At home?– At work?

• Have you configured a wireless AP before?

• Have you heard these terminologies before?– WiFi (Wireless Fidelity)– Wireless access point

(AP), service set identification (SSID)

– Hot spots, evil twins– WEP, WPA, WPA2

2013 Summer Camp 2

Page 3: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Organization• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

32013 Summer Camp

Page 4: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Impatient with Background?

• You can jump to the exercise part (slide 45) now– IF you believe that you have all the background

2013 Summer Camp 4

Page 5: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

52013 Summer Camp

Page 6: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Wired Computer Networks

• It is mature but …

2013 Summer Camp 6

`

Home Computer 1

134.126.20.236

GW(Ubuntu)

Server 2 (Win2k3)

Server 3 (BT5R3)

`

Computer x(in CS 143)

`

Computer y(in CS 143)

192.168.143.0/24

10.10.1.0/24

`

Home Computer 2

Page 7: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Wired Computer Network: Inconvenience

• It is mature

2013 Summer Camp 7

`

Home Computer 1

134.126.20.236

GW(Ubuntu)

Server 2 (Win2k3)

Server 3 (BT5R3)

`

Computer x(in CS 143)

`

Computer y(in CS 143)

192.168.143.0/24

10.10.1.0/24

`

Home Computer 2

Page 8: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

8

Wireless Would be Nice

2013 Summer Camp

Page 9: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

9

Hardware?

Wireless Access Point (AP)

Wireless card (WiFi adapter card)

2013 Summer Camp

Page 10: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

10

Wireless LAN Topology

1Independent Basic Service Set (BSS, IBSS): ad hoc mode (independent, peer-to-peer): no access point

2Extended Service Set (ESS): use AP; Infrastructure mode: one access point manages; greater range

Access Point

2013 Summer Camp

Page 11: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

11

Typical Wireless LAN Configuration

2013 Summer Camp

Page 12: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

122013 Summer Camp

Page 13: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

13

Wireless LAN Insecurity

2013 Summer Camp

Page 14: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Attacks Against Wireless LAN

• Hook to your wireless network and steal your data from your servers

• Eavesdrop on your wireless channel and steal passwords/secrets in transit

2013 Summer Camp 14

Page 15: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 15

Symmetric Key Encryption

Dear Bob

Tell Albert to get out of there

$β♥♦♣ƒϒ%ΩΛ?}{|•℘®gt…x

Dear Bob

Tell Albert to get out of there

Eve

is a A symmetric key is a long binary string:

01110101010…Alice Bob

Page 16: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WEP• Wired-equivalent privacy (WEP)

– Security based on a shared secret (WEP key)• Goals

– Do not know the WEP key? No association or data transmission

– Do not know the WEP key? No eavesdropping– Do not know the WEP key? No data injection

• Symmetric-key encryption algorithm: RC4– Implemented on

• AP• Laptop: implemented by hardware

2013 Summer Camp 16

Page 17: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

17

WEP: all users share the same key

2013 Summer CampA WEP key is either 40 bits or 104 bits

Page 18: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

1WEP Configuration on AP

Wire your PC to your AP– Your PC uses DHCP

Check the IP address of your PC – ipconfig

Open web browser, type in 192.168.1.1

2013 Summer Camp 18

Page 19: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WEP Configuration on AP

Use the default username and password– For Linksys, it is admin/admin

2013 Summer Camp 19

Page 20: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 20

Page 21: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 21

Page 22: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 22

Page 23: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 23

Page 24: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 24

Page 25: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 25

Your WEP key

Page 26: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2WEP Configuration on Laptop

• Configure your laptop to connect to LionsDen• With WEP key 92D3B168BB

2013 Summer Camp 26

Page 27: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

27

WEP was Broken2001Borisov, Goldberg, Wagner [BGW01] discovered some practical flaws;Arbaugh, Shanker, Wan [ASW01] also observed some flawsFluhrer, Mantin and Shamir [FMS01] found fundamental flawsStubblefield, Ioannidis and Rubin implemented the FMS01 attackRager released WEPCrack on August 12Airsnort was released

1999: ISO standard 802.11b

Timeline

1997: IEEE 802.11 was developed; WEP

2013 Summer Camp

Page 28: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WEP could not be simply discarded

2013 Summer Camp 28

This is an old laptopIts integrated wireless adapter could not

simply be upgraded/replaced

It has to use RC4 (implemented in the hardware of the integrated wireless card)

Page 29: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Short-term Fix: WPA

• Wifi-Protected Access (WPA)– Goal: fix WEP– Use the same encryption algorithm – RC4

• How?– Modify the way that packet encryption keys are

generated

2013 Summer Camp 29

Page 30: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WPA Mode 1: WPA-PSK

• Pre-shared key (PSK)• All users share the same passphrase

2013 Summer Camp 30

Page 31: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WPA Mode 2: WPA-Enterprise

• WPA-enterprise• Each user has her/his own passphrase

2013 Summer Camp 31

Page 32: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

1WPA-PSK Configuration on AP

Wire your PC to your AP– Your PC uses DHCP

Check the IP address of your PC – ipconfig

Open web browser, type in 192.168.1.1

2013 Summer Camp 32

Page 33: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 33

Your WPA-PSK secret

Page 34: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2WPA-PSK Configuration on Laptop

• Configure your laptop to connect to LionsDen• With WPA-PSK secret chr1sisc00l

2013 Summer Camp 34

Page 35: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WPA-PSK is Weak Too!

• WPA’s data integrity mechanism, Temporal Key Integrity Protocol (TKIP), is a temporary fix– It is vulnerable to more complex attacks

• WPA-PSK is based on shared secret– It may be susceptible to dictionary attacks and

brute-force attacks

2013 Summer Camp 35

Page 36: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WPA2• It uses a different encryption algorithm:

Advanced Encryption Standard (AES)– More secure, standard

• It uses a more secure data integrity algorithm– CBC-MAC

⇒Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP)

• Like WPA, WPA2 supports two modes– WPA2-PSK– WPA2-Enterprise

2013 Summer Camp 36

Page 37: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

1WPA2-PSK Configuration on AP

Wire your PC to your AP– Your PC uses DHCP

Check the IP address of your PC – ipconfig

Open web browser, type in 192.168.1.1

2013 Summer Camp 37

Page 38: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2013 Summer Camp 38

Your WPA2-PSK secret

Page 39: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

2WPA2-PSK Configuration on Laptop

• Configure your laptop to connect to LionsDen• With WPA2-PSK secret chr1sisc00l

2013 Summer Camp 39

Page 40: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

40

Wireless LAN Security: Summary2001Borisov, Goldberg, Wagner [BGW01] discovered some practical flaws;Arbaugh, Shanker, Wan [ASW01] also observed some flawsFluhrer, Mantin and Shamir [FMS01] found fundamental flawsStubblefield, Ioannidis and Rubin implemented the FMS01 attackRager released WEPCrack on August 12Airsnort was released

1999: ISO standard 802.11b

Timeline

1997: IEEE 802.11 was developed; WEP

TKIP: temporary fix

CCMP: long-term solution

2013 Summer Camp

Page 41: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Buzzwords: Business vs. Technical

• WIFI• Channel• Wireless access point,

wireless station (wireless cards)

• SSID• ESSID• WEP• WPA• WPA2• Association/reassociate/dis

associate

• RC4, TKIP, CCMP– AES, CTR, CBC-MAC

• 802.11• 802.11i• 802.11x• MAC spoofing, MAC

filtering• Chipsets • Managed mode• Monitor mode

412013 Summer Camp

Page 42: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Summary

42

BUSINESS PEOPLE ENCRYPTION INTEGRITY USER

AUTHENTICATION

WEP RC4 Encrypted CRC

All users share the same key

WPA-PSK RC4 MIC All users share the same key

WPA-Enterprise RC4 MIC

Each user is separately

authenticated

WPA2-PSK AES-CTR (CBC-MAC) All users share the same key home

WPA2-Enterprise AES-CTR (CBC-MAC)

Each user is separately

authenticated

TKIP

2013 Summer Camp

Page 43: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Summary

43

BUSINESS PEOPLE ENCRYPTION INTEGRITY USER

AUTHENTICATION

WEP RC4 Encrypted CRC

All users share the same key

WPA-PSK RC4 MIC All users share the same key

WPA-Enterprise RC4 MIC

Each user is separately

authenticated

WPA2-PSK AES-CTR (CBC-MAC) All users share the same key home

WPA2-Enterprise AES-CTR (CBC-MAC)

Each user is separately

authenticated

TKIP

2013 Summer Camp

Page 44: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

How to Find Target AP’s MAC

• Need a computer with wireless support• On Windows

– Netstumbler: freeware; http://www.netstumbler.com/downloads/

• On Linux– ifconfig wlan0 down– iwconfig wlan0 mode managed– sudo iwlist wlan0 scan

442013 Summer Camp

Page 45: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

452013 Summer Camp

Page 46: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Step 0

• Run Firefox to log into your vCenter server and find your Windows 2003 VM

• Use the “WLAN and Crypto Security” VM snapshot

2013 Summer Camp 46

Page 47: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Aircrack-ng for Windows (1/2)

• Download aircrack-ng for Windows– http://www.aircrack-ng.org/doku.php?id=main

• Install it

• NOTE: This software has already been installed on your Windows 2003 VM under the “WLAN and Crypto Security” VM snapshot

2013 Summer Camp 47

Page 48: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Aircrack-ng for Windows (2/2)

• Run c:\wireless\wireless\aircrack-ng-1.1-win\aircrack-ng-1.1-win\bin\Aircrack-ng GUI.exe

• (You can also run it directly from a shortcut on your Desktop)

2013 Summer Camp 48

Page 49: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Exercises

• In this unit, we will crack some real-world wireless local area networks with traffic captured in files– Not live traffic

• These traffic packets were captured with Wireshark

2013 Summer Camp 49

Page 50: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• ExercisesCracking captured WEP traffic 1

– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

502013 Summer Camp

Page 51: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WEP Cracking

• The target wireless network is using WEP

2013 Summer Camp 51

Page 52: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WEP Cracking Steps

2013 Summer Camp 52

a Purchase a wireless card that support injection

b Select platform to run Aircrack-ng; Backtrack 5 R3 is the best; Ubuntu

Start the wireless interface in monitor mode

on AP channel

Test Wireless Device Packet Injection

Start airodump-ng to capture the IVs

Use aireplay-ng to do a fake authentication with

the access point

Start aireplay-ng in ARP request replay mode

Run aircrack-ng to obtain the WEP key

Page 53: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WEP Cracking Steps with captured traffic

2013 Summer Camp 53

a Purchase a wireless card that support injection

b Select platform to run Aircrack-ng; Backtrack 5 R3 is the best; Ubuntu

Start the wireless interface in monitor mode

on AP channel

Test Wireless Device Packet Injection

Start airodump-ng to capture the IVs

Use aireplay-ng to do a fake authentication with

the access point

Start aireplay-ng in ARP request replay mode

Run aircrack-ng to obtain the WEP key

Page 54: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WEP Cracking

• Filename(s) c:\wireless\wireless\WEPFile01\wep3-01.cap

542013 Summer Camp

Page 55: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

What did you get?

• Mine

2013 Summer Camp 55

Now, close Aircrack-ng GUI.exe

Page 56: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Now What?

• You can use the cracked WEP key – To connect to the target AP– To find other vulnerable computers on the

network– To steal data from the target network

562013 Summer Camp

Page 57: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• ExercisesCracking captured WEP traffic 1Crack captured WPA-PSK traffic 2

– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

572013 Summer Camp

Page 58: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• The target wireless network is using WPA-PSK

2013 Summer Camp 58

Page 59: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

WPA-PSK Cracking Steps

2013 Summer Camp 59

a Purchase a wireless card that support injection

b Select platform to run Aircrack-ng; Backtrack 5 R3 is the best; Ubuntu

start the wireless interface in monitor mode

on AP channel

start airdump-ng to capture the Ivs

use aireplay-ng to deauthenticate the

wireless client

Run aircrack-ng to crack the pre-shared key

Page 60: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking with captured traffic Steps

2013 Summer Camp 60

a Purchase a wireless card that support injection

b Select platform to run Aircrack-ng; Backtrack 5 R3 is the best; Ubuntu

start the wireless interface in monitor mode

on AP channel

start airdump-ng to capture the Ivs

use aireplay-ng to deauthenticate the

wireless client

Run aircrack-ng to crack the pre-shared key

Page 61: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• Filename(s): c:\wireless\wireless\WPA-PSK-File02\team1.output.capture.wpa-01.cap

• Wordlist: c:\wireless\wireless\WPA-PSK-File02\all-edit.lst– Do not use all.lst

612013 Summer Camp

Page 62: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• Choose index 2 if you get prompted

2013 Summer Camp 62

Page 63: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : What did you get?

• Mine

2013 Summer Camp 63

Now, close Aircrack-ng GUI.exe

This is almost 10 minutes

Page 64: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Now What?

• You can use the cracked WPA-PSK key – To connect to the target AP– To find other vulnerable computers on the

network– To steal data from the target network

642013 Summer Camp

Page 65: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• ExercisesCracking captured WEP traffic 1Crack captured WPA-PSK traffic 2Cracking captured WEP traffic 3

– Crack captured WPA-PSK traffic 4

652013 Summer Camp

Page 66: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WEP Cracking

• The target wireless network is using WEP

2013 Summer Camp 66

Page 67: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WEP Cracking – File 3

• Filename(s) c:\wireless\wireless\WEPFile03\team4.output.capture-03.cap

672013 Summer Camp

Page 68: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WEP Cracking – File 3

• Choose index 2 if you get prompted

2013 Summer Camp 68

Page 69: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

What did you get?

• Mine

2013 Summer Camp 69

Now, close Aircrack-ng GUI.exe

Page 70: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Now What?

• You can use the cracked WEP key – To connect to the target AP– To find other vulnerable computers on the

network– To steal data from the target network

702013 Summer Camp

Page 71: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Road Map• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

712013 Summer Camp

Page 72: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• The target wireless network is using WPA-PSK

2013 Summer Camp 72

Page 73: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• Filename(s) c:\wireless\wireless\WPA-PSK-File04\wpa_handshake.pcap

• Wordlist: c:\wireless\wireless\WPA-PSK-File04\all.lst

732013 Summer Camp

Page 74: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : What did you get?

• What?

2013 Summer Camp 74

Page 75: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : WPA-PSK Cracking

• Advanced

2013 Summer Camp 75

Page 76: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Task : What did you get?

• Mine

2013 Summer Camp 76

Now, close Aircrack-ng GUI.exe

This is almost 1.5 hours

Page 77: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Now What?

• You can use the cracked WPA-PSK key – To connect to the target AP– To find other vulnerable computers on the

network– To steal data from the target network

772013 Summer Camp

Page 78: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Lesson to protect your wireless LAN?

• Use WPA2 if you can– Definitely no WEP– Avoid WPA-PSK if you can

• Use a long passphrase for WPA2-PSK8 ~ 63 characters

2013 Summer Camp 78

Page 79: 2013 Summer Camp: Wireless LAN Security Exercises · 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp. Questions • Have you used a wireless local

Summary• Introduction to wireless LAN• Overview of wireless LAN security

– WEP– WPA-PSK– WPA2

• Exercises– Cracking captured WEP traffic 1– Crack captured WPA-PSK traffic 2– Cracking captured WEP traffic 3– Crack captured WPA-PSK traffic 4

792013 Summer Camp


Recommended