Skip to content

Latest commit

 

History

History
293 lines (233 loc) · 14.1 KB

07-wireless_network_hacking.md

File metadata and controls

293 lines (233 loc) · 14.1 KB

07-Wireless Network Hacking

Table of Contents

Wireless Network Hacking

Wireless Terminologies

  • Access Point (AP): used to connect wireless devices to a wireless/wired network
  • Association: process of connecting a wireless device to an AP
  • Service Set Identifier (SSID)
    • 32 char unique wireless identifier given to WLAN
    • Can be hidden, but provides no security
  • Orthogonal Frequency-Division Multiplexing (OFDM): carrying waves in various channels
  • Multiple input, Multiple output OFDM (MIMO-OFDM): influencing spectral efficiency of 4G and 5G services
  • Direct-Sequence Spread Spectrum (DSSS): combining all available waveforms into a single purpose
  • Frequency-hopping Spread Spectrum (FHSS): also known as FH-CDMA, transmitting radio signals by rapidly switching a carrier among many frequency channels
  • Basic Service Set (BSS): communication between a single AP and its clients
  • Basic Service Set Identifier (BSSID): MAC address of the wireless access point
  • ISM Band: a set of frequencies for international industrial, scientific, and medical communities
  • Spectrum Analyzer: verifying wireless quality, detecting rogue access points and detects attacks, Wireless Intrusion Prevention System (WIPS) is also capable of searching for and locating rogue access points
  • 2 types of wireless networks: Ad hoc (no access point) and Infrastructure
  • LEAP: proprietary version of EAP developed by Cisco
  • PEAP: protocol that encapsulates EAP within TLS tunnel

Types of Wireless Authentication Model

  • Open System: no authentication
  • Shared Key Authentication: authentication through a shared key/password
  • Centralized Authentication: authentication through something like RADIUS (Remote Authentication Dial-In User Service)

Types of Wireless Antennas

  • Directional Antenna: unidirectional antenna, signals in one direction, eg: Yagi Uda antenna
  • Omnidirectional Antenna: signals in all directions
  • Parabolic Grid Antenna: a semi-dish in form of grid, long-distance Wi-Fi transmissions by making highly focused radio beams
  • Dipole Antenna: also called doublet, is bilaterally symmetrical balanced antenna, feeds on a balanced parallel-wire RF transmission line
  • Reflector Antenna: used to concentrate EM energy that radiated or received at a focal point

Wireless Standards

Standard Speed (Mbps) Freq. (GHz) Modulation Type Range (Meters)
802.11 1, 2 2.4 DSSS, FHSS 20-100
802.11a 54 5 OFDM 35-100
802.11b 11 2.4 DSSS 35-140
802.11g 54 2.4 OFDM 38-140
802.11n 54-600 2.4, 5 MIMO-OFDM 70-250
802.15.1 Bluetooth 25-50 2.4 GFSK, π/4-DPSK, 8DPSK 10-240
802.15.4 Zigbee 0.25 2.4 O-QPSK, GFSK, BPSK 1-100
802.16 WiMax 34-1000 2-11 SOFDMA 1600-9650
  • 802.11d: enhancement to 802.11a and 802.11b, global portability, allow variation in freq, power levers, and bandwidth
  • 802.11e: guidance for prioritization of data, voice and voice transmission enabling QoS
  • 802.11i: standard for WLANs (Wireless Local Area Networks) that provides improved encryption for networks using 802.11a, 802.11b, and 802.11g standards; denfines WPA2-Enterprise/WPA2-Personal for Wi-Fi
  • 802.11ac: high throughput network at 5GHz, faster and more reliable than 802.11n, Gigabit networking
  • Z-Wave: primarily for home automation, 800-900 MHz radio, 100 meters range

How to remember all 802.11x standards

  • Speed 54 OFDM: ang
  • Frequency 5: an
  • Range: a<b=g<n
  • n: s600, f2.4/5, MIMO-OFDM, 250
  • d/e/i/ac: diversity global, ensure QoS, implement encryption, acceleration

Wireless Encryption

WEP (Wired Equivalent Privacy)

  • WEP doesn't effectively encrypt anything
IV (Initialization Vector)
  • Used to calculate a 32-bit integrity check value (ICV)
  • IVs are generally small and are frequently reused
  • Sent in clear text as a part of the header, combined with RC4 makes it easy to decrypt the WEP key
  • An attacker can send disassociate requests to the AP to generate a lot of these

WPA/WPA2 (Wi-Fi Protected Access)

  • WPA uses TKIP (Temporal Key Integrity Protocol) with a 128-bit key
  • WPA changes the key every 10,000 packets
  • WPA transfers keys back and forth during an Extensible Authentication Protocol (EAP)
  • WPA uses four-way handshake to derive keys
  • WPA2 Personal: using a Pre-shared key (PSK) to authenticate, preconfigured password
  • WPA2 Enterprise: can tie an EAP or RADIUS server into the authentication
  • WPA2 ensures FIPS 140-2 compliance
  • Message Integrity Codes (MIC): named MICHEAL, hashes for CCMP to protect integrity
  • Cipher Block Chaining Message Authentication Code (CBC-MAC): integrity process of WPA2
Wireless Standard Encryption IV Size (Bits) Key Length (Bits) Integrity Check (ICV)
WEP RC4 24 40/104 CRC-32
WPA RC4 + TKIP 48 128 MIC/CRC-32
WPA2 AES-CCMP 48 128 CBC-MAC (CCMP)

Wireless Hacking Threats

  • Access Control Attacks: War Driving, Rogue AP, MAC Spoofing, AP Misconfiguration, Ad Hoc Association, Promiscuous Client, Client Mis-association, Unauthorized Association
  • Integrity Attacks: Data Frame Injection, WEP Injection, Bit-Flipping Attack, Replay Attacks
  • Confidentiality Attacks: Eavesdropping, Traffic Analysis, Cracking WEP Key, Evil Twin AP, Honeypot AP, Session Hijacking, Masquerading, MITM
  • Availability Attacks: AP Theft, Disassociation Attack, EAP Failure, Beacon Flood, DoS, Auth/De-auth Flood, Routing Attack, ARP Cache Poisoning Attack
  • Authentication Attacks: Cracking, Identity Theft, Shared Key Gusseing, Password Speculation, Application Login Theft, Key Reinstallation Attack

Wireless Attacks

Rogue Access Point

  • Placing an access point controlled by an attacker

Evil Twin

  • Also known as a mis-association attack
  • A rogue AP with a SSID similar to the name of a popular network

Honeypot AP Attack

  • Faking a well-known hotspot with a rogue AP

Ad Hoc Connection Attack

  • Directly connecting to another phone via ad-hoc network
  • Not very successful as the other user has to accept connection

DoS Attack

  • Either sends de-auth packets to the AP or jam the wireless signal
  • With a de-auth, attacker can have the users connect to attacker's AP instead if it has the same name

MAC Filter

  • Only allowing certain MAC addresses on a network
  • Easily broken because you can sniff out MAC addresses already connected and spoof it
  • Tools for spoofing including SMAC and TMAC

Wireless Hacking Methodology

Network Discovery

  • WarWalking: walks around with Wi-Fi to detect open wireless networks
  • WarDriving: driving around with Wi-Fi to detect open wireless networks
  • WarFlying: using drones to detect wireless networks
  • WarChalking: drawing symbols in public places to advertise open Wi-Fi networks
  • Tools
    • inSSIDer Office: Wi-Fi optimization and troubleshooting tool
    • WifiExplorer: known as Wi-Fi scanner, mobile platform to discover Wi-Fi networks

GPS Mapping

  • Discovers a target wireless network then draws a map of the network
  • Tool
    • WiGLE: map for wireless networks
    • NetStumbler: tool to find networks, a Windows tool
    • Skyhook: Wi-Fi AP database
    • Wi-Fi Finder: hotspot finder

Wireless Traffic Analysis

  • Determine Wi-Fi requirements
  • Learn capabilities of a wireless card
  • Determine chipset of Wi-Fi card
  • Verify chipset capabilities
  • Determine drivers and patches required
  • Tools
    • AirPcap: Wi-Fi USB dongle
    • Wireshark with AirPcap: Wi-Fi packet sniffer
    • SteelCentral Packet Analyzer
    • OmniPeek Enterprise
    • Ekahau Spectrum Analyzer
    • Airodump-np: reveal hidden SSID
    • AirMagnet WiFi Analyzer
    • Kismet
      • Wireless packet analyzer/sniffer used for discovery
      • Working on Linux and OSX, Win 10 under WSL
      • Working without sending any packets (passively)
      • Working by channel hopping
      • Can detect access points that have not been configured
      • Can discover wireless networks that not sending beacon frames
      • Ability to sniff packets and save them to a log file (readable by Wireshark/tcpdump)

Tools

  • NetSurveyor

    • Tool for Windows that does similar features to NetStumbler and Kismet
    • Doesn't require special drivers
  • WiFi Adapter

    • AirPcap is mentioned for Windows, but isn't made anymore

    • pcap: driver library for Windows

      port <port> and host <ip>
      
    • libpcap: driver library for Linux

  • Cisco Adaptive Wireless IPS: security auditing tool

  • WatchGuard WIPS: IPS

  • AirMagnet Planner: wireless network planning tool

  • Zenmap: vulnerability scanning tool

  • Wi-Fi Protector: protects phone from ARP attack, such as DoS or MITM

  • WiFiGuard

Wireless Encryption Cracking

WEP Cracking
  • Easy because of weak IVs
  • Process
    1. Start a compatible adapter with injection and sniffing capabilities
    2. Start a sniffer to capture packets
    3. Force the creation of thousands of packets (generally with de-auth)
    4. Analyze captured packets
  • Methods to crack WEP including PTW, FMS, Korek technique
  • Tools
    • Aircrack-ng
      • sniffer, detector, traffic analysis tool and a password cracker
      • Using dictionary list attacks for WPA and WPA2
      • Other attacks PTW, FMS, and Korek are for WEP only
    • Cain and Abel
      • Sniffing packets and cracks passwords (may take longer)
      • Relying on statistical measures and PTW technique to break WEP
    • KisMAC: MacOS tool to brute force WEP or WPA passwords
    • WEPAttack
    • WEPCrack
    • Portable Penetrator
WPA Cracking
  • Much more difficult than WEP cracking
  • Using a constantly changing temporal key and user-defined password
  • Key Reinstallation Attack (KRACK): replaying attack that uses third handshake of another device's session
  • Most other attacks are simply brute-forcing password
  • Tools
    • Elcomsoft Wireless Security Auditor
    • WIBR: WiFi Bruteforce Hack

Bluetooth Hacking

Bluetooth Modes

  • Discovery mode: how the device reacts to inquiries from other devices
    • Discoverable: answering all inquiries
    • Limited Discoverable: restricting the action
    • Nondiscoverable: ignoring all inquiries
  • Pairing mode: how the device deals with pairing requests
    • Pairable: accepting all requests
    • Non-pairable: rejecting all connection requests

Bluetooth Attacks

  • Bluesmacking: sending oversized ping to victim's device, DoS attack
  • Bluejacking: sending unsolicited messages
  • Bluesnarfing: stealing information via Bluetooth
  • Bluesniffing: finding hidden and discoverable Bluetooth devices
  • Bluebugging: remotely taking over a device via Bluetooth, sniffs data
  • Blueprinting: collecting device information over Bluetooth to create info graphics
  • Other attacks: MAC Spoofing Attack, MITM/Impersonation Attack
  • Tools
    • BluetoothView: monitoring activity of Bluetooth devices around you
    • Super Bluetooth Hack: all-in-one package
    • Bluetooth Firewall