- Wireless Network Hacking
- Access Point (AP): used to connect wireless devices to a wireless/wired network
- Association: process of connecting a wireless device to an AP
- Service Set Identifier (SSID)
- 32 char unique wireless identifier given to WLAN
- Can be hidden, but provides no security
- Orthogonal Frequency-Division Multiplexing (OFDM): carrying waves in various channels
- Multiple input, Multiple output OFDM (MIMO-OFDM): influencing spectral efficiency of 4G and 5G services
- Direct-Sequence Spread Spectrum (DSSS): combining all available waveforms into a single purpose
- Frequency-hopping Spread Spectrum (FHSS): also known as FH-CDMA, transmitting radio signals by rapidly switching a carrier among many frequency channels
- Basic Service Set (BSS): communication between a single AP and its clients
- Basic Service Set Identifier (BSSID): MAC address of the wireless access point
- ISM Band: a set of frequencies for international industrial, scientific, and medical communities
- Spectrum Analyzer: verifying wireless quality, detecting rogue access points and detects attacks, Wireless Intrusion Prevention System (WIPS) is also capable of searching for and locating rogue access points
- 2 types of wireless networks: Ad hoc (no access point) and Infrastructure
- LEAP: proprietary version of EAP developed by Cisco
- PEAP: protocol that encapsulates EAP within TLS tunnel
- Open System: no authentication
- Shared Key Authentication: authentication through a shared key/password
- Centralized Authentication: authentication through something like RADIUS (Remote Authentication Dial-In User Service)
- Directional Antenna: unidirectional antenna, signals in one direction, eg: Yagi Uda antenna
- Omnidirectional Antenna: signals in all directions
- Parabolic Grid Antenna: a semi-dish in form of grid, long-distance Wi-Fi transmissions by making highly focused radio beams
- Dipole Antenna: also called doublet, is bilaterally symmetrical balanced antenna, feeds on a balanced parallel-wire RF transmission line
- Reflector Antenna: used to concentrate EM energy that radiated or received at a focal point
Standard | Speed (Mbps) | Freq. (GHz) | Modulation Type | Range (Meters) |
---|---|---|---|---|
802.11 | 1, 2 | 2.4 | DSSS, FHSS | 20-100 |
802.11a | 54 | 5 | OFDM | 35-100 |
802.11b | 11 | 2.4 | DSSS | 35-140 |
802.11g | 54 | 2.4 | OFDM | 38-140 |
802.11n | 54-600 | 2.4, 5 | MIMO-OFDM | 70-250 |
802.15.1 Bluetooth | 25-50 | 2.4 | GFSK, π/4-DPSK, 8DPSK | 10-240 |
802.15.4 Zigbee | 0.25 | 2.4 | O-QPSK, GFSK, BPSK | 1-100 |
802.16 WiMax | 34-1000 | 2-11 | SOFDMA | 1600-9650 |
- 802.11d: enhancement to 802.11a and 802.11b, global portability, allow variation in freq, power levers, and bandwidth
- 802.11e: guidance for prioritization of data, voice and voice transmission enabling QoS
- 802.11i: standard for WLANs (Wireless Local Area Networks) that provides improved encryption for networks using 802.11a, 802.11b, and 802.11g standards; denfines WPA2-Enterprise/WPA2-Personal for Wi-Fi
- 802.11ac: high throughput network at 5GHz, faster and more reliable than 802.11n, Gigabit networking
- Z-Wave: primarily for home automation, 800-900 MHz radio, 100 meters range
- Speed 54 OFDM: ang
- Frequency 5: an
- Range: a<b=g<n
- n: s600, f2.4/5, MIMO-OFDM, 250
- d/e/i/ac: diversity global, ensure QoS, implement encryption, acceleration
- WEP doesn't effectively encrypt anything
- Used to calculate a 32-bit integrity check value (ICV)
- IVs are generally small and are frequently reused
- Sent in clear text as a part of the header, combined with RC4 makes it easy to decrypt the WEP key
- An attacker can send disassociate requests to the AP to generate a lot of these
- WPA uses TKIP (Temporal Key Integrity Protocol) with a 128-bit key
- WPA changes the key every 10,000 packets
- WPA transfers keys back and forth during an Extensible Authentication Protocol (EAP)
- WPA uses four-way handshake to derive keys
- WPA2 Personal: using a Pre-shared key (PSK) to authenticate, preconfigured password
- WPA2 Enterprise: can tie an EAP or RADIUS server into the authentication
- WPA2 ensures FIPS 140-2 compliance
- Message Integrity Codes (MIC): named MICHEAL, hashes for CCMP to protect integrity
- Cipher Block Chaining Message Authentication Code (CBC-MAC): integrity process of WPA2
Wireless Standard | Encryption | IV Size (Bits) | Key Length (Bits) | Integrity Check (ICV) |
---|---|---|---|---|
WEP | RC4 | 24 | 40/104 | CRC-32 |
WPA | RC4 + TKIP | 48 | 128 | MIC/CRC-32 |
WPA2 | AES-CCMP | 48 | 128 | CBC-MAC (CCMP) |
- Access Control Attacks: War Driving, Rogue AP, MAC Spoofing, AP Misconfiguration, Ad Hoc Association, Promiscuous Client, Client Mis-association, Unauthorized Association
- Integrity Attacks: Data Frame Injection, WEP Injection, Bit-Flipping Attack, Replay Attacks
- Confidentiality Attacks: Eavesdropping, Traffic Analysis, Cracking WEP Key, Evil Twin AP, Honeypot AP, Session Hijacking, Masquerading, MITM
- Availability Attacks: AP Theft, Disassociation Attack, EAP Failure, Beacon Flood, DoS, Auth/De-auth Flood, Routing Attack, ARP Cache Poisoning Attack
- Authentication Attacks: Cracking, Identity Theft, Shared Key Gusseing, Password Speculation, Application Login Theft, Key Reinstallation Attack
- Placing an access point controlled by an attacker
- Also known as a mis-association attack
- A rogue AP with a SSID similar to the name of a popular network
- Faking a well-known hotspot with a rogue AP
- Directly connecting to another phone via ad-hoc network
- Not very successful as the other user has to accept connection
- Either sends de-auth packets to the AP or jam the wireless signal
- With a de-auth, attacker can have the users connect to attacker's AP instead if it has the same name
- Only allowing certain MAC addresses on a network
- Easily broken because you can sniff out MAC addresses already connected and spoof it
- Tools for spoofing including SMAC and TMAC
- WarWalking: walks around with Wi-Fi to detect open wireless networks
- WarDriving: driving around with Wi-Fi to detect open wireless networks
- WarFlying: using drones to detect wireless networks
- WarChalking: drawing symbols in public places to advertise open Wi-Fi networks
- Tools
- inSSIDer Office: Wi-Fi optimization and troubleshooting tool
- WifiExplorer: known as Wi-Fi scanner, mobile platform to discover Wi-Fi networks
- Discovers a target wireless network then draws a map of the network
- Tool
- WiGLE: map for wireless networks
- NetStumbler: tool to find networks, a Windows tool
- Skyhook: Wi-Fi AP database
- Wi-Fi Finder: hotspot finder
- Determine Wi-Fi requirements
- Learn capabilities of a wireless card
- Determine chipset of Wi-Fi card
- Verify chipset capabilities
- Determine drivers and patches required
- Tools
- AirPcap: Wi-Fi USB dongle
- Wireshark with AirPcap: Wi-Fi packet sniffer
- SteelCentral Packet Analyzer
- OmniPeek Enterprise
- Ekahau Spectrum Analyzer
- Airodump-np: reveal hidden SSID
- AirMagnet WiFi Analyzer
- Kismet
- Wireless packet analyzer/sniffer used for discovery
- Working on Linux and OSX, Win 10 under WSL
- Working without sending any packets (passively)
- Working by channel hopping
- Can detect access points that have not been configured
- Can discover wireless networks that not sending beacon frames
- Ability to sniff packets and save them to a log file (readable by Wireshark/tcpdump)
-
NetSurveyor
- Tool for Windows that does similar features to NetStumbler and Kismet
- Doesn't require special drivers
-
WiFi Adapter
-
AirPcap is mentioned for Windows, but isn't made anymore
-
pcap: driver library for Windows
port <port> and host <ip>
-
libpcap: driver library for Linux
-
-
Cisco Adaptive Wireless IPS: security auditing tool
-
WatchGuard WIPS: IPS
-
AirMagnet Planner: wireless network planning tool
-
Zenmap: vulnerability scanning tool
-
Wi-Fi Protector: protects phone from ARP attack, such as DoS or MITM
-
WiFiGuard
- Easy because of weak IVs
- Process
- Start a compatible adapter with injection and sniffing capabilities
- Start a sniffer to capture packets
- Force the creation of thousands of packets (generally with de-auth)
- Analyze captured packets
- Methods to crack WEP including PTW, FMS, Korek technique
- Tools
- Aircrack-ng
- sniffer, detector, traffic analysis tool and a password cracker
- Using dictionary list attacks for WPA and WPA2
- Other attacks PTW, FMS, and Korek are for WEP only
- Cain and Abel
- Sniffing packets and cracks passwords (may take longer)
- Relying on statistical measures and PTW technique to break WEP
- KisMAC: MacOS tool to brute force WEP or WPA passwords
- WEPAttack
- WEPCrack
- Portable Penetrator
- Aircrack-ng
- Much more difficult than WEP cracking
- Using a constantly changing temporal key and user-defined password
- Key Reinstallation Attack (KRACK): replaying attack that uses third handshake of another device's session
- Most other attacks are simply brute-forcing password
- Tools
- Elcomsoft Wireless Security Auditor
- WIBR: WiFi Bruteforce Hack
- Discovery mode: how the device reacts to inquiries from other devices
- Discoverable: answering all inquiries
- Limited Discoverable: restricting the action
- Nondiscoverable: ignoring all inquiries
- Pairing mode: how the device deals with pairing requests
- Pairable: accepting all requests
- Non-pairable: rejecting all connection requests
- Bluesmacking: sending oversized ping to victim's device, DoS attack
- Bluejacking: sending unsolicited messages
- Bluesnarfing: stealing information via Bluetooth
- Bluesniffing: finding hidden and discoverable Bluetooth devices
- Bluebugging: remotely taking over a device via Bluetooth, sniffs data
- Blueprinting: collecting device information over Bluetooth to create info graphics
- Other attacks: MAC Spoofing Attack, MITM/Impersonation Attack
- Tools
- BluetoothView: monitoring activity of Bluetooth devices around you
- Super Bluetooth Hack: all-in-one package
- Bluetooth Firewall