Wireless Cyber Warfare

657 views
572 views

Published on

Wi-Fi - The Simple but Potent Cyber weapon - Few possibilities presented.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
657
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Wireless Cyber Warfare

  1. 1. HACKING THE FRIENDLY SKIES
  2. 2. HELLO… <ul><li>SN is with NMRC </li></ul><ul><li>SN is with Vernier Networks </li></ul><ul><li>SN is jaded and bitter </li></ul>
  3. 3. DISCLAIMER: WHY NOT T O DO THIS <ul><li>Legalities </li></ul><ul><li>We have a bad enough reputation anyway </li></ul>
  4. 4. AGENDA <ul><li>Background </li></ul><ul><li>Attacking </li></ul><ul><li>Collected data </li></ul><ul><li>Conclusion </li></ul><ul><li>The Future </li></ul><ul><li>BTW, Bluetooth is not really covered, and is its own unholy monster </li></ul>
  5. 5. BACKGROUND
  6. 6. HOW THIS STARTED <ul><li>Weather delays </li></ul><ul><li>Cancelled flights </li></ul><ul><li>Layovers </li></ul><ul><li>Gadgets and toys </li></ul><ul><li>Idle hands </li></ul>
  7. 7. THERE IS NO IN-FLIGHT HOTSPOT <ul><li>Why are SSIDs called linksys, dlink, tmobile, hpsetup, 2wire etc showing up where they are clearly not? </li></ul><ul><li>Can I talk to these devices? </li></ul><ul><li>Can I attack these devices? </li></ul>
  8. 8. AIRLINE BACKGROUND <ul><li>10,000 foot rule on using approved electronics </li></ul><ul><li>No approved electronic devices during takeoff/landing for one simple reason – to keep your row clear in the event of an emergency </li></ul><ul><li>This is the same reason you have to stow your tray tables and put your seat back in its full upright position </li></ul>
  9. 9. ATTACKING
  10. 10. SECOND WARNING <ul><li>Don’t do this * </li></ul><ul><li>If you must, do it in the terminal </li></ul><ul><ul><li>During delays, there is more opportunity </li></ul></ul>
  11. 11. CONTRIBUTING FACTORS <ul><li>Laptops with built-in WiFi </li></ul><ul><li>Excellent Windows wireless integration </li></ul><ul><li>Connectivity friendliness of Windows in general </li></ul>
  12. 12. IPV4 LINK-LOCAL ADDRESSES <ul><li>RFC 3927 – “Dynamic Configuration of IPv4 Link-Local Addresses” </li></ul><ul><li>If DHCP fails to provide an IP address, interfaces with Link-Local configurations will auto-assign an address in the 169.254.0.0/16 range </li></ul><ul><li>Link-Local is on by default on all interfaces on all Windows platforms, including wireless interfaces </li></ul>
  13. 13. MICROSOFT IMPLEMENTATION OF RFC 3927 <ul><li>Example here is XP </li></ul><ul><li>Start -> Connect To -> Show all connections </li></ul><ul><li>Right click on wireless connection </li></ul><ul><li>Internet Protocol (TCP/IP) -> Properties </li></ul><ul><li>Two things to look for (and they are the default) </li></ul><ul><ul><li>General -> Obtain an IP address automatically is checked </li></ul></ul><ul><ul><li>Alternate Configuration -> Automatic private IP address is checked </li></ul></ul><ul><li>These two together help spell disaster </li></ul><ul><li>Details of Microsoft’s implementation under the covers are in RFC 3927 in appendix A.4 </li></ul>
  14. 14. THE MAGICALLY APPEARING SSID <ul><li>User boots up laptop </li></ul><ul><li>Wireless is enabled </li></ul><ul><li>Ethernet is disconnected, a (short) timeout occurs </li></ul><ul><li>Wireless is enabled, tries to find “default” SSID </li></ul><ul><li>Default SSID is not found, no DHCP server answers, Link-Local is used </li></ul><ul><li>IP address is assigned from 169.254.0.0/16 range per RFC 3330, this is APIPA (Automatic Private IP Address) </li></ul><ul><li>Built-in laptop becomes an ad-hoc network using “default” SSID </li></ul><ul><li>PC now says it is “tmobile” or “linksys” or “dlink”, and broadcasts its SSID as such </li></ul><ul><li>How? </li></ul>
  15. 15. MAGICALLY APPEARING NETWORKS <ul><li>Users boot up laptops </li></ul><ul><li>The first one up becomes the potential “SSID leader” </li></ul><ul><li>As additional laptops come up and can’t find their default (re: last) SSID to connect to, they may or may not connect </li></ul><ul><li>Windows stores all SSIDs you have connected to in Registry </li></ul><ul><li>If you have the SSID leader’s beaconing SSID in your Registry, you could connect </li></ul><ul><li>Even if you don’t, if only one SSID around, you could also connect </li></ul><ul><li>Automagic little cluster* of targetry goodness </li></ul><ul><li>Multiple SSID leaders can emerge, hours of attack. </li></ul>
  16. 16. WARNING FROM RFC 3927 <ul><li>From RFC 3927, section 5, paragraph 3: </li></ul>NOTE: There are certain kinds of local links, such as wireless LANs , that provide no physical security. Because of the existence of these links it would be very unwise for an implementer to assume that when a device is communicating only on the local link it can dispense with normal security precautions. Failure to implement appropriate security measures could expose users to considerable risks.
  17. 17. AUTHORS OF RFC 3927 <ul><li>Oops! </li></ul>Network Working Group S. Cheshire Request for Comments: 3927 Apple Computer Category: Standards Track B. Aboba Microsoft Corporation E. Guttman Sun Microsystems March 2005
  18. 18. ATTACK TIME <ul><li>Attach to that “tmobile” Ad-hoc Peer-to-Peer network </li></ul><ul><li>If Windows, make sure YOU have Alternate Configuration hard-wired to a 169.254.0.0/16 address </li></ul><ul><li>If Unix, assign yourself a 169.254.0.0/16 address </li></ul><ul><li>Get victim laptop’s IP address </li></ul><ul><ul><li>ARP for it, sniff (it is Windows, it will eventually chat NetBIOS to you), etc </li></ul></ul><ul><li>Ping it, you may have to set up a default route on Unix </li></ul><ul><li>Nmap, Nessus, dsniff, Cain & Abel, Metasploit Framework, etc etc </li></ul><ul><li>()wnage, biatch </li></ul>
  19. 19. ATTACK TIME ON SHORT FLIGHTS <ul><li>Configure a DHCP server on your laptop </li></ul><ul><li>Attach to that “tmobile” Ad-hoc Peer-to-Peer network </li></ul><ul><li>Give victim his laptop’s IP address </li></ul><ul><ul><li>APIPA/Link-Local systems will periodically check for a DHCP server </li></ul></ul><ul><li>Nmap, Nessus, dsniff, Cain & Abel, Metasploit Framework, etc etc </li></ul><ul><li>Quicker ()wnage, biatch </li></ul>
  20. 20. ATTACK TIME USING KARMA <ul><li>Run KARMA on your laptop </li></ul><ul><li>KARMA answers all SSID requests saying “yes, I really am that SSID you’re looking for” </li></ul><ul><li>Conceivably every laptop on the plane (or terminal, or commuter train) could be compromised </li></ul><ul><li>Thorough ()wnage </li></ul><ul><li>KARMA by Dino and K2 - http://www.theta44.org/karma/ </li></ul>
  21. 21. DON’T FORGET TO SNIFF <ul><li>SMB traffic including cached creds etc </li></ul>
  22. 22. EVIL FAKE AP <ul><li>Do “recon” with laptop, PDA etc in terminal waiting for flight </li></ul><ul><li>Determine most popular SSID </li></ul><ul><li>Set up fake AP with that SSID </li></ul><ul><li>Offer up a DNS server </li></ul><ul><li>Resolve EVERYTHING to your address </li></ul><ul><li>Hello LM/NTLM hashes </li></ul>
  23. 23. ADD HONEYPOT TECHNOLOGY <ul><li>Sniff for probes to IMAP/POP3 </li></ul><ul><ul><li>Remember, you DNS server will say you are that server </li></ul></ul><ul><li>Run Honeypot mail server </li></ul><ul><li>Accept (and log) every user and password </li></ul>
  24. 24. IDLE HANDS <ul><li>Change background image </li></ul><ul><li>Find pr0n on target, make that the background image </li></ul><ul><ul><li>You’re backdoored the system, literally </li></ul></ul><ul><li>Launch MP3s with Parental Advisory lyrics </li></ul><ul><li>Install a server and serve up pr0n to the rest of the aircraft </li></ul><ul><ul><li>Repeat earlier bullet item on multiple machines </li></ul></ul><ul><li>Cover your tracks! Upload your tools, attack other machines, then attack your own machine (plausible deniability) </li></ul>
  25. 25. COLLECTED DATA
  26. 26. ATLANTA, GA MIDWEEK <ul><li>Largest city in the region, lots of businesses </li></ul><ul><li>Weather delay, sat on tarmac in DFW ½ mile from terminal for 1 hour while thunderstorm passed </li></ul><ul><li>MD80 aircraft, half full flight, 8 laptops out and running </li></ul><ul><li>2 ad-hoc networks </li></ul><ul><li>3 live targets, 2 Windows XP, 1 Windows 2000 </li></ul><ul><ul><li>Windows XP fully patched with firewalling </li></ul></ul><ul><ul><li>Windows 2000 vulnerable to MS05-039 </li></ul></ul>
  27. 27. CHARLOTTE, NC MIDWEEK <ul><li>Heavy banking/insurance town </li></ul><ul><li>Weather delay, target-rich environment in Charlotte (dozens of ad-hoc networks) at the gate before flight </li></ul><ul><li>MD80 aircraft, full flight, 12 laptops out and running </li></ul><ul><li>5(!) ad-hoc networks </li></ul><ul><li>5 live targets, 2 Windows XP, 1 Windows 2003, 2 Windows 2000 </li></ul><ul><ul><li>Only Windows 2003 fully patched with firewall </li></ul></ul><ul><ul><li>Rest vulnerable to MS05-017 and/or MS05-039 </li></ul></ul>
  28. 28. TOORCON 7 RETURN FLIGHT, MONDAY MORNING <ul><li>In terminal, very few laptops out (it was 6am), only 1 ad-hoc network named tmobile </li></ul><ul><li>757 aircraft, full flight, 22 laptops out and running </li></ul><ul><li>1 ad-hoc network formed named 249143 </li></ul><ul><li>2 additional nodes had attached to it (apparently clueless they had done so) </li></ul><ul><li>3 live targets - 2 Windows XP, 1 Windows 2000 </li></ul><ul><ul><li>Windows 2000 vulnerable to MS05-039 </li></ul></ul><ul><ul><ul><li>Dlink technician (no I am not making this up, overheard him talking) </li></ul></ul></ul><ul><ul><li>Windows XP Pro, vulnerable to MS05-017 </li></ul></ul><ul><ul><li>Windows XP at SP1, vulnerable to MS05-017 </li></ul></ul><ul><ul><ul><li>This guy was across the aisle, VP of a physical security company. </li></ul></ul></ul>
  29. 29. SJC - DFW, TUESDAY AFTERNOON <ul><li>In terminal, 5 laptops out, 3 ad-hoc networks, 1 named linksys </li></ul><ul><li>MD80 aircraft, half-full flight, 14 laptops out and running </li></ul><ul><li>4 ad-hoc networks named MSFTWAN, GoldenTree, Fly Aloha, and orange </li></ul><ul><li>Orange had WEP turned on (?) </li></ul><ul><li>4 live targets – 2 Windows XP Pro, 2 Windows 2000 </li></ul><ul><ul><li>Windows XP Pro firewalled, probably SP2 (orange), fingerprinted using visual reconnaissance </li></ul></ul><ul><ul><li>Windows XP SP0 or SP1, patched up but 2 open shares (one had pr0n) </li></ul></ul><ul><ul><li>Both Windows 2000 vulnerable to MS05-039 </li></ul></ul><ul><ul><li>1 Windows 2000 had a web server running </li></ul></ul><ul><li>MSFTWAN? Certainly not…. </li></ul>
  30. 30. BEST TARGET LOCATIONS <ul><li>Airline 31337 Flyx0r clubs, but this is regular laptop-to-laptop hacking </li></ul><ul><li>Business commuter flights </li></ul><ul><ul><li>Early Monday flights are best </li></ul></ul><ul><ul><li>Major business hauls </li></ul></ul><ul><ul><ul><li>Eg LGA – DCA, EWR – BOS, ORD – LAX, HOU – ATL especially in and out of high tech areas </li></ul></ul></ul><ul><ul><li>Get a seat near front part of coach </li></ul></ul><ul><ul><ul><li>Road warriors request these seats in advance to get off the plane quicker </li></ul></ul></ul><ul><ul><ul><li>Aircraft with limited power outlets usually have outlets there </li></ul></ul></ul><ul><ul><ul><li>Better able to visually shoulder-surf during recon phase, helps with OS detection </li></ul></ul></ul><ul><ul><ul><li>Flights with lower passenger loads will have road warriors in First Class due to upgrades </li></ul></ul></ul>
  31. 31. CONTRIBUTING FACTORS <ul><li>Bad weather/delays means increased laptop usage in terminal </li></ul><ul><ul><li>Rain dance or l33t weather-controlling satellite ownage can help you </li></ul></ul><ul><li>Certain airports have no wireless </li></ul><ul><ul><li>Charlotte, NC for example </li></ul></ul><ul><ul><li>Virtually all non-WEP/WPA SSIDs are ad-hoc </li></ul></ul>
  32. 32. CONCLUSIONS
  33. 33. WHY THIS HAPPENS <ul><li>Configuration for talking to infrastructure, no problems </li></ul><ul><li>Once you can’t find infrastructure linksys or tmobile, you will attach to ad-hoc versions if available </li></ul><ul><li>From this point on you will auto-assign an ad-hoc network with that SSID </li></ul><ul><ul><li>It is a configuration “virus”, currently operating in the wild </li></ul></ul>
  34. 34. WHAT’S BAD <ul><li>Alternate Configuration on wireless </li></ul><ul><ul><li>Turn off your wireless, bad monkey, no banana </li></ul></ul><ul><ul><li>It should be off unless really needed </li></ul></ul><ul><li>Works wherever sheeple laptop users gather and there is no wireless (hotels and convention centers without available wireless, commuter trains, etc) </li></ul>
  35. 35. WHAT’S GOOD <ul><li>Easy workarounds </li></ul><ul><ul><li>Turn off your wireless connection when not in use. </li></ul></ul><ul><ul><li>Set your wireless to only talk to infrastructure networks (advanced settings) </li></ul></ul><ul><ul><li>Personal firewalls will help, and on XP SP1 or later make sure the firewall is on </li></ul></ul><ul><ul><li>WEP on an adhoc network is possible </li></ul></ul><ul><li>Per the Microsoft Security Response Center, patches will be included in the next service pack releases to prevent the auto-advertising of adhoc networks </li></ul><ul><ul><li>In spite of lame nature of attack (and it is pretty lame), Microsoft took it seriously </li></ul></ul>
  36. 36. QUICK WIFI DETECTION FOR PASSENGERS AND FLIGHT CREWS <ul><li>Digital Hotspotter (<$100) will detect signal strength, show SSID, encryption or not, and channel </li></ul><ul><li>Kensington WiFi Finder Plus (<$30) will detect the presence of WiFi and Bluetooth </li></ul>
  37. 37. THE FUTURE
  38. 38. FCC VS. FAA <ul><li>FCC says cell phone/wifi is ready for use on planes </li></ul><ul><li>FAA has still not approved the technology </li></ul><ul><li>Without push from the airlines, the FAA is unlikely to budge soon </li></ul><ul><li>AA, United, and Delta were ready to start the push for pico cell-based cellular service on airplanes in 2001 </li></ul><ul><ul><li>Unfortunately 9/11 happened and they all lost money, and the technology is very expensive </li></ul></ul><ul><li>Watch the cellphone usage issue for planes (1/5 the cost to implement), wifi will follow </li></ul><ul><li>Last “cellular interference” study to concluded in 2006 </li></ul>
  39. 39. INFLIGHT BROADBAND BASICS <ul><li>Available now on limited flights </li></ul><ul><ul><li>Non-US carriers </li></ul></ul><ul><ul><li>Overseas flights only </li></ul></ul><ul><li>Typically private class C for passengers </li></ul><ul><li>Uses a combination of satellites and 5 ground locations to move packets back and forth </li></ul><ul><li>Approximately $30 USD for unlimited usage during a 6+ hour flight </li></ul>
  40. 40. INFLIGHT BROADBAND ADOPTERS <ul><li>Three Vendors </li></ul><ul><ul><li>Connexion, Tenzing (SMS, email only), and Sky Way </li></ul></ul><ul><li>Various airlines are involved </li></ul><ul><ul><li>British Airways </li></ul></ul><ul><ul><li>Japan Airlines </li></ul></ul><ul><ul><li>Lufthansa </li></ul></ul><ul><ul><li>SAS </li></ul></ul><ul><ul><li>Singapore Airlines </li></ul></ul><ul><ul><li>Nippon Airways </li></ul></ul><ul><ul><li>Southeast Airlines </li></ul></ul><ul><ul><li>Executive Charter </li></ul></ul>
  41. 41. INFLIGHT BROADBAND ISSUES <ul><li>Expensive to implement (roughly $400k per plane) </li></ul><ul><ul><li>US-based airlines are not buying it </li></ul></ul><ul><li>Currently little to no security implemented </li></ul><ul><ul><li>Security solutions cost extra, and the airlines aren’t buying it </li></ul></ul><ul><li>Disputable legality of in-flight air-to-air or air-to-ground hacking </li></ul><ul><ul><li>Attacker in 15A, victim in 17D – mid-Pacific/Atlantic and who is to blame? </li></ul></ul><ul><ul><li>You are over international waters, no clear jurisdiction </li></ul></ul><ul><ul><li>Think “cruise ship enters international waters, the casino now legally opens” </li></ul></ul><ul><ul><li>Does this apply to laptop-to-laptop hacking mid-flight? </li></ul></ul>
  42. 42. ADDITIONAL INFLIGHT ISSUES <ul><li>Windows CE 2003 and Boeing Aircraft </li></ul><ul><ul><li>As we speak Boeing is disabling Bluetooth, which was enabled by default </li></ul></ul><ul><ul><li>No I am not kidding, Windows CE </li></ul></ul><ul><li>WTF!? Bluetooth??!? Windows CE!!?! </li></ul><ul><ul><li>Can you say “backdoor” so ground personnel can land a hijacked plane via AutoLand and/or RoboLander? </li></ul></ul><ul><li>Imagine a terrorist with a Bluetooth gun aimed at a plane after take-off </li></ul><ul><li>Imagine an instruction of “please go to -2000 feet in 15 minutes kthxbye” </li></ul><ul><li>BTW have a safe flight home from ShmooCon! </li></ul>

×