Talk2 esc2 muscl-wifi_v1_2b

{elysiumsecurity}
WIFI SECURITY EXPOSED
An introduction to WIFI Security
Version: 1.2a
Date: 15/02/2018
Author: Sylvain Martinez
Reference: ESC2-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
DemoWPA3WPA/WPA2WEPContext
• What is WIFI
• How WIFI Works
• Protocol
• Weaknesses
• Attacks
• Protocol
• Weaknesses
• Attacks
• Introduction • Karma Attack
• Evil Portal
CONTENTS
Public
{elysiumsecurity}
cyber protection & response
3Public
What is WIFI / WI-FI
• Technology using radio waves to provide network connectivity
based on the IEEE 802.11 standard;
• Frequencies of 2.4 GHz and 5.8 GHz;
• 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac
• Other radio waves technologies include:
• ZigBee (IEEE 802.15.4);
• Bluetooth and Bluetooth Low Energy (802.15.1);
• WiMax (IEEE 802.16)
• But also Cellular, NFC, etc;
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
4Public
HOW WIFI WORKS
• HOTSPOTS will usually advertise there are here by BROADCASTING
their name (SSID);
• Clients attempts to connect to HOTSPOTS, for example your WIFI
home router;
• Connection to the HOTSPOT can be done:
• With no password (OPEN);
• With a password or passphrase;
• With a certificate;
• Clients will remember HOTSPOTS they previously connected to:
MY_WIFI, SHOP_WIFI, CORP_WIFI, etc.
• As long as the Clients WIFI is on, they will keep trying to connect to
their known HOTSPOTS, all of them, all the the time.
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
5Public
HOW WIFI WORKS
MY_WIFI
Are you
here?
YES!
CONNECT
HOME
MY_WIFI
Are you
here?
NO
SHOP_WIFI
Are you
here?
CONNECT
YES!
MY_WIFI
Are you
here?
NO
SHOP_WIFI
Are you
here?
YES!
CORP_WIFI
Are you
here?
COFFEE SHOP WORK
MY_WIFI SHOP_WIFI CORP_WIFI
NO
Icons from VMWARE
CONNECT
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
6
DemoWPA3WPA/WPA2WEPContext
Public
WEP PROTOCOL
• 1997
• Wired Equivalent Privacy;
• 10 or 26 Hexadecimal digits (40 or 104 bits) + 24 bits IV key. 2 key
sizes due to earlier USA restriction on cryptography exportation
• RC4 Stream cipher with CRC checks;
Source from Wikipedia
{elysiumsecurity}
cyber protection & response
7Public
WEP WEAKNESSES
• Same key must never be used twice, this is a problem in a busy
network with only a 24 bits IV key;
• Possibility to force traffic noise if the network is not busy enough;
• Possibility to modify intercepted packets and replay those into
the network;
• Short key;
• CRC was not designed for security;
• Authenticated users can see other users’ network traffic.
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
8Public
WEP ATTACKS
• 2001, passive attack to recover the RC4 Key in about a minute
with the right conditions and equipment;
• 2005, Start of widely available open source tools to attack WEP;
• 2006, near real time decryption of WEP traffic;
• 2008, PCI Security Standards prohibits the use of WEP
• Popular attacking tools:
• Aircrack, Airsnort, kismet, Cain & Able, Fern WIFI Wireless
cracker, etc.
Source from Wikipedia
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
9Public
WPA PROTOCOL
• WEP Replacement from 2003;
• Use of a Temporal Key Integrity Protocol (TKIP) to replace RC4
• Use of a Message Integrity Code (MIC/Michael)
• Dynamically generates 128-bit key for each packet
• Message Integrity Check to prevent replay and modification
attacks;
• Designed as an interim solution for hardware not supporting
WPA2
Source from Wikipedia
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
10Public
WPA WEAKNESSES
• Some common weaknesses to WEP regarding its message
integrity check algorithm (TKIP);
• The message integrity code hash function (Michael) is flawed;
• Possible to retrieve the keystream to use for re-injection and
spoofing;
• Authenticated users can see other users’ network traffic.
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
11Public
WPA ATTACKS
• 2012, Possible to brute force the WPA key;
• Key = PBKDF2(HMAC−SHA1,passphrase, ssid, 4096, 256);
• Large rainbow tables available for the top 1000 used SSIDs;
• WPS can be attacked through a weaker PIN strength;
• Popular attacking tools:
• Aircrack-ng, Reaver, kismet, etc.
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
12Public
WPA2 PROTOCOL
• More secure protocol from 2004;
• Implements all the mandatory elements of IEEE 802.11i;
• Support for Counter Mode CBC-MAC (CCMP), an AES-Based
encryption mode with strong security;
• Since March 2006 mandatory for all new
WI-FI labelled devices.
Source from Wikipedia
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
13Public
WPA2 WEAKNESSES
• AES-128 is breakable with enough time;
• ARP Poisoning and Spoofing are possible;
• Authenticated users can see other user’s network traffic;
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
14Public
WPA2 ATTACKS
• Possible to disconnect legitimate users with a DEAUTH attack,
even when not associated to the network;
• Password can be cracked offline from intercepted encrypted
traffic;
• 2017, Key Reinstallation AttaCKs (KRACKs) allows an attacker to
intercept and read data that is encrypted. The main attack is
against the 4 way WPA2 handshake.
https://www.krackattacks.com
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
15Public
WPA3
• Announced in January 2018 for later this year;
• 192 bit encryption;
• Individualized encryption for each user;
• Protection against brute-force dictionary attacks;
• Improved handshake protocol
• Simpler connection without a GUI (WPS?)
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
16Public
DEMO
• KARMA ATTACK
• EVIL PORTAL
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
17Public
WIFI KARMA ATTACK
MY_WIFI
Are you
here?
NO
SHOP_WIFI
Are you
here?
YES!
CORP_WIFI
Are you
here?
AIRPORT
AIRPORT_WIFI
NO
CONNECT MY_WIFI
Are you
here?
CONNECT
AIRPORT
MY_WIFI
Are you
here?
MY_WIFI
Are you
here?
YES! YES! YES!
HACKER_HOTSPOT
…
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
18Public
WIFI EVIL PORTAL ATTACK
COFFEE SHOP
FREE_WIFI
CONNECT
DemoWPA3WPA/WPA2WEPContext
Please login
Hotel Page
Google
Orange
Etc. Google
Creds
THANK YOU!
Internet Access Granted
{elysiumsecurity}
cyber protection & response
19Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
20Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
21Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
22Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
23Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
23Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
24Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
23Public
WIFI EVIL PORTAL ATTACK
DemoWPA3WPA/WPA2WEPContext
{elysiumsecurity}
cyber protection & response
© 2018 ElysiumSecurity Ltd.
All Rights Reserved
www.elysiumsecurity.com
THANK YOU!
Public 25
1 of 25

Recommended

Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool by
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
474 views25 slides
Talk2 esc4 muscl-ids_v1_2 by
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Sylvain Martinez
766 views16 slides
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur... by
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
830 views46 slides
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ... by
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Lancope, Inc.
1.9K views36 slides
Application layer Security in IoT: A Survey by
Application layer Security in IoT: A SurveyApplication layer Security in IoT: A Survey
Application layer Security in IoT: A SurveyAdeel Ahmed
163 views24 slides
Cisco Security Presentation by
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
4K views52 slides

More Related Content

What's hot

8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica... by
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
2.8K views21 slides
Software-Defined Segmentation Done Easily, Quickly and Right by
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSBWebinars
245 views51 slides
From IT to IoT: Bridging the Growing Cybersecurity Divide by
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DividePriyanka Aash
352 views22 slides
IPS Best Practices by
IPS Best PracticesIPS Best Practices
IPS Best PracticesHeather Axworthy
5.7K views10 slides
Build Redundant and Resilient Networks with Micro-Segmentation by
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
253 views26 slides
Advanced threat security - Cyber Security For The Real World by
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
6.4K views22 slides

What's hot(20)

8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica... by BGA Cyber Security
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
BGA Cyber Security2.8K views
Software-Defined Segmentation Done Easily, Quickly and Right by SBWebinars
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
SBWebinars245 views
From IT to IoT: Bridging the Growing Cybersecurity Divide by Priyanka Aash
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
Priyanka Aash352 views
Advanced threat security - Cyber Security For The Real World by Cisco Canada
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada6.4K views
Sourcefire Webinar - NEW GENERATION IPS by mmiznoni
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni3.9K views
Cisco, Sourcefire and Lancope - Better Together by Lancope, Inc.
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
Lancope, Inc.10.7K views
Cisco ThreatGrid: Malware Analysis and Threat Intelligence by Cisco Canada
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada2.2K views
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution by Shah Sheikh
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh1.2K views
Cisco connect winnipeg 2018 accelerating incident response in organizations... by Cisco Canada
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco Canada1.3K views
TechWiseTV Workshop: OpenDNS and AnyConnect by Robb Boyd
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd2.4K views
Ot ics cyberattaques dans les organisations industrielles by Cisco Canada
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
Cisco Canada347 views
The Future of ICS Security Products by Digital Bond
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
Digital Bond1.7K views
Securing Critical Iot Infrastructure, IoT Israel 2014 by iotisrael
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
iotisrael1.3K views
The Four Horsemen of Mobile Security by Skycure
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure807 views

Similar to Talk2 esc2 muscl-wifi_v1_2b

Wifi cracking Step by Step Using CMD and Kali Linux 2018 by
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
1.3K views24 slides
IJCER (www.ijceronline.com) International Journal of computational Engineerin... by
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
196 views5 slides
Viable means using which Wireless Network Security can be Jeopardized by
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
28 views4 slides
WPA3 - What is it good for? by
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
1.2K views34 slides
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks by
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
9.3K views7 slides
Wireless and how safe are you by
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
741 views30 slides

Similar to Talk2 esc2 muscl-wifi_v1_2b(20)

Wifi cracking Step by Step Using CMD and Kali Linux 2018 by Mohammad Fareed
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Mohammad Fareed1.3K views
IJCER (www.ijceronline.com) International Journal of computational Engineerin... by ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline196 views
Viable means using which Wireless Network Security can be Jeopardized by IRJET Journal
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal28 views
WPA3 - What is it good for? by Tom Isaacson
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson1.2K views
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks by Chema Alonso
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso9.3K views
Wireless and how safe are you by Marcus Dempsey
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey741 views
Wireless Security Best Practices for Remote Monitoring Applications by cmstiernberg
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
cmstiernberg1.2K views
Wifi Security by Shital Kat
Wifi SecurityWifi Security
Wifi Security
Shital Kat2.4K views
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf by rajkumarm401
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdfDescribe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
rajkumarm4013 views
Wi fi protected access by Lopamudra Das
Wi fi protected accessWi fi protected access
Wi fi protected access
Lopamudra Das2.4K views
Wi-Fi security – WEP, WPA and WPA2 by Fábio Afonso
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso4.4K views
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti... by Dr. Amarjeet Singh
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
wi-fi technology by tardeep
wi-fi technologywi-fi technology
wi-fi technology
tardeep1.4K views
Workshop on Wireless Security by amiable_indian
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian3.5K views
Sheetal - Wirelesss Hacking - ClubHack2008 by ClubHack
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
ClubHack1.3K views
Security standard by lyndyv
Security standardSecurity standard
Security standard
lyndyv212 views

More from Sylvain Martinez

PROGRAMMING AND CYBER SECURITY by
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
235 views23 slides
INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
DATA LOSS PREVENTION OVERVIEW by
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
599 views21 slides
2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides

More from Sylvain Martinez(20)

INCIDENT RESPONSE NIST IMPLEMENTATION by Sylvain Martinez
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
VIRTUAL CISO AND OTHER KEY CYBER ROLES by Sylvain Martinez
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez419 views
Talk1 esc7 muscl-dataprotection_v1_2 by Sylvain Martinez
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez183 views

Recently uploaded

LLMs in Production: Tooling, Process, and Team Structure by
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
57 views77 slides
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...BookNet Canada
41 views16 slides
The Power of Heat Decarbonisation Plans in the Built Environment by
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
84 views20 slides
The Power of Generative AI in Accelerating No Code Adoption.pdf by
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfSaeed Al Dhaheri
39 views18 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
437 views30 slides
CryptoBotsAI by
CryptoBotsAICryptoBotsAI
CryptoBotsAIchandureddyvadala199
42 views5 slides

Recently uploaded(20)

LLMs in Production: Tooling, Process, and Team Structure by Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage57 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
The Coming AI Tsunami.pptx by johnhandby
The Coming AI Tsunami.pptxThe Coming AI Tsunami.pptx
The Coming AI Tsunami.pptx
johnhandby13 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
This talk was not generated with ChatGPT: how AI is changing science by Elena Simperl
This talk was not generated with ChatGPT: how AI is changing scienceThis talk was not generated with ChatGPT: how AI is changing science
This talk was not generated with ChatGPT: how AI is changing science
Elena Simperl32 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
GDSC GLAU Info Session.pptx by gauriverrma4
GDSC GLAU Info Session.pptxGDSC GLAU Info Session.pptx
GDSC GLAU Info Session.pptx
gauriverrma415 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf by ThomasBronack
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
ThomasBronack31 views

Talk2 esc2 muscl-wifi_v1_2b

  • 1. {elysiumsecurity} WIFI SECURITY EXPOSED An introduction to WIFI Security Version: 1.2a Date: 15/02/2018 Author: Sylvain Martinez Reference: ESC2-MUSCL Classification: Public cyber protection & response
  • 2. {elysiumsecurity} cyber protection & response 2 DemoWPA3WPA/WPA2WEPContext • What is WIFI • How WIFI Works • Protocol • Weaknesses • Attacks • Protocol • Weaknesses • Attacks • Introduction • Karma Attack • Evil Portal CONTENTS Public
  • 3. {elysiumsecurity} cyber protection & response 3Public What is WIFI / WI-FI • Technology using radio waves to provide network connectivity based on the IEEE 802.11 standard; • Frequencies of 2.4 GHz and 5.8 GHz; • 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac • Other radio waves technologies include: • ZigBee (IEEE 802.15.4); • Bluetooth and Bluetooth Low Energy (802.15.1); • WiMax (IEEE 802.16) • But also Cellular, NFC, etc; DemoWPA3WPA/WPA2WEPContext
  • 4. {elysiumsecurity} cyber protection & response 4Public HOW WIFI WORKS • HOTSPOTS will usually advertise there are here by BROADCASTING their name (SSID); • Clients attempts to connect to HOTSPOTS, for example your WIFI home router; • Connection to the HOTSPOT can be done: • With no password (OPEN); • With a password or passphrase; • With a certificate; • Clients will remember HOTSPOTS they previously connected to: MY_WIFI, SHOP_WIFI, CORP_WIFI, etc. • As long as the Clients WIFI is on, they will keep trying to connect to their known HOTSPOTS, all of them, all the the time. DemoWPA3WPA/WPA2WEPContext
  • 5. {elysiumsecurity} cyber protection & response 5Public HOW WIFI WORKS MY_WIFI Are you here? YES! CONNECT HOME MY_WIFI Are you here? NO SHOP_WIFI Are you here? CONNECT YES! MY_WIFI Are you here? NO SHOP_WIFI Are you here? YES! CORP_WIFI Are you here? COFFEE SHOP WORK MY_WIFI SHOP_WIFI CORP_WIFI NO Icons from VMWARE CONNECT DemoWPA3WPA/WPA2WEPContext
  • 6. {elysiumsecurity} cyber protection & response 6 DemoWPA3WPA/WPA2WEPContext Public WEP PROTOCOL • 1997 • Wired Equivalent Privacy; • 10 or 26 Hexadecimal digits (40 or 104 bits) + 24 bits IV key. 2 key sizes due to earlier USA restriction on cryptography exportation • RC4 Stream cipher with CRC checks; Source from Wikipedia
  • 7. {elysiumsecurity} cyber protection & response 7Public WEP WEAKNESSES • Same key must never be used twice, this is a problem in a busy network with only a 24 bits IV key; • Possibility to force traffic noise if the network is not busy enough; • Possibility to modify intercepted packets and replay those into the network; • Short key; • CRC was not designed for security; • Authenticated users can see other users’ network traffic. DemoWPA3WPA/WPA2WEPContext
  • 8. {elysiumsecurity} cyber protection & response 8Public WEP ATTACKS • 2001, passive attack to recover the RC4 Key in about a minute with the right conditions and equipment; • 2005, Start of widely available open source tools to attack WEP; • 2006, near real time decryption of WEP traffic; • 2008, PCI Security Standards prohibits the use of WEP • Popular attacking tools: • Aircrack, Airsnort, kismet, Cain & Able, Fern WIFI Wireless cracker, etc. Source from Wikipedia DemoWPA3WPA/WPA2WEPContext
  • 9. {elysiumsecurity} cyber protection & response 9Public WPA PROTOCOL • WEP Replacement from 2003; • Use of a Temporal Key Integrity Protocol (TKIP) to replace RC4 • Use of a Message Integrity Code (MIC/Michael) • Dynamically generates 128-bit key for each packet • Message Integrity Check to prevent replay and modification attacks; • Designed as an interim solution for hardware not supporting WPA2 Source from Wikipedia DemoWPA3WPA/WPA2WEPContext
  • 10. {elysiumsecurity} cyber protection & response 10Public WPA WEAKNESSES • Some common weaknesses to WEP regarding its message integrity check algorithm (TKIP); • The message integrity code hash function (Michael) is flawed; • Possible to retrieve the keystream to use for re-injection and spoofing; • Authenticated users can see other users’ network traffic. DemoWPA3WPA/WPA2WEPContext
  • 11. {elysiumsecurity} cyber protection & response 11Public WPA ATTACKS • 2012, Possible to brute force the WPA key; • Key = PBKDF2(HMAC−SHA1,passphrase, ssid, 4096, 256); • Large rainbow tables available for the top 1000 used SSIDs; • WPS can be attacked through a weaker PIN strength; • Popular attacking tools: • Aircrack-ng, Reaver, kismet, etc. DemoWPA3WPA/WPA2WEPContext
  • 12. {elysiumsecurity} cyber protection & response 12Public WPA2 PROTOCOL • More secure protocol from 2004; • Implements all the mandatory elements of IEEE 802.11i; • Support for Counter Mode CBC-MAC (CCMP), an AES-Based encryption mode with strong security; • Since March 2006 mandatory for all new WI-FI labelled devices. Source from Wikipedia DemoWPA3WPA/WPA2WEPContext
  • 13. {elysiumsecurity} cyber protection & response 13Public WPA2 WEAKNESSES • AES-128 is breakable with enough time; • ARP Poisoning and Spoofing are possible; • Authenticated users can see other user’s network traffic; DemoWPA3WPA/WPA2WEPContext
  • 14. {elysiumsecurity} cyber protection & response 14Public WPA2 ATTACKS • Possible to disconnect legitimate users with a DEAUTH attack, even when not associated to the network; • Password can be cracked offline from intercepted encrypted traffic; • 2017, Key Reinstallation AttaCKs (KRACKs) allows an attacker to intercept and read data that is encrypted. The main attack is against the 4 way WPA2 handshake. https://www.krackattacks.com DemoWPA3WPA/WPA2WEPContext
  • 15. {elysiumsecurity} cyber protection & response 15Public WPA3 • Announced in January 2018 for later this year; • 192 bit encryption; • Individualized encryption for each user; • Protection against brute-force dictionary attacks; • Improved handshake protocol • Simpler connection without a GUI (WPS?) DemoWPA3WPA/WPA2WEPContext
  • 16. {elysiumsecurity} cyber protection & response 16Public DEMO • KARMA ATTACK • EVIL PORTAL DemoWPA3WPA/WPA2WEPContext
  • 17. {elysiumsecurity} cyber protection & response 17Public WIFI KARMA ATTACK MY_WIFI Are you here? NO SHOP_WIFI Are you here? YES! CORP_WIFI Are you here? AIRPORT AIRPORT_WIFI NO CONNECT MY_WIFI Are you here? CONNECT AIRPORT MY_WIFI Are you here? MY_WIFI Are you here? YES! YES! YES! HACKER_HOTSPOT … DemoWPA3WPA/WPA2WEPContext
  • 18. {elysiumsecurity} cyber protection & response 18Public WIFI EVIL PORTAL ATTACK COFFEE SHOP FREE_WIFI CONNECT DemoWPA3WPA/WPA2WEPContext Please login Hotel Page Google Orange Etc. Google Creds THANK YOU! Internet Access Granted
  • 19. {elysiumsecurity} cyber protection & response 19Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 20. {elysiumsecurity} cyber protection & response 20Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 21. {elysiumsecurity} cyber protection & response 21Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 22. {elysiumsecurity} cyber protection & response 22Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 23. {elysiumsecurity} cyber protection & response 23Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext {elysiumsecurity} cyber protection & response 23Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 24. {elysiumsecurity} cyber protection & response 24Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext {elysiumsecurity} cyber protection & response 23Public WIFI EVIL PORTAL ATTACK DemoWPA3WPA/WPA2WEPContext
  • 25. {elysiumsecurity} cyber protection & response © 2018 ElysiumSecurity Ltd. All Rights Reserved www.elysiumsecurity.com THANK YOU! Public 25