Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

State of wifi_2016

1,186 views

Published on

2600 Presentation on wireless security in 2016. Originally presented at Rochester 2600.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

State of wifi_2016

  1. 1. 8/6/16 The State of WiFi Security Another presentation in the “Why specifically does it suck” seminar series
  2. 2. 8/6/16 ● Open ● WEP ● WPA ● WPA2 ● WPA2 Enterprise ● …?
  3. 3. 8/6/16 WEP is dead lets not talk about it
  4. 4. 8/6/16 WPA vs WPA2 ● Auth: TKIP (RC4) ● Cipher: RC4 ● Enterprise: EAP, TKIP, RC4 ● CCMP (AES+MAC) ● AES (optionally RC4) ● EAP, CCMP, AES
  5. 5. 8/6/16 WPA and Rainbows ● Can you make WPA rainbow tables? – Yes but you’d be an idiot ● Why? – Glad you asked! – WPA[1,2] takes a string as the password and salts it with the SSID – “password” + “Linksys” == “passwordLinksys” – Actually this is how you make the pair-wise master key pwmk = PBKDF2(HMAC-SHA1, “password”, “Linksys”, 4096 rounds, 256 bit) – Therefore, only pre-compute words for common SSIDs
  6. 6. 8/6/16 Latest Rage ● Shared Wifi: “We are all secure because we have WPA2 and a strong password” – WRONG
  7. 7. 8/6/16 Demo? ● Play along at home: http://www.lovemytool.com/files/test.pcap ● Precompute WPA key – https://www.wireshark.org/tools/wpa-psk.html ● Open wireshark preferences ● Got to IEEE 802.11 and add key ● … ● Magic
  8. 8. 8/6/16 Old Rage ● “Well I use HTTPS and that’s just passive interception” – Mostly true ● We still have ARP and DHCP and DNS servers that are skiddy hackable ● Can’t trust any shared networks
  9. 9. 8/6/16 Example: Interlock ● Interlock-Members: Password changes every 2 years at most, everyone knows the password – Passive interception and decryption – Let me save you some time ● Interlock-Guest: open wifi, no security
  10. 10. 8/6/16 Enterprise Environments ● WPA2 Personal: Everyone gets the same key ● WPA2 Enterprise: Everyone makes their own key based on their authentication (credentials, certificate, etc) ● No more wireshark decrypt
  11. 11. 8/6/16 Attacking WPA2 Enterprise ● Setup Rogue AP ● Have the client connect to it ● Receive the EAP protected credentials ● Use `asleap` to crack protected credentials
  12. 12. 8/6/16 Fuck Defending Enterprise
  13. 13. 8/6/16 Defending Home/Hackerspace ● No one wants to maintain a RADIUS server just to do authentication over wifi – Ok except for Pee ● A RADIUS service is a target ● What if you don’t care about authentication but just care about making a single session key?
  14. 14. 8/6/16 Setup ● Setup FreeRADIUS server to authenticate your wireless network ● Add the following lines – DEFAULT Auth-Type := Accept – log_auth = yes – log_auth_badpass = yes – log_auth_goodpass = yes ● Bonus: This will collect all usernames and passwords that people enter. – “Please log in with your Gmail or Yahoo passwords”
  15. 15. 8/6/16 Conclusion ● This is super hacky but effective ● WPA crypto primitives are getting old: – SHA1 – PBKDF2 with only 4096 bit – No PFS ● WPA is old: 2004 ● There are no plans AFAIK to change them ● WPA3: SHA256, PSK, DH temporal key exchange
  16. 16. 8/6/16 The Bill Slide ● No, your WiFi isn’t secure enough ● WPA2 Enterprise + EAP + Any username is more secure ● Google “radius docker wpa” done. ● Tell management that wifi sucks because it doesn’t have Diffie-Hellman. Seriously.
  17. 17. 8/6/16

×