Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Control Briefings Wireless LAN: Security and Control Enterprise Risk Management - Proprietary 1 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 What Is NOT Covered Wired Equiv. Privacy (WEP) vulnerabilities WEP Key cracking techniques Radio signal amplification Suggested changes to the IEEE 802.11b specification Wireless network discovery tools Enterprise Risk Management - Proprietary 2 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 What Will Be Covered Wireless network standards Wireless network general security issues Practical attacks The focus of the attack(s) – The network layers – The bottom 2 layers – Custom (forged) 802.11b management frames Enterprise Risk Management - Proprietary 3 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 What Will Be Covered Attack Scenarios – Denial of service – Masked ESSID detection – 802.11b layer MITM attack – Inadequate VPN implementations Mitigation Strategies Wireless network best practices Enterprise Risk Management - Proprietary 4 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Standards IEEE 802.11 IEEE 802.11b IEEE 802.11a IEEE 802.11g IEEE 802.11i Enterprise Risk Management - Proprietary 5 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 802.11 Published in June 1997 2.4GHz operating frequency 1 to 2 Mbps throughput Can choose between frequency hopping or direct sequence spread modulation Enterprise Risk Management - Proprietary 6 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 802.11b Published in late 1999 as supplement to 802.11 Still operates in 2.4GHz band Data rates can be as high as 11 Mbps Only direct sequence modulation is specified Most widely deployed today Enterprise Risk Management - Proprietary 7 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 802.11a Also published in late 1999 as a supplement to 802.11 Operates in 5GHz band (less RF interference than 2.4GHz range) Users Orthogonal Frequency Division Multiplexing (OFDM) Supports data rates up to 54 Mbps Not directly compatible with 802.11b or 802.11g Enterprise Risk Management - Proprietary 8 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 802.11g 802.11g is an extension to 802.11b Operates in 2.4GHz band Users Orthogonal Frequency Division Multiplexing (OFDM) Supports data rates up to 54 Mbps Backward compatible with 802.11b. Enterprise Risk Management - Proprietary 9 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 802.11i Currently under development It describes the encrypted transmission of data between systems of 802.11a and 802.11b WLANs Extensions to MAC layer, longer keys, and key management systems Temporal Key Integrity Protocol (TKIP) and AES encryption Enterprise Risk Management - Proprietary 10 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Security Issues Sniffing and War Driving Rogue Networks Policy Management MAC Address SSID WEP Enterprise Risk Management - Proprietary 11 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 War Driving Default installation allow any wireless NIC to access the network Drive around (or walk) and gain access to wireless networks Generally, provides direct access behind the firewall Heard reports of an 8 mile range using a 24dB gain parabolic dish antenna. Enterprise Risk Management - Proprietary 12 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Rogue Networks Network users often set up rogue wireless LANs to simplify their lives Rarely implement security measures Network is vulnerable to War Driving and sniffing and you may not even know it Enterprise Risk Management - Proprietary 13 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Policy Management Access is binary Full network access or no network access Need means of identifying and enforcing access policies Enterprise Risk Management - Proprietary 14 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 MAC Address Can control access by allowing only defined MAC addresses to connect to the network This address can be spoofed Must compile, maintain, and distribute a list of valid MAC addresses to each access point Not a valid solution for public applications Enterprise Risk Management - Proprietary 15 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Service Set ID (SSID) and Extended SSID (ESSID) SSID/ ESSID is the network name for a wireless network WLAN products common defaults: “101” for 3COM and “tsunami” for Cisco Can be required to specifically request the access point by name (lets SSID act as a password) The more people that know the SSID, the higher the likelihood it will be misused. Changing the SSID requires communicating the change to all users of the network Enterprise Risk Management - Proprietary 16 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Wired Equivalent Privacy (WEP) Designed to be computationally efficient, self-synchronizing, and exportable Vulnerable to attack – – – Passive attacks to decrypt traffic based on statistical analysis Active attacks to inject new traffic from unauthorized mobile stations, based on known plaintext Dictionary-building attack that, after analysis of a day’s worth of traffic, allows real-time automated decryption of all traffic All users of a given access point share the same encryption key Data headers remain unencrypted so anyone can see the source and destination of the data stream Enterprise Risk Management - Proprietary 17 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Practical Attacks WEP – Can be cracked passively Masked ESSID – Can be passively observed in management frames during association Block null ESSID connects – Same problem Install VPN – Weakly authenticated VPN is susceptible to active attack (MITM) Strong mutual authentication - ? Enterprise Risk Management - Proprietary 18 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 The Network Layers Enterprise Risk Management - Proprietary 19 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 The Bottom Layers Manipulating the bottom 2 layers of the OSI – – Data Link (Layer 2) • Media Access Control (MAC) – Access to medium • Logical Link Control (LLC) – Frame sync, flow control Physical (Layer 1) • Radio bit stream • Divided into channels Enterprise Risk Management - Proprietary 20 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 The Bottom Layers Enterprise Risk Management - Proprietary 21 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Management Frames Management frames can control link characteristics and physical medium properties 802.11b management frames are NOT authenticated – Why is this bad? Enterprise Risk Management - Proprietary 22 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – DoS Denial of Service – De-authentication – Use MAC address of Access Point – Send deauthenticate frames – • Send continuously • Send to broadcast address or specific MAC Users are unable to reassociate with AP Existing tools: Air-Jack + WLAN-Jack Enterprise Risk Management - Proprietary 23 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – DoS Airopeek Trace Enterprise Risk Management - Proprietary 24 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – DoS Decode of Deauthentication Frame Enterprise Risk Management - Proprietary 25 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – DoS This was your connection Enterprise Risk Management - Proprietary This is your connection 26 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – ESSID Is the ESSID a shared secret? If I mask the ESSID from the AP beacons then unauthorized users will not be able to associate with my AP? Discover Masked ESSID – – Send a deauthenticate frame to the broadcast address. Obtain ESSID contained in client probe request or AP probe response. Enterprise Risk Management - Proprietary 27 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – ESSID Airopeek Trace Enterprise Risk Management - Proprietary 28 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – MITM MITM Attack – Taking over connections at layer 1 and 2 – Insert attack machine between victim and access point Enterprise Risk Management - Proprietary 29 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – MITM Dangers of wireless MITM – – – Wireless networks are more vulnerable to MITM attacks than wired networks. Many security solutions are implemented with an assumption of a secure layer 1 and 2 Many VPN solutions are implemented with inadequate authentication for protection against wireless MITM attacks. Enterprise Risk Management - Proprietary 30 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – MITM Deauthenticate victim from real AP – Send deauthenticate frames to the victim using the access point’s MAC address as the source Victim’s 802.11 card scans channels to search for new AP Victim’s 802.11 card associates with fake AP on the attack machine – – Fake AP is on a different channel than the real one Attack machine’s fake AP is duplicating MAC address and ESSID of real AP. Enterprise Risk Management - Proprietary 31 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – MITM Attack machine associates with real AP – Attack machine duplicates MAC address of the victim’s machine. Attack machine is now inserted and can pass frames through in a manner that is transparent to the upper level protocols, just like a proxy. Enterprise Risk Management - Proprietary 32 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Attack Scenarios – MITM Before After Enterprise Risk Management - Proprietary 33 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Wireless Best Practices Enable WEP - Wired equivalent privacy – Key rotation when equipment supports it Disable broadcast of ESSID/ SSID Block null ESSID connection Restrict access by MAC address Use VPN technology Use strong mutual authentication Enterprise Risk Management - Proprietary 34 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Mitigation Strategies Big guy with a stick Wireless IDS and Monitoring – AirDefense http://www.airdefense.net Search and Detect (destroy?) rogue APs VPN + Strong mutual authentication RF Signal shaping – Avoiding signal leaks – Antennas with directional radiation pattern – Lower Access Point power Enterprise Risk Management - Proprietary 35 Wireless LAN Security Enterprise Risk Management Miami, FL September, 2003 Summary Wireless networks are more susceptible to active attacks than wired networks. Enable all built-in security capabilities. Use VPN with strong mutual authentication. Monitor wireless network medium (air space) for suspicious activity. Enterprise Risk Management - Proprietary 36