IST 454 TEAM ETA FINAL DOCUMENTATION WARDRIVING April 13, 2011. Professor Santoro. Team Eta: Mike Frank, Wes Connell, Pat Mahar, Aritz Kobayashi, Brian Hiltner Team Eta 1 Contents Scenario: ....................................................................................................................................................... 2 Objectives: .................................................................................................................................................... 2 Tasks:............................................................................................................................................................. 2 Task 1: Conduct a security audit ............................................................................................................... 2 Task 2: Securing the Network ................................................................................................................... 5 Intro: ..................................................................................................................................................... 5 Steps:..................................................................................................................................................... 5 Conclusion/Lessons Learned:........................................................................................................................ 6 Team Report (Requirements): ...................................................................................................................... 7 Resources: ..................................................................................................................................................... 7 Team Eta 2 Scenario: Recently, students living off campus have been reporting that their files have been disappearing. There have also been reports of a Honda Accord sitting outside people’s apartments while the missing file fiasco goes on. The department head of the PSU police have come to you in order to figure out exactly what is going on. Knowing from IST454 the different types of forensics on wireless networking, you immediately set out to do a security audit on the open networks in the areas and help students with unsecured wireless networks learn the dangers as well as help them secure their network. In this lab, you will explore the different tools used to wardrive as well as login to a router to secure your network. You will be familiarized with the tools needed to wardrive as well as gain a better understanding of users’ knowledge on the subject of security (hint: it’s not good). Objectives: Familiarize yourself with inSSIDer Learn how to conduct a security audit Learn how to secure a wireless network Learn the dangers of an unsecured wireless network Tasks: IMPORTANT: Before doing the tasks, read the project requirements section to know where you are going to need to take screenshots for the report. Task 1: Conduct a security audit 1. Equip your computer with a wireless network card. If you do not have one built into your laptop, USB wireless cards can be purchased for a low price online for basic wardriving. NOTE: If you wish to capture wireless N networks as well, make sure the adapter supports both the 2.4Ghz and 5Ghz spectrum (dual band) 2. Download the latest version of inSSIDer from http://www.metageek.net/products/inssider/download/ 3. Install inSSIDer with the standard options. Team Eta 3 4. Open inSSIDer and have a screen open that looks like this: 5. Once inSSIDer is open, select the wireless card you wish to use in the upper right hand corner under the drop down box: 6. Click “Start” to begin capturing SSIDs: 7. At this point, the list will populate with all the wireless networks local to you and will continue logging them until you click stop where you clicked start before: Team Eta 4 8. Now drive around the area you wish to hold a security audit with the computer on and inSSIDer capturing. 9. Once you are finished, you can sort the wireless networks in one of two ways. In the first way, simply click the “Privacy” column and it will sort by privacy on the network: 10. The second way is to click filter tab in the bottom portion of the program 11. Then click on “Quick Filters”: 12. Hover over security and select “Any open network” 13. This will give you a list of all open networks in the area that you drove through. 14. BONUS: If you have a GPS chip in your laptop, you could also enable GPS to simultaneously capture while SSIDs are being logged, which will allow you to see exactly where the networks are. 15. Now that you have successfully completed a security audit of the area, it is your job to provide the authorities with instructions on how the people with open networks can secure them… Team Eta 5 Task 2: Securing the Network Intro: In a shocking turn of events, your network at home has been one of the networks found to be open. You decide you should really change that before the file-stealer in the Honda Accord hits you next. You trace this lack of security back to your brother, of whom you room with, buying a router to connect his Xbox360 to the internet. Thankfully, this can be changed in a few easy steps. Steps: 1. Login to the router by typing the routers IP address in the address bar (usually 192.168.1.1) 2. Type in the username and password. Chances are, if your brother didn’t know about Wifi security, he hasn’t changed the default username away from “admin” and the default password away from “password”. 3. Once logged in, click the “Wireless” tab at the top of the page 4. Then click the “Wireless security” in the new tab right below where you just clicked “wireless” 5. Change the “Security Mode” to “WPA2 Personal” (or WPA if your router does not support WPA2) 6. Make sure the algorithm is set to “AES” as it is the most common and no additional configuration will be needed on each computer to connect to the router aside from the password. 7. Type your password in the “WPA Shared Key:” area. This password should be strong, containing a variety of letters and numbers and also be a non-dictionary word. In the spirit of Easter, which is right around the corner, you decide to go with “Bu2007nny”. 8. The “Group Renewal Key” is how often the encryption will be changed so anybody snooping the network would only have 10 minutes with a value of “600”. If you do not use a dictionary word, it would be very hard to crack a password under 10 minutes at this point. Team Eta 6 9. Once all the values you set are finalized, click “Save Settings”. 10. The router reboots and you are finished! You now have a safe and secure wifi network. Conclusion/Lessons Learned: By having an open network, a person is open to all kinds of vulnerabilities. As you saw earlier in the semester using wireshark, once an intruder is inside your network, if they have wireshark running, they can see your data. That includes passwords if not sent over a secure source, which, sometimes in a home network, encryption is forgone for ease of use. With these passwords, the intruders could then take this information and attempt to break into your email, forum accounts, or even worse, your bank. Also, if there are shared files on the network with read/write access, a malicious intruder could scour these documents for information for identity theft or even delete the files “for fun”. Wardriving is a grey area in the realm of legality, as it is your job, as a user, to secure your wireless network. So while the things the intruders may be doing is illegal (breaking into your bank account, identity theft), actually getting into your wireless network is not. Team Eta 7 Team Report (Requirements): Clearly state your results of this project. You are expected to hand in a report in the following format: A cover page (including project title) with team name and team members A table of contents with page numbers Use double-spaced type for convenient grading Number pages. Font size 12, single column Save the Microsoft Word document with the team name in the title. Upload the document into the appropriate ANGEL dropbox. The report should have the following sections – One on Task 1 and one on Task 2 Task 1: (Provide screenshots) 1. 2. 3. 4. 5. How many SSIDs did you pick up in your audit? How many were in the 2.4 Ghz range? How many were in the 5.0 Ghz range? How many were unsecured? BONUS: How many were public wifi and how many were from private households? Task 2: (Provide screenshots) 1. Show your unsecured wireless network in inSSIDer when it was unsecured. 2. Show the wireless settings page before you click “save settings”. 3. Show your now secured wireless network in inSSIDer once the settings are applied. Resources: "What Is Wardriving." Online Learning. Web. 04 Feb. 2011. <http://www.learn.geekinterview.com/it/wireless/what-is-wardriving.html>. "Wardriving Tools." WarDriving.com. Web. 04 Feb. 2011. <http://www.wardriving.com/code.php>. "Wireless LAN Security." Wardriving. Web. <http://www.wardrive.net>. "Download InSSIDer." InSSIDer. CNet. Web. <http://download.cnet.com/inSSIDer/30002085_4-10848357.html>.