Practical WLAN Security
Practical WLAN Security
The first experiment we tried out was breaking WEP. 4.3 Deploying an Evil Twin
With a bit of pre-work we where able to break it within a
minute. As mention before we used aircrack-ng to The next experiment was to deploy an Evil Twin. For
intercept and inject packets. Besides the tools and this we used airbase-ng. To make this work there is not
hardware there are a few things you need to know to be really much that need to be done. Airbase-ng is setup so
able to break WEP this way, the BSSID for the AP we it will respond to any prob request with a proper prob
are going to attack, MAC-address for the PC running the response, all you need to know is if the AP you are
attack, the AP channel and the wireless interface. The pretending to be is using WEP or WPA and recover the
MAC-address for your wireless interface is already key. Another thing you can do to make the client more
known, and to get the BSSID of the AP and what likely to associate with your own AP instead of the real
channel it is using can easily be obtained by the help of one is to dissociate the real AP. This can be done with
kismet. Kismet scans for all closely networks and list airplay-ng. With the Evil Twin a man-in-the-middle
information about them including the BSSID and attack is preformed, capturing any data sent from the
channel used. To be able to crack the WEP key we need client. [17].
to gather a lot of IV:s (initialization vectors). Under 4.4 Breaking WPA
normal circumstances networks don't generate these IV:s
very quickly, and it can take some time before you have To break WPA we used a so called dictionary attack
gathered enough to break the WEP-key. Luckily we can and the tool we choose to use was coWPAtty. To make
speed up this process by using injections. Here follows a this work you first need to capture the WPA four-way
total of 4 steps we preformed to break the WEP-key. handshake before running coWPAtty. The handshake is
Step 1) For the packet injection to work the source captured the same way as in WEP but with a few flag
MAC-address must already be associated or else the AP changes. Normally this can take quite some time to wait
will ignore the sent packet. So the first thing we do is to for a client to connect to the AP. To speed it up we use
make a fake authentication with the AP using airplay-ng. airplay to de-authenticate the clients from the AP,
Step 2) Here we will start listening for ARP requests, forcing them to re associate with it. After getting the
forge them and inject them back into the network forcing handshake we ran coWPAtty against a pre-computed
the AP to broadcast them again with new IV:s. hash. The result can be seen in fig2.
Step 3) At the same time we start injecting packets we
use airdump-ng to capture all IV:s sent from the AP and
saves them to a file.
injecting WPA protected networks using TKIP is out
public, bad things can happen [18].
6. References
[1] Institute of Electrical and Electronic Engineers: 802.11
Standard
http://standards.ieee.org/getieee802/802.11.html
[2009-04-03]
[2] J. Geier, “Understanding 802.11 frame types”
http://www.wi-
fiplanet.com/tutorials/article.php/1447501
[2009-04-04]
[3] N. Borisov, I. Goldberg, D. Wagner, “Intercepting
mobile communication: The Insecurity of 802.11”,
http://www.isaac.cs.berkeley.edu/isaac/mobicom.pdf,
[2009-04-11]
Figure 2. Breaking WPA with coWPAtty [4] Wikipedia “Wi-Fi Protected Access”,
http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access,
Instead of a pre-computed hash you could use a
[2009-04-11]
dictionary file and it would give the same result but take
longer because you would need to hash the password and [5] D. Byers, IDA at Linköpings Universitet
SSID before comparing.[12] http://www.ida.liu.se/~TDDD17/lectures/slides/tddd17_
lec03_net.pdf
5. Conclusions [2009-04-11]
We have found out in this practical study on wireless [6] S. Vibhuti, “IEEE 802.11 WEP(Weird Equivalent
network security that there are a lot of security flaws and Privacy) Concepts and Vulnerability”
they are very well documented, finding information both http://www.cs.sjsu.edu/faculty/stamp/CS265/projects/S
for the theoretical part and the experiments were easy. pr05/papers/WEP.pdf
During the preparation for the practical experiments [2009-04-11]
[7] A. Stubblefield, J. Ioannidis, A. Rubin, “Using the
we noticed that almost everything except the Evil Twin
Fluhrer, Mantin, and Shamir Attack to Break WEP”
attack was described in easy step-by-step guides on http://www.isoc.org/isoc/conferences/ndss/02/papers/stu
several web pages, the level of knowledge needed to bbl.pdf
launch several of the attacks is scary low. We think that [2009-04-11]
this is both good and bad, good in the sense that with [8] M. Beck, E. Tews, “Practical attacks against WEP and
well documented security flaws people should notice the WPA” http://dl.aircrack-
need of better security, unfortunately it seems that a lot ng.org/breakingwepandwpa.pdf
of people either don't know or care about this, as you [2009-04-11]
still can find networks unprotected or with weak [9] Wi-Fi Aliance, “Deploying a Wi-Fi Protected acess
protection. Then there are the problems with the open (WPA) and WPA2 in the Enterprise ” http://www.wi-
networks whom are vulnerable to many attacks, we think fi.org/files/kc/WPA-WPA2_Implementation_2-27-
that this is a problem that is hard to fix when those 05v2.pdf
problems exist in probably all wireless network since the [2009-04-11]
air is hard to control. However, there has been some [10] J. van Rantwijk “WPA key calculation”
articles of the insecurity of wireless networks in the http://www.xs4all.nl/~rjoris/wpapsk.html
[2009-04-04]
news over past few years. With a quick scan at
[11] A. Stone, “The Michael Vulnerability” http://www.wi-
neighborhood it seems that such articles has given result,
fiplanet.com/columns/article.php/1556321
we found almost only WPA and WPA2 encrypted [2009-04-04]
networks. If the users have chosen good passwords is [12] Wirelessdefens.org,
another thing. In this project we have realized that to http://www.wirelessdefence.org/Contents/Aircrack-
keep you wireless network well secured today you really ng_WinAircrack.htm
should use WPA2 with AES CCMP and a good long [2009-04-24]
password together with a strange ESSID to make sure [13] G. Lehembre, “Wi-Fi Security, WEP, WPA and
wordlist, rainbow table and normal brute force attacks WPA2”
aren't easy. WPA with a good strong password is http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin
properly enough in most cases but since tools for packet 9_wifi_EN.pdf
[2009-04-11]
[14] DarkAudax, “Simple WEP crack”
http://209.85.129.132/search?q=cache:71C_KfQN1VQ
J:www.aircrack-
ng.org/doku.php%3Fid%3Dsimple_wep_crack+aircrac
k-
ng+wep&cd=1&hl=sv&ct=clnk&gl=se&client=firefox-
a
[2009-04-24]
[15] FR3DC3RV, “Evil Twin”
http://fr3dc3rv.blogspot.com/2007/04/evil-twin.html
[2009-04-15]
[16] The shmoo group, “Rogue Squadron: Evil Twins,
802.11intel, Radical RADIUS, and Wireless
Weaponry for Windows”
http://airsnarf.shmoo.com/rogue_squadron.pdf
[2009-04-15]