Lec7 NetworkAttacksLowerLayers
Lec7 NetworkAttacksLowerLayers
Mobin Javed
• Eavesdropping
• Spoo ng
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
SSID
Password: $secret!
KeyCounter
(and other stuff)
Password: $secret!
KeyCounter
(and other stuff)
Password: $secret!
KeyCounter
(and other stuff)
Password: $secret!
KeyCounter
(and other stuff)
Password: $secret!
KeyCounter
(and other stuff)
Password: $secret!
KeyCounter
(and other stuff)
K Password: $secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
Eve
Eve
attacks!
K
K Password: $Secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
Eve Since the password is never exposed, if
Eve doesn’t know it, the best she can do
is a dictionary attack to try to guess it.
K Password: $secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
Eve Since the password is never exposed, if
Eve doesn’t know it, the best she can do
is a dictionary attack to try to guess it.
K Password: $secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
Eve BUT: if Eve ponies up $2.25 for a cup of
coffee and gets the password to the local
net …
K Password: $secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
K
K Password: $secret!
KeyCounter
(and other stuff)
KeyCounter
(and other stuff) WPA2, common form (“Personal”; simplified)
WPA2, actually-secure-but-inconvenient form(“Enterprise”; simplified)
Your laptop is preconfigured with a
cert for an Authentication Server.
a
{Auth: A}K-1CA
Auth
a
{Auth: A}K-1CA
Auth
User=Alice, Password=
ReallyHard2Gue$$
a
{Auth: A}K-1CA
Auth
K
a
{Auth: A}K-1CA
Auth
...
host host host DHCP = Dynamic Host
Configuration Protocol
DHCP server
Dynamic Host Configuration Protocol
DHCP
disco
(broa ver
dcas
t)
DHCP
disco
(broa ver
dcas
t)
AC K
H C P
D
Dynamic Host Configuration Protocol
DHCP
disco
(broa ver
dcas
t)
DHCP
disco
(broa ver
dcas
t)
DHCP
disco
(broa ver
dcas
t)
DHCP
disco
(broa ver
dcas
t)
AC K
H C P Attacker can race the actual server;
D
if attacker wins, replaces DNS
server and/or gateway router
DHCP Threats
• Substitute a fake DNS server
– Redirect any of a host’s lookups to a machine of
attacker’s choice (e.g., gmail.com = 6.6.6.6)
• Substitute a fake gateway router
– Intercept all of a host’s off-subnet traffic
o (even if not preceded by a DNS lookup)
– Relay contents back and forth between host and remote
server
o Modify however attacker chooses
– This is one type of invisible Man In The Middle (MITM)
o Victim host generally has no way of knowing it’s happening! 😟
o (Can’t necessarily alarm on peculiarity of receiving multiple DHCP
replies, since that can happen benignly)
• How can we fix this? Hard, because we lack
a trust anchor
Class Activity
• https://support.huawei.com/enterprise/en/doc/
EDOC1000178177/83420524/defense-against-
bogus-dhcp-server-attacks