Day 5 Assignment
Day 5 Assignment
Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
2. Case study on wifi attack
ABSTRACT
Mobile devices regularly broadcast WiFi probe requests in order to discover available proximal WiFi
access points for connection. A probe request, sent automatically in the active scanning mode,
consisting of the MAC address of the device expresses an advertisement of its presence. A real-
time wireless sniffing system is able to sense WiFi packets and analyse wireless traffic. This
provides an opportunity to obtain insights into the interaction between the humans carrying the
mobile devices and the environment. Susceptibility to loss of the wireless data transmission is an
important limitation on this idea, and this is complicated by the lack of a standard specification for
real deployment of WiFi sniffers. In this paper, we present an experimental analysis of sniffing
performance under different wireless environments using offthe-shelf products. Our objective is to
identify the possible factors including channel settings and access point configurations that affect
sniffing behaviours and performances, thereby enabling the design of a protocol for a WiFi sniffing
system under the optimal monitoring strategy in a real deployment. Our preliminary results show
that four main factors affect the sniffing performance: the number of access points and their
corresponding operating channels, the signal strength of the access point and the number of
devices in the vicinity. In terms of a real field deployment, we propose assignment of one sniffing
device to each specific sub-region based on the local access point signal strength and coverage
area and fixing the monitoring channel belongs to the local strongest access point.
DISCUSSION
• MAC randomization. Most of the mobile devices perform MAC randomization as a privacy-
preserving feature in active discovery mode; discussion of this is beyond the scope of this paper. In
this work, we make reasonable assumption that most of the devices are connected to the WiFi
network in each of the working and living environments (i.e. university and home) and this will
always result in revelation of the real MAC address in the probe request packets. Therefore MAC
randomization is expected to have very little impact on the analytic results in this paper.
• During the tests, it has been observed that some devices do not send direct probes under default
factory settings. Moreover, some advanced home routers will automatically adjust their transmission
channels based on current channel occupancy and interference, rather than remain on a fixed
channel. As for the tests conducted in a house, we manually set the channels to avoid interference
from other APs in the neighbourhood on the same channels. VOLUME 8, 2020 129233 Y. Li et al.:
Case Study of WiFi Sniffing Performance Evaluation Nonetheless, under the channel allocation
regime at 2.4GHz, there are only three non-overlapping channels, so interference is likely
regardless in our results.
• We have demonstrated the possible factors that affect the number of received probe data based
on the data collected in a relatively simple home wireless environment where the AP configurations
are simple. Because of lack of knowledge of the wireless environment in the neighbourhood, we can
only investigate the data based on what is known about the environment, for example, number of
devices, connection status and phone activity. As for the dynamic environment in an enterprise
WLAN deployment (such as university network), those factors also impact the sniffing performance.
However, the situation is more complicated, we believe there are other factors such as channel
capacity and link quality that affect the overall sniffing performance. For example, commercial WiFi
APs normally support automatic detection of surrounding interference and apply a radio calibration
algorithm that allows dynamic channel selection and power adjustment to minimize such kinds of
interference [39]. In addition, most of the client devices are mobile, typically being carried around by
humans walking around, so that seamless roaming between APs should be taken into
consideration. Moreover, client roaming decision is subject to vendor-specific configurations,
including the signal strength, communication quality, error rate and missing probes etc. Therefore, it
is suggested to automatically adjust the sniffing channels according to the WiFi AP configurations.
Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
CONCLUSION
In this paper, we have investigated the performance of WiFi sniffers under different channel
configurations using off-theshelf products in different wireless scenarios. We conduct the ANOVA to
statistically analyse the sniffing impacts between channels. We also further investigate the probing
behaviours over not-in-proximity channels which exhibits a large number of probes with randomized
MAC addresses. This research proposes a WiFi sniffer protocol using the optimal monitoring
channel. We have demonstrated that the number of received probe packets are affected by a range
of factors, among which the number of APs and their corresponding operating channels, the signal
strength of the AP and the number of devices in the vicinity play significant roles. In a real
deployment, it is suggested to assign one sniffer as close as possible to the AP in each sub-area
and fix the monitor channel to be the one that the local strongest AP operates on.
The company was initially hacked via a consumer complaint web portal, with the attackers using
a widely known vulnerability that should have been patched but, due to failures in Equifax’s
internal processes, wasn’t. The attackers were able to move from the web portal to other servers
because the systems weren’t adequately segmented from one another, and they were able to
find usernames and passwords stored in plain text that then allowed them to access still further
systems. The attackers pulled data out of the network in encrypted form undetected for months
because Equifax had crucially failed to renew an encryption certificate on one of their internal
security tools. Equifax did not publicize the breach until more than a month after they discovered
it had happened; stock sales by top executives around this time gave rise to accusations of
insider trading.
Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109
Impact
Equifax specifically traffics in personal data, and so the information that was compromised and
spirited away by the attackers was quite in-depth and covered a huge number of people. It
potentially affected 143 million people — more than 40 percent of the population of the United
States — whose names, addresses, dates of birth, Social Security numbers, and drivers’ licenses
numbers were exposed. A small subset of the records — on the order of about 200,000 — also
included credit card numbers; this group probably consisted of people who had paid Equifax directly in
order to order to see their own credit report.
This last factor is somewhat ironic, as the people concerned enough about their credit score to pay
Equifax to look at it also had the most personal data stolen, which could lead to fraud that would
then damage their credit score. But a funny thing happened as the nation braced itself for the wave
of identity theft and fraud that seemed inevitable after this breach: it never happened. And that has
everything to do with the identity of the attackers.
Conclusion
Get the basics right. No network is invulnerable. But Equifax was breached because it failed to
patch a basic vulnerability, despite having procedures in place to make sure such patches were
applied promptly. And huge amounts of data was exfiltrated unnoticed because someone neglected
to renew a security certificate. Equifax had spent millions on security gear, but it was poorly
implemented and managed.
Silos are defensible. Once the attackers were inside the perimeter, they were able to move from
machine to machine and database to database. If they had been restricted to a single machine,
the damage would’ve been much less.
Data governance is key — especially if data is your business. Equifax’s databases could’ve
been stingier in giving up their contents. For instance, users should only be given access to
database content on a “need to know basis”; giving general access to any “trusted” users means
that an attacker can seize control of those user accounts and run wild. And systems need to keep
an eye out for weird behavior; the attackers executed up to 9,000 database queries very rapidly,
which should’ve been a red flag.
Web - https://academy.cyberheals.com/ibby_master_program
Phone - +91 63851 81109