Eavesdropping Attack Over Wi-Fi: Course: Security and Privacy On The Internet
Eavesdropping Attack Over Wi-Fi: Course: Security and Privacy On The Internet
Eavesdropping Attack Over Wi-Fi: Course: Security and Privacy On The Internet
Presented By:
Fadi Farhat
Fall, 2007
1 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Table of Contents
Part I: Paper presentation
1. Define Eavesdropping.
2. Difference between Eavesdropping over wired networks
& Eavesdropping over wireless networks.
2 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Table of Contents
Part II: Project presentation
Introduction
1. Experiment Architecture and Scenarios
2. Hosts Installations and Configuration
3. Tuning CommView sniffer for experiment
4. Conducting the Experiment
4.1. Spying on HTTP (Web Pages)
4.2. Spying on FTP (Downloading files)
4.3. Spying on SMTP (Emails)
5. IDS Promisacn 3.0
6. References
7. Lab Experiment with ?????
3 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Part I
Paper presentation
4 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Eavesdropping
5 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Eavesdropping over
wired & wireless networks
Eavesdropping over wired networks
Over wired networks eavesdropping is more
difficult
It needs the eavesdropper to tap the
network, using a network tap which is a
hardware device that provides a way to access
the data flowing across the network.
Can’t be achieved unless the eavesdropper
can be in touch with the wire of the network
which is difficult sometimes and impossible the
other times.
6 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Eavesdropping over
wired & wireless networks
You need
A computer with wireless network adapter working on
promiscuous mode
To be in the area of the wireless network coverage
7 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What we need to eavesdrop?
1. Hardware tools
8 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What we need to eavesdrop?
2. Software tools
Widely available for sale and even free over the Internet
Ex:
Network Stumbler, Hitchhiker, Aircrack-ng,
Wireshark, Kisemet, Commview, Javvin packet
analyzer, Wildpackets, Network monitor, Wireless
monitor
9 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Legality of eavesdropping devices
Be aware of the legal issues before you buy
eavesdropping devices.
10 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
What makes Wi-Fi susceptible to be
compromised
11 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Securing Wi-Fi Networks?
12 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
Simple Steps to Secure Wi-Fi Network
13 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
1. Change the Administrative Password
on your Wireless Routers.
14 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
2. Installing a Firewall.
15 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
3. Change the Default SSID Name and
Turn off SSID Broadcasting.
In Wi-Fi a service set identifier (SSID) is a code
attached to all packets on a wireless network to
identify each packet as a part of the network.
16 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
4. Disable DHCP
17 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to Secure Wi-Fi Networks?
18 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Wi-Fi Special attacks
Man-In-The-Middle Attack is one of the attacks
that can’t be applied to wired networks, it’s just
applicable to Wi-Fi.
19 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
How to detect eavesdropping over Wi-Fi
20 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Part II
Project presentation
21 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Introduction
22 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Experiment Architecture and Scenarios
Experiment Architecture
NetGear Wireless router
Victim Laptop
Toshiba Windows XP
Ethernet Intranet
Intranet Server
Windows Server 2000
Victim Machine (Web, Mail, FTP services)
Intruder
HP Laptop
Windows XP
CommView for WiFi
Intruder Machine
23 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Experiment Architecture and Scenarios
Experiment Scenarios
24 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Toshiba Laptop
CPU: Centrino 1.7 Ghz
Memory: 1 GB
Hard Disk: 80 GB
Operating System: Windows XP professional
IP Address: 192.168.1.2
25 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Victim Machine
Configuring Outlook Express email client
26 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Victim Machine
Configuring Outlook Express email client
27 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Victim Machine
Configuring Outlook Express email client
28 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
HP Laptop
CPU: Centrino 1.7 GHz
Memory: 512M
Hard Disk: 60 GB
Operating System: Windows XP professional
IP Address: NO IP ADDRESS
CommView For Wi-Fi (packet sniffer and generator)
29 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
IBM server
CPU: Xeon 3.00 GHz
Memory: 256 MB
Hard Disk: 80 G
Operating System: Windows 2000 Advanced Server (Ser)
IP Address: 192.168.1.100
Application: MS-IIS web server, SMTP Relay service, FTP service.
Note: For assist limitation: This server is implemented using VMware ver 4.0. A
virtual machine application that runs on top of the installed operating system. I
had to use it because the installed OS (windows XP) doesn’t support web
services (IIS, SMTP, FTP).
100 Mbps UTP connection to Access point
30 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Host Intranet Server
ON windows 2000 server, start->setting -> control panel
Add/Remove program, Add/Remove windows Components
Check the checkbox of IIS services
31 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Host Intranet Server
For the HTML, add the file called default.htm to the folder
c:\inetpub\wwwroot.
32 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of Host Intranet Server
For SMTP, configure mail server domain name.
start programs administrative tools Internet Services
Manager. Click on SMTP. Right click on domain. Click Add
new domain and type uwindsor.ca.
33 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
34 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
SSID
IP address
DHCP service
Channel ID
Brand Name: Netgear 54 wireless router XG614v7
SSID name: Stay Away
Channel ID: 2
4 ports UTP switch (Intranet server is connected via)
Operating System: Windows 2000 Advanced Server (Ser)
IP Address: 192.168.1.1
Acts as a router between the wireless network and the intranet network as
shown in figure 1
35 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration of
Access point
Router
Configure Netgear
using HTTP
browser typing
HTTP://192.168
.1.1
36 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Hosts Installations and Configuration
Configuration
of Access
point Router
Configure the IP
address and
the DHCP of
the AP
37 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Starting CommView for Wi-Fi,
Click on File menu then select start capture.
38 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Configure the channel number
To limit the search
39 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Configure IP aliases to simplify the analysis of the captured
packets by showing the alias name instead of IP address.
40 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Configuring CommView Rules (Filters)
Click on Rules tab
Enable IP address rules
Check the Capture option,
Check the Both option
Type the IP addresses of the entire host
41 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Configuring CommView Rules (Filters)
My scenario is to capture certain packets
so only sniff the following set of protocols
42 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Tuning CommView sniffer for experiment
Configuring CommView Rules (Filters)
Click on Rules tab
Tell the sniffer to only sniff the following set of protocols
TCP port 80 for HTTP
TCP port 20, 21 for FTP
TCP port 25 for SMTP (mail).
43 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Start Eavesdropping
Start CommView by clicking on File --> start capture
From the scanning window, click on start scanning
44 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
45 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Spying on HTTP (Web Pages)
46 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Spying on HTTP (Web Pages)
47 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on HTTP (Web Pages)
48 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on HTTP (Web Pages)
CommView was even able to show images transferred during the
HTTP session
49 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
50 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
51 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on FTP (Downloading files)
The intruder was able to capture the whole session in 67 packets. The
username and password where captured. All the commands issued by
the victim where gathered as well as a copy of the downloaded text file.
52 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on FTP (Downloading files)
Copy of the downloaded text file.
53 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on SMTP (Emails)
The victim, using his Outlook Express sends a confidential email to Dr. Aggarwal
54 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
Spying on SMTP (Emails)
CommView captured the email, the sender, the receiver and the subject
55 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Conducting the Experiment
56 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
IDS Promisacn 3.0
57 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
References
58 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal
Questions in the lab
59 564 Fall 2007 Security and Privacy on the Internet - Dr. A.K. Aggarwal