ISRM Presentation
ISRM Presentation
Presented By:
Yograj Sharma
2022PITP-303
Key Terms:
1. Rogue Access Point : A Wireless Access Point that has been installed on a secure network
without authorization from a local network administrator.
3. WEP/WPA : Wired Equivalent Privacy / Wi-Fi Protected Access i.e., Wi-Fi Security
Protocols.
These keys which are generated through 4-way handshake are generated by
some source key material which will be discussed on next slide.
Important Terminologies used in 4 Way Handshake:
• MSK (Master Session Key): Pairwise master is key generated from master session key (MSK).
• PTK (Pairwise Transient Key): PTK = PRF (PMK + Anonce + SNonce + Mac (AA)+ Mac (SA))
Though IEEE designs a series of really safety protocol 802.11, especially, the most
famous and useful way of encryption is WPA2. However, the original protocols have been
difficulties to cope with the variety of attacks; upgrading in time cost a lot; existing
intrusion detection systems mainly for the enterprise environment, not suitable for large-
scale deployment in public places.
Cont.…
Personal router cannot grantee the security from rogue AP, Deauth and other attacks. In
addition, lost accounts, privacy leaks and other incidents broke out frequently due to
using WiFi, user security awareness is weak.
The work in this paper aims at protecting the users during surfing the Internet through
the WiFi. A Whole-Process WiFi Security Perception System is design based on the
analysis of client’s using process, focusing on the details of possible threatens during the
pre-connect, connecting and after-connected.
It consists of three modules using different methods to deal and protect three periods of
time.
Software System Scheme:
Figure 1 shows, the software works on three periods of time. First, software will sniff the environment;
begin a basic detection for user to identify the APs. Next, when user decides which AP he wants to
connect, during the connection, we will begin a fog connection to protect the real data transport. After the
connection has been built, our real time detection module will detect the de-auth attack.
2. Sniffing Module:
By the idea of Fog Computing, It send fake 4way handshake to protect PSK from sniffer and
leading him to get a fake PSK.
We use command "airmon-ng" to set up the network interface controller (NIC) card into
promiscuous mode in order to collect all the data from the environment.
Here, we use the library Scapy which provides many API to control the NIC card.
Contd…
After sniffing the data, useful data is collected and store them in a dictionary structure.
We use SSID as keyword of each AP. MAC address is an unparalleled feature to each AP.
Following this rule, we collect the channel, method of encryption etc, and we also store
A remarkable feature of phishing attacks is the AP’s SSID already exists. Individual’s
computer cannot judge whether they belong to a same secure SSID or not. There two
reasons this method can be succeed:
Default setting in computers will regard same SSID, same encryption AP as one.
Computers will choose AP with stronger signal to grantee better experience for users,
without any security authentication.
Contd..
When hacker’s AP has stronger signal than the one, users will automatically connect to the
rogue AP.
In order to prevent this circumstance, we match the MAC address with manufacturer, because
the first three bytes of MAC address is correspondent with the manufacturer according to the
IEEE standard.
Here, we download the list from IEEE website and rearrange them in a specific order. Each
time we sniff the environment; the information will be rematches with the list and marked in
different security level .
2. Protocol Fingerprint
Detecting
Normal AP and rogue AP both can provide
the same network connection, same method
of data encryption, even a real Internet
environment.
The systems will have different reaction with the same protocol request, because they have
different protocol stack realization which is also quite unique for each type of system. This
fingerprint will be extracted from the packet.
In this software, we mainly focus on protocol TCP/IP and ARP. After the data is collected, we
will compare it with the dictionary from Nmap1. There is also some python library related to
it and make it easier to consult the result.
3. Amount of
Connection Detection
In public places, normal AP will have
certain number of connection before the
attacker arrives.
This module takes the concepts of active defense to cheat the attacker sniff process in order
to achieve the goal of protecting data.
According to 802.11, the initial authentication process is carried out either using a pre-shared
key (PSK) or following an EAP exchange through 802.1X (known as EAPOL, which requires
the presence of an authentication server).
Cont…
This process ensures that the client station (STA) is authenticated with the AP. After the PSK or
802.1X authentication, a shared secret key is generated, called the Pairwise Master Key (PMK).
After the handshake, connection is built and thanks to the encryption method, it is too hard to
decrypt by the attackers.
In that case, attacker chooses to sniff the handshake period packets which are the only no-
protection packets after the connection. Without encryption, handshake packets are easy to
decrypt and get the real password.
1. Protection Method
After the second handshake, all the packets will send to the
AP. If the attacker is sniffing at the same time, the result
will be obfuscated.
4-Way Handshake:
Using a wireless router can access the legitimate AP, named WIFI-SEC, using WPA2-PSK
security types.
The victims have been connected to the legitimate AP, and Internet.
Currently, the tools most used are called air crack-ng. It is a serial of tools include sniffing,
decrypting password, creating rogue A P etc. We use this tools to test our software .
Cont..
Equipment Details
The system could detect WiFi environment shows with 3D effect, marking the Rogue A P, and during the
connection, it inspired by the idea of Fog Computing, sending fake traffic to protect PSK from sniffing. After
connection, the system detects Deauth attack in time, and traces the attacker.
The software functionalities are realized, all the suspicious points are displayed on the User Interface (UI), and
all the instruction is very simple and clear. It is designed even for those who only know a little about the
computer operation, so normally there should not be any problem through the manipulation.
The corresponding experimental testing results show that it could protect the surf in the WiFi environment
effectively
Thank You !