router attacks and prevention

16
ROUTER ATTACKS AND PREVENTION BY: Piyush Mittal Nit Rourkela

Upload: piyush-mittal

Post on 14-Apr-2015

411 views

Category:

Documents


0 download

DESCRIPTION

ROUTER ATTACKS AND PREVENTION

TRANSCRIPT

Page 1: ROUTER ATTACKS AND PREVENTION

ROUTER ATTACKS AND PREVENTION

BY:

Piyush Mittal

Nit Rourkela

Page 2: ROUTER ATTACKS AND PREVENTION

WHAT IS ROUTER

• A router is an electronic device that interconnects two or more computer networks, and selectively interchanges packets of data between them.

Page 3: ROUTER ATTACKS AND PREVENTION

HOW IT WORKS

Page 4: ROUTER ATTACKS AND PREVENTION

TYPES OF ATTACKS

• WEP Cracking

• CSRF on web based router configuration

• Enumeration of private router data

• Packet sniffing, searching for sensitive data

Page 5: ROUTER ATTACKS AND PREVENTION

WEP CRACKING

• Definition:

WEP (Wireless Encryption Protocol) is a protocol that adds security to wireless local area networks (WLANs) based on the 802.11 Wi-Fi standard. WEP is an OSI Data Link layer (Layer 2) security technology that can be turned "on" or "off." WEP was designed to give wireless networks the equivalent level of privacy protection as a comparable wired network.

Page 6: ROUTER ATTACKS AND PREVENTION

Typical WEP encryption allows for of 64, 128, 192 &

in some cases 256 bit encryption. In each case

the actual key size is X - 24 bits. So 64 bit WEP

encryption has a 40 bit security key. The 24 bits are used as the IV (Initialization Vector). Together they form the RC4 “traffic key”. These

are then XORed with the plain text to form the encrypted cipher text.

Page 7: ROUTER ATTACKS AND PREVENTION

FLAWS

• Because RC4 is a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.

Page 8: ROUTER ATTACKS AND PREVENTION

CSRF on web based router configuration

• The more popular CSRF exploits work by having malicious code or a link on a Web page that gives the attacker access to a Web application that the user has already been authenticated to use. If the session is enabled in the browser (different tab), the attacker then has control of that particular Web application.

Page 9: ROUTER ATTACKS AND PREVENTION

A real-world example of this is the ability of attackers to commandeer certain Web-based e-mail accounts. The

required steps to gain ownership are shown in the following example:

• I log into a Web-based e-mail account.

• I want to surf the Internet while waiting for an important e-mail, so I open a new tab in the browser.

• The Web site I surfed to contains hidden code. My surfing activates the code and sends a HTML request to my e-mail Web server. It just so happens that this request is to delete all my e-mail.

Page 10: ROUTER ATTACKS AND PREVENTION

Packet sniffing, searching for sensitive data

• A packet analyzer (also known as a network

analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intrcept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content.

Page 11: ROUTER ATTACKS AND PREVENTION

PREVENTION OF THESE ATTACKS

• Configure your router to use WPA encryption

• Change the default password on your router

• Change the management port on your router to something non-standard (if supported)

Page 12: ROUTER ATTACKS AND PREVENTION

Configure your router to use WPA

encryption

Page 13: ROUTER ATTACKS AND PREVENTION

Change the default password on

your router

Page 14: ROUTER ATTACKS AND PREVENTION

Change the management port on your router to something non-standard

Page 16: ROUTER ATTACKS AND PREVENTION

Thanks