wlan security and analysis -...
TRANSCRIPT
![Page 1: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/1.jpg)
WLAN Security and AnalysisApril 1, 2008
Thomas d’Otreppe de BouvetteAircrack-ng
SHARKFEST '08Foothill CollegeMarch 31 - April 2, 2008
![Page 2: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/2.jpg)
Agenda Who Am I? Wireless networks
Timeline Overview of 802.11 networks Wireless packets Encryption Interactions with networks Capture files analysis
OSdep Demo
![Page 3: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/3.jpg)
Who Am I?
Started Aircrack-ng ~2 years ago.
Graduated from Brussels High School in June 2006
Currently work as IT consultant
Created Offensive-Security WiFu course
![Page 4: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/4.jpg)
Overview of 802.11 networks -Timeline
802.11: ’97 802.11a: ‘99 802.11b: ’99 802.11g: 2003 802.11n: Group started in January 2004
D1.0 (1.06): November 2006 D1.1: January 19, 2007 D2.0: March 2007 D3 (3.02): January 2008
![Page 5: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/5.jpg)
Overview of 802.11 networks - OSI
Physical
Data Link
PHY
MAC
802.2 Logical Link Control
802.3 MAC
802.3 PHY
802.11 MAC
802.11FHSS PHY
802.11bHR/ DSSS
PHY
802.11aOFDM PHY
802.11DSSS PHY
802.11gERP PHY
802.11IR
PHY
LLC
![Page 6: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/6.jpg)
Overview of 802.11 networks – Operating Modes
Infrastructure
Ad hoc
![Page 7: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/7.jpg)
Overview of 802.11 networks -Infrastructure
AP
STA STA
AP
STA STA
DS
BSS BS
S
ESS
![Page 8: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/8.jpg)
Overview of 802.11 networks – Ad hoc
STASTA
IBSS
![Page 9: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/9.jpg)
Wireless packets – Frame structure
Frame control Duration / ID Address 1 Address 2 Address 3 Sequence
Control Address 4
Data FCS
bytes
Protocol Version Type Subtype To
DSFromDS
More frag Retry More
DataPower Mgmt
Prot.frame Order
bits 2 2
2 2 2
4
4
1 1 1 1 1 1 1 1
6 6 6 6
0-2324
Header
bytes 30
Sequence Number FragmentNumber
bits 12 4
![Page 10: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/10.jpg)
Wireless packets – Frame structureAddresses
APDASABSSID10
WDSSADATARA11
APSABSSIDDA01
IBSSBSSIDSADA00
ModeAddress 4Address 3Address 2Address 1ToDSbit
FromDSbit
![Page 11: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/11.jpg)
Wireless packets – Frames types
Management frames
Control frames
Data frames
![Page 12: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/12.jpg)
![Page 13: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/13.jpg)
![Page 14: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/14.jpg)
Wireless packets – Management frames
• Definition: used to negotiate and control the relationship between the AP and the station.
• Type field value: 0
Probe response5
Probe request4
Meas. Pilot6
Reassoc. resp.3
Reassoc. req.2
Assoc. response1
Assoc. request0
DescriptionSubtype fieldvalue
Action13
Action No ACK14
Deauthentication12
Authentication11
Reserved15
Disassociation10
ATIM9
Beacon8
Reserved7
DescriptionSubtype fieldvalue
![Page 15: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/15.jpg)
Wireless packets – Management frames (1)
Beacon
Frame control Duration Destination
AddressSource
Address BSS ID Sequence Control
Frame body FCS
2 2 2
4
6 6 6
Header
24
Beacon interval
Capability information SSID Supported
rates FH Parameter SetDS
Parameter set
2 2 2Variable Variable 6
Timestamp
8
CF Parameter set
8
IBSS Parameter
set
2
Country information
Variable
FH Hopping parameter
4
FH Pattern table
Variable
Power constant
3
Channel switch announcement
6
Quiet
8
IBSS DFS
Variable
TPC Report
4
ERP Information
3Extended Supported
rates
Variable
Robust Security Network
Variable
Variable
TIM
Variable
![Page 16: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/16.jpg)
Wireless packets – Management frames (2)
![Page 17: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/17.jpg)
![Page 18: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/18.jpg)
![Page 19: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/19.jpg)
![Page 20: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/20.jpg)
![Page 21: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/21.jpg)
Wireless packets – Management frames (2)
Frame control Duration Destination
AddressSource Address BSS ID Sequence
Control
Frame body FCS
bytes 2 2 2
4
6 6 6
Header
bytes 24
SSID SupportedRates
Extended Supported
Rates
Variable Variable Variable
Probe Request
Variable
![Page 22: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/22.jpg)
Wireless packets – Management frames (3)
Probe response
Frame control Duration Destination
AddressSource
Address BSS ID Sequence Control
Frame body FCS
2 2 2
4
6 6 6
Header
24
Beacon interval
Capability information SSID Supported
rates FH Parameter SetDS
Parameter set
2 2 2Variable Variable 6
Timestamp
8
CF Parameter set
8
IBSS Parameter
set
2
Country information
Variable
FH Hopping parameter
4
FH Pattern table
Variable
Power constant
3
Channel switch announcement
6
Quiet
8
IBSS DFS
Variable
TPC Report
4
ERP Information
3Extended Supported
rates
Variable
Robust Security Network
Variable
Variable
![Page 23: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/23.jpg)
Wireless packets – Management frames (4)
Frame control Duration Destination
AddressSource
Address BSS ID Sequence Control
Frame Body FCS
bytes 2 2 2
4
6 6 6
Header
bytes 24
Authentication
Authentication Algorithm No
2Authentication Transaction
Seq No
2
Challenge text
Variablebytes
Status Code
2
Variable
![Page 24: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/24.jpg)
Wireless packets – Management frames (5)
Frame control Duration Destination
AddressSource Address BSS ID Sequence
Control
Frame Body FCS
bytes 2 2 2
4
6 6 6
Header
bytes 24
Association request
Capability Information
2
Listen Interval
2
SSID
Variable
Supported rates
Variable
Variable
![Page 25: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/25.jpg)
Wireless packets – Management frames (6)
Frame control Duration Destination
AddressSource
Address BSS ID Sequence Control
Frame Body FCS
bytes 2 2 2
4
6 6 6
Header
bytes 24
Reassociation request
Capability Information
2
Listen Interval
2
SSID
Variable
Supported rates
Variable
Source Address
6bytes
Variable
![Page 26: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/26.jpg)
Wireless packets – Management frames (7)
Frame control Duration Destination
AddressSource
Address BSS ID Sequence Control
Frame Body FCS
bytes 2 2 2
4
6 6 6
Header
bytes 24
Association/Reassociation response
Capability Information
2
Status code
2
Supported rates
Variable
Association ID (AID)
6bytes
Variable
![Page 27: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/27.jpg)
Wireless packets – Management frames (8)
Frame control Duration Destination
AddressSource Address BSS ID Sequence
Control
Body FCS
bytes 2 2 2
4
6 6 6
2
Header
bytes 24
Reason code
2
Disassociation / Deauthentication frame
bytes
![Page 28: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/28.jpg)
Wireless packets – Control frames
• Definition: Assist in the delivery of management and data frames.
• Type field value: 1
PS-Poll10
Block ACK9
Block ACK request8
Control Wrapper7
Reserved0-6
DescriptionSubtype fieldvalue
CF-End + CF-ACK15
CF End14
ACK13
CTS12
RTS11
DescriptionSubtype fieldvalue
![Page 29: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/29.jpg)
Wireless packets – Control frames (2)
Frame control Duration Receiver
AddressTransmitter
Address
bytes 2 2 6 6
FCS
4
Frame control Duration Receiver
Address
bytes 2 2 6
FCS
4
RTS
CTS
Frame control Duration Receiver
Address
bytes 2 2 6
FCS
4
ACK
![Page 30: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/30.jpg)
Wireless packets – Data frames
• Definition: Carry higher level protocol data in the frame body
• Type field value: 2
CF ACK5
Null function4
CF Poll6
Data + CF ACK
+ CF Poll
3
Data + CF Poll2
Data + CF ACK1
Data0
DescriptionSubtype fieldvalue
Reserved13
QoS CF-Poll (no data)14
QoS Null (no data)12
QoS data + CF-ACK + CF-Poll
11
QoS CF-ACK + CF-Poll(no data)
15
QoS data + CF-Poll10
QoS data + CF-ACK9
QoS data8
CF ACK + CF Poll7
DescriptionSubtype fieldvalue
![Page 31: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/31.jpg)
Interactions with networks –Encryption
Open network
WEP
WPA
![Page 32: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/32.jpg)
Interactions with networks –Encryption - Open networks
No encryption
Hotspot, mesh networks
![Page 33: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/33.jpg)
Thanks for your passwords ;)
![Page 34: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/34.jpg)
Interactions with networks –Encryption - WEP
Wired Equivalent Privacy
Part of 802.11
RC4
24 bit IV
CRC32 (ICV) for message integrity
![Page 35: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/35.jpg)
Interactions with networks –Encryption - WEP (2)
KSA
IV
Key
PRGA
Message
ICV
Keystream
EncryptedMessage ICVKey
IDIV
Header
![Page 36: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/36.jpg)
Interactions with networks –Encryption - WEP (3)
KSA PRGA Keystream
EncryptedMessage ICVKey
IDIV
Key
PlaintextMessage
Decryption
ICV
![Page 37: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/37.jpg)
Interactions with networks –Encryption - WEP (4)
function KSA()
for i from 0 to 255
S[i] := i
endfor
j := 0
for i from 0 to 255
j := (j + S[i] + key[i % keylength]) % 256
swap(S[i], S[j])
endfor
endfunction
![Page 38: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/38.jpg)
Interactions with networks –Encryption - WEP (5)
function PRGA()
i := 0
j := 0
while GeneratingOutput:
i := (i + 1) % 256
j := (j + S[i]) % 256
swap(S[i], S[j])
output S[(S[i] + S[j]) mod 256]
endwhile
endfunction
![Page 39: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/39.jpg)
Interactions with networks –Encryption - WEP (6)
1 0 11
1 0 11
1 1 00
Plaintext
Encrypted data
Keystream
Encryption
1 0 11
1 0 11Plaintext
Encrypted data
Keystream
Decryption
1 1 00
![Page 40: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/40.jpg)
Interactions with networks –Encryption - WPA
802.11i group
Developped two link-layer protocols: TKIP – WPA1: Draft 3 of 802.11i group (backward
compatible with legacy hardware). CCMP – WPA2: final 802.11i standard
Two flavors: Personal: PSK Enterprise: MGT
![Page 41: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/41.jpg)
Interactions with networks –Encryption - WPA (2)
STA
Agreement onSecurity protocols
802.1X authentication
AuthenticatorAP
Keys distributionand verification
Master Key Distribution by Radius Server
Data encryption and integrity
![Page 42: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/42.jpg)
Interactions with networks –Encryption - WPA (3)
Agreement on security protocols
Beacons and probe
Authentication: PSK or Radius server
Encryption suite for unicast and multicast/broadcast: TKIP, …
![Page 43: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/43.jpg)
Interactions with networks –Encryption - WPA (4)
802.1X Authentication
Not done with PSK Use EAP When successfully authenticated:
ACK sent to the client Generated Master Key sent to the AP
![Page 44: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/44.jpg)
Interactions with networks –Encryption - WPA (5)
STA
Agreement onSecurity protocols
AP
Keys distributionand verification
Data encryption and integrity
![Page 45: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/45.jpg)
Interactions with networks –Encryption - WPA (6)
Key distribution and verification
Confirmation of the cipher suite used
Confirmation of the PMK knowledge
Installation of the integrity and encryption keys
Send GTK securely
![Page 46: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/46.jpg)
Interactions with networks –Encryption - WPA (7)
SupplicantANonce
SNonce + MIC
GTK + MIC
ACK
Supplicant constructPairwise Transient Key
(256 bit)
Authenticator constructPairwise Transient Key
(256 bit)
WPA Key distribution and verification4-way handshake
Authenticator
![Page 47: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/47.jpg)
Interactions with networks –Encryption - WPA (8)
Supplicant
GTK + MIC
ACK
Group Transient KeyConstruction
Group Transient Key Deciphering (using KEK)
Group key handshake
AP
![Page 48: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/48.jpg)
Interactions with networks –Encryption - WPA (9)
Pairwise Master Key (256 bit)
ANonce
SNonce
STA MAC Address
AP MAC Address
HASH
Key Confirmation Key
Key Encryption Key
Temporal Key
MIC Rx key
128 bit
128 bit
128 bit
64 bitMIC Tx Key 64 bit
Pairwise Transient Key
WPA Key exchange and verificationPTK Generation
![Page 49: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/49.jpg)
Interactions with networks –Encryption - WPA (10)
Group Master Key (256 bit)
GNonce
Group Key Expansion
AP MAC AddressH
ASH Group Transient Key
WPA Key exchange and verificationGTK Construction
![Page 50: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/50.jpg)
Interactions with networks –Encryption - WPA (11)
MAC Header IV/Key ID Extended IV Data (PDU) MIC ICV FCS
4 4 8 4 4>= 1
TKIP Frame
bytes
Encrypted
MAC Header CCMP Header Data (PDU) MIC FCS
8 8 4>= 1
CCMP Frame
bytes
Encrypted
Data Encryption and Integrity
![Page 51: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/51.jpg)
Interactions with networks
APSTA Probe request / response
Association request / response
Authentication
Data
![Page 52: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/52.jpg)
Interactions with networks – Authentication -Open
APSTA Authenticationrequest
AP authenticate The client
![Page 53: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/53.jpg)
Interactions with networks – Authentication -Shared
APSTA Authenticationrequest
Encrypt Challenge Textthen send it to AP
ChallengeText
Decrypt and if correct,Authenticate client
![Page 54: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/54.jpg)
Capture file analysis
Hotspot / Open network
WEP network (Shared authentication)
WPA network
![Page 55: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/55.jpg)
OSdep
Similar to LORCON
OS supported: Linux, *BSD, Windows
Automatic recognition of the interface / driver
Sniffing capabilities
![Page 56: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/56.jpg)
OSdep (2)
Control interfaces Get and set MAC address Get and set Channel Get and set rate
Networking
Create your own DLL to interact with special drivers on windows
![Page 57: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/57.jpg)
OSdep - Applications
Existing tools: Aircrack-ng 1.0 MDK3
Sample application:www.aircrack-ng.org/wifiping.tar.gz
![Page 58: WLAN Security and Analysis - storage.aircrack-ng.orgstorage.aircrack-ng.org/talks/sharkfest08/WLAN_security_and_analysis.pdf · WLAN Security and Analysis April 1, 2008 Thomas d Otreppe](https://reader035.vdocuments.mx/reader035/viewer/2022070704/5e832494ed37a23077386085/html5/thumbnails/58.jpg)
Questions?