A Proof of MITM Vulnerability in Public WLANs Guarded by Captive - - PowerPoint PPT Presentation
A Proof of MITM Vulnerability in Public WLANs Guarded by Captive - - PowerPoint PPT Presentation
A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal Author: Wei-Lin Chen Po-Kang Chen Quincy Wu Outline Introduction Motivation Related Works Authentication of Public WLAN Implementation &
Outline
Introduction Motivation Related Works Authentication of Public WLAN Implementation & Experiment result Conclusion
2
Introduction
A lot of public areas begin to provide the
Wireless LAN for users, it is called Public WLAN (PWLAN).
PWLANs are usually provided by Wireless
Internet Service Providers (WISPs) which manage the payment mechanism of PWLANs.
3
Introduction
Nowadays it is easy to find PWLAN service in
a coffee shop or a fast food restaurant, people enjoy this convenience to access Internet in these public places.
According the TWNIC (Taiwan Network
Information Center) reports the sample survey on January 2010, the frequency of using the Internet service in public areas which becomes higher.
4
Figure 1. January 2010 Taiwan Internet using frequency report
http://www.twnic.net.tw/download/200307/200307index.shtml
5
Motivtion
6
Motivation
More and more people are utilizing the
PWLANs.
Traditionally, we rely WEP or WPA-PSK to
protect our WLAN.
Readily available tools to crack the WEP or
WPA-PSK secret keys .
7
Motivation
Therefore, most PWLANs now use a new
secure mechanism, called Captive Portal.
It was widely accepted by WISPs.
8
9
Figure 2. Login webpage
Motivation
Motivation
A new standard IEEE 802.1X is proposed to
replace the Captive Portal.
But the 802.1X standard is more complicated
than Captive Portal, so 802.1X is not widely deployed in PWLANs.
We shall show that for PWLANs which are
guarded by Captive Portal will be vulnerable to Man-In-The-Middle attacks, so that unauthenticated users can access Internet via the PWLANs.
10
Related Work
11
ARP (Address Resolution Protocol)
ARP To convert IP address to MAC
address in order to communicate in Ethernet communications
12
13
Broadcast ARP Request message to ask for
the MAC address associated with the destination IP address
The host sends a unicast ARP Reply
message to sender with the IP-MAC address pairing
Update the ARP cache after receiving ARP
Reply
ARP (Address Resolution Protocol)
ARP Spoof
The malicious user sends ARP Reply with
fake IP-MAC pairing, in an attempt to spoof the ARP cache of other hosts on the network.
ARP Spoof can perform Man-In-The-Middle
(MITM) attacks or Denial of Service (DoS) attacks.
14
MITM
Before the network does not occur the MITM
attack, the hosts has correct MAC address for both, they communicates with each other directly.
After the network occur the MITM attack, the
dynamic IP-MAC pairing will be modified in ARP cache for both hosts. The attacker can receive the packet from one side host and forward it to other host.
15
MITM
16
Figure 3. MITM attack
Authentication of Public WLAN
17
18
Figure 4. PWLANs architecture
19
Figure 5. Captive Portal process
Implementation & Experiment result
20
Implementation
21
Figure 6. MITM in Captive Portal (1/2)
22
Figure 7. MITM in Captive Portal (2/2) Victim packets Attacker packets
Implementation
Data TCP/UDP/ICMP IP ETHERNET
TCP/UDP : checksum IP : source IP address & checksum
23
Figure 8. To modify of masquerade packet
Experiment Result
Eee PC 701 (victim) Lenovo X200 (attacker) Remote FTP server CPU Intel Celeron M processor 900MHz Intel Core2 Duo CPU P8600 2.40GHz Intel Pentium Dual CPU E2200 2.20GHz Memory 512MB 4GB 2GB Operating System Windows XP 32-bit Windows 7 32- bit Ubuntu 9.10 TCP buffer size (bytes) 65,535 65,535 65,535
24
Table 1. Implementation spec.
25
Figure 9. Implementation environment
26
Figure 11. Download 20MB files Figure 10. Download 10MB files
Experiment & Result
File size Average Download Speed (Kbps) Performance without relay with relay 10MB 241.55 234.06 97% 20MB 243.34 235.72 97%
27
Table 2. Experiment result
Conclusion
28
Conclusion
We knew how ARP Spoof can be used to
launch MTIM attack in PWLANs, the unauthenticated users can access Internet via the PWLANs.
We advise the WISPs can deploy the network
devices that support the intrusion detection feature, or re-design the PWLANs architecture and authenticate users by 802.1X.
29
30