Introduction Fragmentation Attack Implementation Conclusion 1/19
The Final Nail in WEP’s Coffin
Andrea Bittau1 Mark Handley1 Joshua Lackey2 May 24, 2006
1University College London. 2Microsoft.
The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua - - PowerPoint PPT Presentation
Introduction Fragmentation Attack Implementation Conclusion 1/19 The Final Nail in WEPs Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy Introduction
Introduction Fragmentation Attack Implementation Conclusion 1/19
1University College London. 2Microsoft.
Introduction Fragmentation Attack Implementation Conclusion 2/19
Introduction Fragmentation Attack Implementation Conclusion 3/19
Introduction Fragmentation Attack Implementation Conclusion 4/19
1 Transmitting arbitrary data after eavesdropping a single data
2 Real-time decryption given that network is connected to
Introduction Fragmentation Attack Implementation Conclusion 5/19
Introduction Fragmentation Attack Implementation Conclusion 6/19
Introduction Fragmentation Attack Implementation Conclusion 7/19
Introduction Fragmentation Attack Implementation Conclusion 7/19
Introduction Fragmentation Attack Implementation Conclusion 7/19
Introduction Fragmentation Attack Implementation Conclusion 8/19
1 Recover a keystream. 2 Reuse the keystream to send arbitrary data.
Introduction Fragmentation Attack Implementation Conclusion 9/19
Introduction Fragmentation Attack Implementation Conclusion 9/19
Introduction Fragmentation Attack Implementation Conclusion 10/19
Introduction Fragmentation Attack Implementation Conclusion 10/19
Introduction Fragmentation Attack Implementation Conclusion 10/19
Introduction Fragmentation Attack Implementation Conclusion 10/19
Introduction Fragmentation Attack Implementation Conclusion 10/19
Introduction Fragmentation Attack Implementation Conclusion 11/19
Introduction Fragmentation Attack Implementation Conclusion 11/19
Introduction Fragmentation Attack Implementation Conclusion 11/19
Introduction Fragmentation Attack Implementation Conclusion 11/19
Introduction Fragmentation Attack Implementation Conclusion 11/19
Introduction Fragmentation Attack Implementation Conclusion 12/19
Introduction Fragmentation Attack Implementation Conclusion 13/19
1 Eavesdrop a payload to decrypt. 2 Send two 802.11 fragments: an IP header with our buddy as
3 AP will decrypt and send it in clear-text to our Internet buddy.
Introduction Fragmentation Attack Implementation Conclusion 14/19
1 Eavesdrop a data packet. 2 Cipher-text ⊕ known plain-text = 8 bytes of keystream. 3 Transmit data in multiple 8 byte fragments.
1 Eavesdrop packet to decrypt. 2 Send two 802.11 fragments: 1
2
3 Internet buddy will receive the payload in clear-text.
Introduction Fragmentation Attack Implementation Conclusion 15/19
Introduction Fragmentation Attack Implementation Conclusion 16/19
1 Eavesdrops data packet and uses fragmentation to transmit. 2 Determines the network IP via keystream expansion. 3 Contacts buddy on Internet instructing him to flood the WiFi. 4 Recovers WEP key via weak IV attack (using aircrack).
Introduction Fragmentation Attack Implementation Conclusion 17/19
25 50 75 100 2 4 6 8 10 12 14 16 28 65 93 121 148 176 204 232 Percentage of cracked keys Number of packets (millions) Attack Time (min) 40-bit keys 104-bit keys
Introduction Fragmentation Attack Implementation Conclusion 18/19
Introduction Fragmentation Attack Implementation Conclusion 19/19