WiFi Social Engineering BIO Gabriel Mathenge Security enthusiast - - PowerPoint PPT Presentation

wifi
SMART_READER_LITE
LIVE PREVIEW

WiFi Social Engineering BIO Gabriel Mathenge Security enthusiast - - PowerPoint PPT Presentation

WiFi Social Engineering BIO Gabriel Mathenge Security enthusiast Security consultant at Ernst and Young (EY) Penetration testing and red teaming T: https://twitter.com/_V1VI E: gabriel@thevivi.net QUESTIONS Stop me whenever youre


slide-1
SLIDE 1

WiFi Social Engineering

slide-2
SLIDE 2

BIO

Gabriel Mathenge

  • Security enthusiast
  • Security consultant at Ernst and Young (EY)
  • Penetration testing and red teaming

T: https://twitter.com/_V1VI E: gabriel@thevivi.net

slide-3
SLIDE 3

QUESTIONS

Stop me whenever you’re curious

slide-4
SLIDE 4

WHY WIFI?

Why WiFi?

  • Rapid growth of WiFi networks for commercial

and private use

  • 2015: Kenya’s internet penetration stood at 26

million people – KNBS Economic Survey

slide-5
SLIDE 5

SOCIAL ENGINEERING

Social Engineering

  • Manipulating people into giving you what you want.
slide-6
SLIDE 6

IEEE 802.11

IEEE 802.11

  • IEEE - Institute of Electrical and Electronics

Engineers

  • IEEE 802.11 - A set of specifications for

implementing wireless networks

  • Define the rules of communication between

clients and wireless access points (AP)

slide-7
SLIDE 7

IEEE 802.11

IEEE 802.11

THIS PART HERE

INTERNET

slide-8
SLIDE 8

TOOLS

Tools of the trade

slide-9
SLIDE 9

802.11 ISSUES

Issues

slide-10
SLIDE 10

PROTOCOL-SIDE

WiFi Deauthentication

  • Anyone with the right hardware can send a

deauthentication frame to the AP and clients connected to it

slide-11
SLIDE 11

DEAUTHENTICATION

Deauthentication

Targets Deauthentication packets

slide-12
SLIDE 12

CLIENT-SIDE

Identifying APs

  • Clients can’t differentiate between access points

with the same name (ESSID) and will usually just connect to the strongest one.

slide-13
SLIDE 13

CLIENT-SIDE

No difference

London ESSID: Java WiFi Nairobi ESSID: Java WiFi

slide-14
SLIDE 14

CLIENT-SIDE

Probing for and auto-connecting to APs

  • Ever wondered how your phone/laptop

automatically connects to your office/home network whenever you’re in the area?

slide-15
SLIDE 15

CLIENT-SIDE

WiFi Selection

slide-16
SLIDE 16

CLIENT-SIDE

Anytime your device’s WiFi is on and not connected to an AP

Home WiFi! Office WiFi! Airport WiFi! Girlfriend’s WiFi! Other girlfriend’s WiFi! Neighbor’s WiFi! Coffee shop WiFi!

slide-17
SLIDE 17

WiFi Probes

slide-18
SLIDE 18

CONVENIENCE VS SECURITY

Why is it built this way?

slide-19
SLIDE 19

TRADITIONAL WIFI ATTACKS

slide-20
SLIDE 20

EVIL TWIN

Evil Twin

  • A rogue wireless AP that masquerades as a

legitimate Wi-Fi access point

slide-21
SLIDE 21

EVIL TWIN

How it works

I’m Safaricom, the real AP. No! I’m Safaricom, the real AP. Connect to me!

Deauthentication packets Targets

slide-22
SLIDE 22

MiTM

Man-in-The-Middle

  • Grabbing all of the traffic that passes you over a

wired or wireless network.

slide-23
SLIDE 23

MiTM

How it works

Username Solomon Password Password123 Username Solomon Password Password123 Username Solomon Password Password123

BANK

slide-24
SLIDE 24

WIFIPHISHER

  • A WiFi tool that automates social engineering

attacks on WiFi networks

  • Written in Python and developed by Greek

security researcher, @_sophron (George)

slide-25
SLIDE 25

DEMO

Scenario

Swara WiFi Swara WiFi

Target

slide-26
SLIDE 26

WIFIPHISHER

Phishing scenarios

slide-27
SLIDE 27

WIFIPHISHER

Sample phishing page

slide-28
SLIDE 28

WIFIPHISHER

Sample phishing page

slide-29
SLIDE 29

HARVEST CREDENTIALS

Harvest credentials

slide-30
SLIDE 30

WIFIPHISHER

Taking it further…

slide-31
SLIDE 31

DEMO

Scenario

VIVI WiFi VIVI WiFi

Target

slide-32
SLIDE 32

MALWARE INFECTION

Taking it further – malware infection

slide-33
SLIDE 33

MALWARE INFECTION

Updating is good for you

slide-34
SLIDE 34

MALWARE INFECTION

Updating is good for you

slide-35
SLIDE 35

MALWARE INFECTION

Shell

slide-36
SLIDE 36

WHY WIFI?

Why did I pick WiFi?

  • To make it relatable
  • Some vulnerabilities can’t be fixed by technology
slide-37
SLIDE 37

PPT

The Security Trinity

SECURITY

slide-38
SLIDE 38

THE WEAKEST LINK

Who is the weakest link?

slide-39
SLIDE 39

FOCUS ON SECURITY AWARENESS

How vulnerable is your tech are your people?

  • Security training and awareness programs
  • Fewer tech focused security tests and more

holistic security assessments.

  • Does your organization have a red team?
slide-40
SLIDE 40

SECURITY FAILURE

slide-41
SLIDE 41

STAYING SAFE

Staying safe

  • Be wary with public Wi-Fi.
  • 2 factor authentication.
  • Use strong passwords. Avoid password reuse.
  • Turn off your Wi-Fi when you’re not using it.
  • Update your software, use an antivirus.
  • Awareness, a little paranoia never killed anyone.
slide-42
SLIDE 42

Thanks for your time!