Wifi Wireless Encryption Unencrypted WEP WPA-2 Threat Model- - - PowerPoint PPT Presentation

wifi wireless encryption
SMART_READER_LITE
LIVE PREVIEW

Wifi Wireless Encryption Unencrypted WEP WPA-2 Threat Model- - - PowerPoint PPT Presentation

Wifi Wireless Encryption Unencrypted WEP WPA-2 Threat Model- Unencrypted Threat Model- Unencrypted SSID Hiding SSID - network name LoboGuest eduroam Default broadcast SSID SSID hiding do not broadcast SSID


slide-1
SLIDE 1

Wifi

slide-2
SLIDE 2

Wireless Encryption

  • Unencrypted
  • WEP
  • WPA-2
slide-3
SLIDE 3

Threat Model- Unencrypted

slide-4
SLIDE 4

Threat Model- Unencrypted

slide-5
SLIDE 5

SSID Hiding

  • SSID - network name
  • LoboGuest
  • eduroam
  • Default — broadcast SSID
  • SSID hiding — do not broadcast SSID
slide-6
SLIDE 6

MAC Filtering

  • MAC address- uniquely identifies a device on a

network

  • Blacklist MACs
  • Whitelist MACs
slide-7
SLIDE 7

RC4

  • Stream Cipher
slide-8
SLIDE 8

WEP

  • 40 bit key
  • 24 bit initialization vector
slide-9
SLIDE 9

WEP Packet

IV Key ID Payload Checksum RC4 Encrypted http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

slide-10
SLIDE 10

WEP: Passive Attack

  • IP traffic is predictable/redundant
  • Look for packets with the same IV
  • Two packets P1 and P2 with same IV C1 = P1 xor RC4(k||IV)
  • C1 = P1 xor RC4(k||IV)
  • C2 = P2 xor RC4(k||IV)
  • C1 xor C2 = P1 xor P2
  • Use stats or known plaintext to find P1, P2
slide-11
SLIDE 11

Implementation bug or design flaw?

  • What if random IVs were used?
  • IV space – 224 possibilities
  • Collision after 4000 packets
  • Rough estimate: a busy AP sends 1000 packets/sec
  • Collision every 4s!
  • Even with counting IV (best case), rollover every few

hours

slide-12
SLIDE 12

WEP: Table Attack

  • Small number of IVs
  • Figure out plain text for one packet.
  • Compute the RC4 key stream: RC4(k||IV)
  • Do this for all IVs (15GB storage)
  • Decrypt ALL the packets.
slide-13
SLIDE 13

WPA-2

https://www.krackattacks.com/

slide-14
SLIDE 14

WPA2: handshake frame

slide-15
SLIDE 15

WPA2: handshake

slide-16
SLIDE 16

KRACK attack

  • KRACK: Key reinstallation attack
  • Man-in-the middle between supplicant and

authenticator

  • Replay old third message in handshake (rather

than relay the third message)

  • Also resets packet counters: attacker can now

replay packets

slide-17
SLIDE 17

KRACK attack

slide-18
SLIDE 18

Key takeaway

  • KRACK causes nonce reuse
  • Nonce reuse causes pain (relay of packets,

decryption of packets, perhaps even forgery of packets)