Title: Wireless Network Vulnerabilities
1Wireless Intrusion Vulnerabilities
SA Timothy Allen, Dallas FO
2Wireless Access Point (WAP)
Available at any office supply store for under
100. Legitimate uses when businesses/homeowners
dont want to pay for installing cable.
Convenient because there are no wires. Range is
hundreds or thousands of feet, depending on
environ- mental and external factors.
Think of it as just a wireless extension cord for
computer network cables. EXCEPT, that since it
is wireless, the data travelling between points
is not kept in the wire, but can be caught in
the air.
3Location of a Wireless Access Point
4Wireless Network Vulnerabilities
- Scenarios
- Physical Protection
- Terrorism
- Critical Infrastructure Protection
- Espionage
- Blackmail
- Required Equipment
- Hardware
- Software
- Internet Resources
- Practical Applications
- Proactive Response
5Hotels
Scenario Either a WAP is placed on a hotel
network or an existing WAP is utilized. Alarms,
elevators, cameras, etc., can now be controlled
by an unauthorized entity from anywhere within
range of the WAP(s). Would you let someone from
off the street sit at a workstation connected to
the hotel network? This is essentially that
same thing.
6Hospitals
- Scenario
- Unauthorized entity sniffs network traffic and
is able to glean patient data. - More worrisome is the potential for someone to
intrude on the network and change medications or
medical data.
7Espionage
- Scenario
- Individual(s) sniff data from wireless traffic
and are able to get proprietary data. - Corporate offices or T-Mobile Hotspots (ie
Starbucks airports) are places to sniff.
8Blackmail
- Scenario
- Within range of a residential users WAP that is
using a home network, the blackmailer logs onto
an HTTP based email provider and emails an
attachment containing child pornography. Next,
the blackmailer places child pornography on the
targets computer. The IP address is traced to
the target and a search conducted on the now
seized computers.
9Critical Infrastructure Protection
- Banks
- Emergency Response
- Hospitals
- Telecom industry
- Energy facilities
- Businesses
- Airports
- Cafes
10Best Buy
11Terrorism
- Free wireless networks
- Covert Communication Systems
12Required Hardware
- A PDA or notebook computer
- 500
13Required Equipment
- Wireless 802.11b card - 99 (any office supply
store)
14Required Equipment
- Omni directional Antennae 50 in parts
15Required Equipment
- Directional Antennae 8 in parts
16Required Equipment
- WAP
- (Wireless Access Point)
- 100
17Optional Equipment
18Required Software (MS Windows)
19Required Software (MS Windows)
20Required Software (MS Windows)
21Optional Software (MS Windows)
22Required Software (MS Windows)
23Microsoft XP
- Microsoft XP is configured by default to attach
to the closest wireless network! - Insert the PCMCIA wireless card and default
drivers will automatically install. If you are
near a WAP that is attached to the internet, MSN
messenger will automatically attempt to log in.
24TOTAL COST
- 600 for a mobile hacking package
25Internet Resources
26Internet Resources
27Internet Resources
28Internet Resources
29Internet Resources
30Practical Applications
Small business/residential network
31Practical Applications
Governmental/business network
32Practical Applications
Potentially misconfigured governmental/business
network
33Practical Applications
34Practical Applications - Eavesdropping
Locate WAPS using NetStumbler
35Practical Applications - Eavesdropping
36Practical Applications - Eavesdropping
- DHCP Request
- (computer logging
- on to network)
37Practical Applications - Eavesdropping
NetStumbler Packet
38Practical Applications - Eavesdropping
Transferring a file over network using MS
Networking
39Practical Applications - Eavesdropping
Deleting a file over network using MS Networking
40Practical Applications - Eavesdropping
Logging on to a news server retrieving post
41Practical Applications - Eavesdropping
Checking POP mail via HTTP interface
42Practical Applications - Eavesdropping
Username Password captured in plain text. MS
Outlook used, but is the same for Netscape
Messenger and most other popular email programs.
43Practical Applications - Eavesdropping
Complete email captured from MS Outlook, but
could just as well be Netscape. This email also
had an attachment that can be read.
44Practical Applications - Eavesdropping
Attachments email are easily captured and read.
45Practical Applications
46Practical Applications - Intrusion
Having previously found a access point and the
SSID from using Netstumbler and captured a
username and password using Ethereal, all you
have to do is get in range, change your SSID to
match theirs, and log in using the username and
password. You now have access to whatever the
owner of that username has access to.
OR. Install
an access point on a network. Using a stolen
username and password, get in range and log on.
47Proactive Response
427 wireless networks were found in the North
Texas area surrounding the Dallas Field Office.
Most of the wireless networks belonged to
businesses, since they were found within areas
close to major thoroughfares and not in
residential areas. 93 Wireless networks had
default installations. Of those 427, only 112
were using encryption. It is unknown how many of
those 112 were using the default encryption keys,
which are published on the Internet. The
802.11b encryption is flawed. Even if encryption
is enabled, it is still vulnerable. Think of it
as instead of the door being open, its just
closed, but not locked.
48Proactive Response
- How is this problem fixed? Education
- Update software, firmware, and hardware
- Disable SSID broadcasting
- Use encryption and/or MAC authentication (easily
spoofed or broken) - Use Virtual Private Networking (VPN)
- Place antennaes away from windows and in the
center of the building - Routinely scan offices/businesses for
unauthorized Wireless Access Points - Routinely change WEP keys
- Do not use 802.11b wireless equipment. Wait for
next generation hardware
49The END
- Timothy Allen
- Special Agent
- Dallas Field Office
- United States Secret Service
- 972-868-3119
- tallen_at_usss.treas.gov