Title: Sniffing Wireless Network
1Sniffing Wireless Network Cracking WEP
EECS 495/395 Network Penetration and Security
2Overview
- Sniffing
- Passive scanning
- Demo airodump
- Cracking
- What is WEP
- How to
- Demo aircrack
3Team
- Members
- Zhaosheng Zhu
- Jiazhen Chen
- Kai Chen
- Ying He
4Passive Scanning
- Passive
- Attacker passively listening to each channel for
a few frames without actively participating in
any communications. - RF monitor mode
- Can capture all wireless traffic without
associating with an AP.
5RF monitor mode
- Monitor Mode is the main mode to show on PC
screen the current receiver status information of
up to 16 channels - receiving channel
- Frequency
- For a wireless card to work with a wireless
network analyzer, the card must have the ability
to enter RF monitor mode. Without RF monitor
mode, you cannot capture all wireless traffic.
6Sniffing
7Wireless network model
- We assume that
- Wireless routers wan interface connects to a
DSL/Cable Modem - A user computer connects to router through
wireless connection which is protected by WEP - Attacker doesnt know the WEP password and even
the SSID and Channel.
8Demo Airodump
1.Select adapter 2.Choose interface 3.Choose
channel Channel 0 means all 4.Name the output
file. 5.Select Content that is
captured ------------------------------
Airodump supports limited kind of wireless
adapters including Atheros Aironet, Realteak,
PrismGT and Intel 3956.
9Cracking WEP
- The goal is to discover the WEP shared-secret
key. - We assume that attacker was unsuccessful in
obtaining the WEP shared-secret key from Social
Engineering.
10WEP
- WEP is part of the IEEE 802.11 standard ratified
in September 1999. - WEP uses the stream cipher RC4 for
confidentiality and the CRC-32 checksum for
integrity. - Basic WEP Encryption RC4 Key-stream XOR with
Plaintext - 64-bit WEP
- uses a 40 bit key, which is concatenated with a
24-bit initialization vector (IV) to form the RC4
traffic key. - 128-bit WEP
- Entered by users as a string of 26 Hexadecimal
(Hex) characters Each character represents 4 bits
of the key. 4 26 104 bits adding the 24-bit
IV brings us what we call a "128-bit WEP key".
11WEP
- IV is an Initialization Vector of 24 bits
- RC4 generates a stream of bits (a keystream)
which, for encryption, is combined with the
plaintext using XOR decryption is performed the
same way.
12How to Crack
- Step1
- The attacker sniffs a large number of frames from
a single BSS (Basic Service Set). These frames
use the same key. - Step2
- Given a sufficient number of mathematically weak
frames, on an average PC, this computation of key
may take a few seconds to hours.
13Demo Aircrack
- 1.
- Load .cap which
- contain packets we
- captured
14Demo Aircrack
- 2. Set key size and key index.
15Demo Aircrack
3. Enter index for the network you want to crack.
16Demo Aircrack
4. Because I collect 5 million packets before
cracking it takes only 4 seconds to find the key.
17References
- Matthew S. Gast, 802.11 Wireless Networks The
Definitive Guide, 464 pages, OReilly
Associates, April 2002, ISBN 0596001835. - Vikram Gupta, Srikanth Krishnamurthy, and
Michalis Faloutsos, Denial of Service Attacks at
the MAC Layer in Wireless Ad Hoc Networks,
Proceedings of 2002 MILCOM Conference, Anaheim,
CA, October 2002. - Prabhaker Mateti, TCP/IP Suite, The Internet
Encyclopedia, Hossein Bidgoli (Editor), John
Wiley 2003, ISBN 0471222011. - Robert Moskowitz, Debunking the Myth of SSID
Hiding, Retrieved on March 10, 2004.
http//www.icsalabs.com/html/communities/WLAN/wp_s
sid_hiding. pdf. - Bruce Potter and Bob Fleck, 802.11 Security,
O'Reilly Associates, 2002 ISBN 0-596-00290-4.
- William Stallings, Wireless Communications
Networks, Prentice Hall, 2001, ISBN 0130408646. - Joshua Wright, Detecting Wireless LAN MAC
Address Spoofing, Retrieved on Jan 20, 2004.
http//home.jwu.edu/jwright/ - Hacking Techniques in Wireless Networks,
Prabhaker Mateti, http//www.cs.wright.edu/pmatet
i/InternetSecurity/Lectures/WirelessHacks/Mateti-W
irelessHacks.htm_Toc77524695