Top Banner
Latest Wireless Vulnerabilities & Wireless Incident Response Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI Friday, November 11, 2011
51

Latest Wireless Vulnerabilities & Wireless Incident Response

Feb 03, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Latest Wireless Vulnerabilities & Wireless Incident Response

Latest Wireless Vulnerabilities & Wireless Incident Response

Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI

Friday, November 11, 2011

Page 2: Latest Wireless Vulnerabilities & Wireless Incident Response

Get Ready for the Wireless World!

Page 3: Latest Wireless Vulnerabilities & Wireless Incident Response

3

Wireless Network Risks

(What do I need to look for?)

Page 4: Latest Wireless Vulnerabilities & Wireless Incident Response

Server

Users

Traditional Wired Network

Well-Defined

Network Edge,

Straightforward

to Manage and

Secure

INTERNET

SECURE INTERNAL NETWORK

Page 5: Latest Wireless Vulnerabilities & Wireless Incident Response

Wireless Security Concerns

Network Edge

Blurred, New

Attack Vectors

‘Behind’ the

Firewall

Hacker

INTRANET

Desktop

1 Rogue AP Connected

to Network

Network Breach

4 Non-Compliant AP

Network Breach/Data Leakage/

Data Compromise

5 Users Bypassing Network

Security Controls

Data Leakage/Network Backdoor

Muni Wi-Fi or Neighbors

3 Leaked Wired Traffic

& Insertion

Data Leakage

2 Hotspot Phishing

Data Leakage

Hotspot Evil Twin

Laptop

AP

Mobile User

Server

INTERNET

Page 6: Latest Wireless Vulnerabilities & Wireless Incident Response

Reconnaissance - Wired-Side Leakage

Broadcast and Multicast Traffic leaking from the Wired

Network into the local air space:

• - HSRP

• - IGMP

• - IGRP

• - OSPF

• - VRRP

• - IPX

• - STP

• - AND NetBIOS!!!

AP

Page 7: Latest Wireless Vulnerabilities & Wireless Incident Response

Reconnaissance - Wired-Side Leakage

Wired Side Leakage (Router Broadcast Traffic)

Password for H/A on Core Router! Note that this is leaking from the wired network into the wireless airspace, unencrypted, even though the AP is using encryption for wireless users…

Page 8: Latest Wireless Vulnerabilities & Wireless Incident Response

Common Infrastructure Vulnerabilities

Cisco WPA Migration Mode Vulnerability – BlackHat 2010

Page 9: Latest Wireless Vulnerabilities & Wireless Incident Response

<>

Page 10: Latest Wireless Vulnerabilities & Wireless Incident Response

Summary of 802.11 Vulnerabilities

Type Attacks Tools

Reconnaissance

Rogue APs

Open/Misconfigured APs

Ad Hoc stations

Netstumbler, Kismet,

Wellenrighter

Sniffing

WEP, WPA, LEAP cracking

Dictionary attacks

WPA Migration Mode (Cisco)

AirSnort, Cowpatty,

Wireshark, Cain,

Ettercap, aircrack-ng

Masquerade &

Hijack

MAC spoofing

MiFi or cellphone hotspot

Evil Twin/Wi-Phishing attacks

AirSnarf, Hotspotter,

HostAP, SMAC,

Firesheep

Insertion

Multicast/Broadcast injection

Routing cache poisoning

Man in the Middle attack

Airpwn, WepWedgie,

ChopChop, Vippr,

irpass

Denial-of-Service

Disassociation

Duration field spoofing

RF jamming

AirJack, void11,

Bugtraq, IKE-crack

Page 11: Latest Wireless Vulnerabilities & Wireless Incident Response

Common Infrastructure Vulnerabilities

Type Comments State

WEP Attack Vulnerable for many years,

including Cisco Migration Mode Easily Cracked

WPA-PSK Attack Can be vulnerable to

dictionary attack

Can be attacked,

especially 8 char

PSKs

TKIP 2009/2010 attack

demonstrations Targeted in POC

Many people have fortified their sensitive wireless infrastructures by migrating away from insecure Open or WEP configurations

End-users have now become the low-hanging fruit!!!

Page 12: Latest Wireless Vulnerabilities & Wireless Incident Response

End-users have now become the low hanging fruit

Hotel

• Am I connected to an insecure access point?

Airport

• Am I connected to another passenger in ad-hoc mode?

Coffee Shop

• Am I connected to a real hotspot connection?

Home

• Is my laptop probing for SSIDs not on the safe list?

Office

• Do I have wired & wireless on at the same time?

Page 13: Latest Wireless Vulnerabilities & Wireless Incident Response

Wireless Phishing – Old School Method

Tools such as Karma can Respond to ANY Client Probe Request

Variety of Services (POP, FTP and HTTP) to Lure Unsuspecting Users

No Authentication of “Pervasive Wireless Cloud”

Automatic Network Selection in Windows (Zero Configuration Client)

1 Hotspot Phishing

Data Leakage

Hotspot Evil Twin

Mobile Users

Page 14: Latest Wireless Vulnerabilities & Wireless Incident Response

Malicious Associations

3 Naïve user Associates with Fake AP

2 AP responds with Probe Response

Laptop sends Probe Request 1

AP provides IP address to User 4

Scan laptop for vulnerabilities

& compromise it

5

Use station as a launch pad 6

Intruder

Laptop

(Soft AP)

User

Station

Co

rpo

rate

Netw

ork

Page 15: Latest Wireless Vulnerabilities & Wireless Incident Response

Hotspot Phishing, Evil Twin, SoftAP, etc.

New School Method - Direct attacks on Wireless Clients

using Cellphone

Palm Pre with Hacked Mobile Hotspot

2 New School Hotspot Phishing

Data Leakage

Corporate

Hotspot Evil Twin

Mobile User

X

Attack vector on any wifi enabled cell phone…

Got a WiFi iPad, iPod, Mac?

Page 16: Latest Wireless Vulnerabilities & Wireless Incident Response

Malicious Associations - Cell Phone hotspot

3 Naïve user Associates with Fake AP

2 “Fake” Pre-AP responds w/ Probe Response

Laptop sends Probe Request 1

AP provides IP address to User 4

Scan laptop for vulnerabilities

& compromise it

5

Use station as a launch pad 6

Intruder

Laptop

User

Station

Co

rpo

rate

Netw

ork

Page 17: Latest Wireless Vulnerabilities & Wireless Incident Response

Guest Access – Targeting Guest Users

Internet

Captive portal doesn’t allow “access”

until authenticated via the portal

But it does allow access to the local

wireless network, and provides an IP…

What can I do with access to the local

network?

Unless PSPF or client isolation is enabled,

hacker can scan and target other users of

the wireless network

Exploit their laptop and steal credentials for other

wireless networks (metasploit anyone?)

Validate if portal ACL rules are properly prohibiting

access

Virtually every captive portal we tested was only

controlling HTTP/HTTPS access to the Internet and

internal networks

We could ping, ssh, telnet, ftp, etc. without EVER

authenticating to the portal!!!

Intruder

Laptop

• Intruder doesn’t

authenticate to

captive portal

• Targets users on

same AP

• Perhaps some of

those Guest users

are actual

employees???

Page 18: Latest Wireless Vulnerabilities & Wireless Incident Response

Captive Portal Bypass

Captive Portals

We later determined that the attackers got to the corporate network through a unauthorized wired bridge installed by an a consulting firm

This secondary local subnet was discovered by listening to wireless traffic for the entire airspace, and identifying IPs for the corporate network

They then attempted to access the network through the captive portal, and were successful.

And this DIDN’T require any authentication to the captive portal! They already had access to the local network!!!

CAPTIVE PORTALS COMMONLY ALLOW THE PORTAL TO BE BYPASSED!!!

Internet

Intruder

Laptop

• Hub was connected

to Guest wireless

switch

• Bridge to corporate

network

• Installed by

consulting firm

onsite, in a non-IT

closet

Page 19: Latest Wireless Vulnerabilities & Wireless Incident Response

19

Some of the other attack vectors

that we’re seeing lately…

Page 20: Latest Wireless Vulnerabilities & Wireless Incident Response

Windows 7 Virtual WiFi

Windows 7 – A whole new possibility of Rogue AP threats

Windows 7 (all version) provide Virtual Wifi with the operating the system, essentially allowing any desktop user to setup a Virtual Wireless Access Point!!!

Note that this is not an adhoc network, but an actually virtual access point that behaves, lives, and breathes like an actual Access Point!

Page 21: Latest Wireless Vulnerabilities & Wireless Incident Response

Windows 7 Virtual WiFi

How?

• Setup at the DOS Prompt

• Share either a Wired or Wireless

connection

• The user can share their own

desktop (like an ad-hoc network)

• And the user can share their

network connection with others

• Wireless network may use

authentication and encryption, BUT

the user can share that connection

with others, allowing those users to

connect to the corporate network

with weaker authentication &

encryption

• Note: This is native to the operating

system! In all versions of Windows

7 (Starter through Ultimate)

Page 22: Latest Wireless Vulnerabilities & Wireless Incident Response

Windows 7 Virtual Wifi

INTERNET

Windows 7 Virtual WiFi – Rogue AP on Wired Network

Users

Hacker in

Parking Lot Contractor or Friend

Passerby

Sanctioned

Access Point

Windows 7 Virtual WiFi

Rogue AP on Wire

Page 23: Latest Wireless Vulnerabilities & Wireless Incident Response

Windows 7 Virtual Wifi

Windows 7 Virtual WiFi – Rogue AP on Wireless Network

INTERNET

Users

Hacker in

Parking Lot Contractor or Friend

Passerby

Sanctioned

Access Point

Windows 7 Virtual WiFi

Rogue AP on Wireless

(Wireless Bridge)

Page 24: Latest Wireless Vulnerabilities & Wireless Incident Response

Win7 - Comparing packets from Access

Points versus Wireless Clients

2 Win7 responds with Probe Response

Laptop sends Probe Request 1

Win7 provides IP address to User 3

Intruder on Network 4 Intruder

Laptop

User

Station

Co

rpo

rate

Netw

ork

Your Windows 7 Laptop is now a Rogue AP on your network

How many Windows 7 laptops are in your network???

Page 25: Latest Wireless Vulnerabilities & Wireless Incident Response

Wireless Layer 2 – Use are previous

approach to detect Win7 Virtual WiFi

Page 26: Latest Wireless Vulnerabilities & Wireless Incident Response

Win7 - Comparing packets from Access

Points versus Wireless Clients

2 Win7 responds with Probe Response

Laptop sends Probe Request 1

Win7 provides IP address to User 3

Intruder on Network 4 Intruder

Laptop

User

Station

Co

rpo

rate

Netw

ork

WHY IS DEVICE ACTING LIKE BOTH AN AP AND A CLIENT???

Single device sending probe requests AND probe responses

Win7 Probe

Responses

Page 27: Latest Wireless Vulnerabilities & Wireless Incident Response

Virtual WiFi for Windows XP too! (since 2005)

Page 28: Latest Wireless Vulnerabilities & Wireless Incident Response

Intrusion Detection & Forensic Analysis

Layer 1

• RF Jamming

• Bluetooth

• Malicious Interference

Layer 2

• Impersonation Attacks

• Active Attacks

• DoS

• Rogue Activity

• Anomalous Behavior

• Extrusions

• Performance

• List does on and on…

Layer 3 and above

• Impersonation Attacks

• Active Attacks

• DoS

• Rogue Activity

• Anomalous Behavior

• Performance

• Possibilities are

endless…

Wireless attacks

Page 29: Latest Wireless Vulnerabilities & Wireless Incident Response

Incident Response – Old School of thought

Network Edge

Blurred, New

Attack Vectors

‘Behind’ the

Firewall

Hacker

INTRANET

Desktop

Muni Wi-Fi or Neighbors

Hotspot Evil Twin

Laptop

AP

Server

INTERNET

If I’m only looking

At my firewall, access

Point, and servers,

What have I missed???

ALMOST

EVERYTHING!!!

Page 30: Latest Wireless Vulnerabilities & Wireless Incident Response

30

Wireless Incident Response

and Forensics Requires

Wireless Analysis!!!

Let’s begin with Live Analysis…

Page 31: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 1 – Spectrum Analysis

Android WiFi Analyzer App

- Nice (and free) WiFi Analyzer

- Handy for walking around watching the signal strength get stronger as you get closer to the suspect AP

- Limited to 802.11b/g (no 802.11a)

Page 32: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 2 - Wireless Analyzer

Wireless Analyzer

Netstumbler/Kismet – Great (and free) tools BUT:

- Are you scanning 802.11a and 802.11n also?

If you’re built-in card only supports 802.11b/g, then you’re missing 802.11a devices!!!

(>50% of the PCI QSA reports we’ve seen, do not include any 802.11a analysis, that’s means they’ve missed half of the potential wireless devices, therefore Rogues may still exist in your environment)

Make sure your analysis is COMPREHENSIVE!!! USE A DUAL-BAND CARD

Otherwise you may be missing half the picture!

Page 33: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 2 - Wireless Sniffing

Wireshark

Wireless Sniffing on Windows usually requires a licensed product

- note that we’re sniffing Layer 2 WiFi packets, not Layer 3 as if you were already connected to the AP and have an IP address…

Use your laptop with BackTrack and a compatible wireless card and you can perform wireless sniffing for free!

- New Link: http://www.backtrack-linux.org

- Some 802.11a/b/g Card Options:

- Ubiquiti (can have external antennas)

- NetGear WAG511

What about 802.11n? Remember that 802.11n APs operate in both the 2.4GHz and 5GHz spectrums and are typically visible in either spectrum and backward compatibility, so you’re probably good!

Page 34: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 2 - Wireless Sniffing

Sniffing with BackTrack

1. Enable monitor mode for wireless card to allow packet capture

# airmon-ng start wifi0

Page 35: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 2 - Wireless Sniffing

Sniffing with BackTrack

2. Run airodump with the following options:

# airodump-ng -c <channel> --bssid <MAC of AP> ath1 -w <target capture file>

Page 36: Latest Wireless Vulnerabilities & Wireless Incident Response

Comparing packets from Access Points

versus Wireless Clients

3 Naïve user Associates with Fake AP

2 Pre fake AP responds with Probe Response

Laptop sends Probe Request 1

AP provides IP address to User 4

Scan laptop for vulnerabilities

& compromise it

5

Use station as a launch pad 6

Intruder

Laptop

User

Station

Co

rpo

rate

Ne

two

rk

Why is a Palm Pre sending Beacons & probe responses???

Page 37: Latest Wireless Vulnerabilities & Wireless Incident Response

Wireless Layer 2 – Suspicious Activity Hotspot Phishing, Evil Twin, SoftAP attacks

Page 38: Latest Wireless Vulnerabilities & Wireless Incident Response

Know your perpetrator

Hidden Identity

• An experience hacker will most likely change his MAC address

• Many times these modified MACs standout as anomalies

-55:44:33:22:11:00 – common

-8F:21:47:AB:55:70 – unknown OUI, suspicious

- Organizationally Unique Identifier (OUI) – 1st Three Octets

-Duplicate MACs, two different devices, different RSSI values

- Received Signal Strength Indication

• Lookout for strange MAC addresses, wireshark mappings to OUIs can easily help you identify these oddities

Page 39: Latest Wireless Vulnerabilities & Wireless Incident Response

Layer 3 Evidence – Rogue Wireless Client IP Spoofing and MITM Attacks

Where might evidence of the breach reside?

Valid wireless client Valid wired host

Rogue wireless client spoofs IP

Page 40: Latest Wireless Vulnerabilities & Wireless Incident Response

Bluetooth Hacks picking up steam (again)

Bluetooth Hacks

“PIN pads replaced at “a fast food chain” to steal payment card details

More payment cards have been skimmed (financial details hijacked) as a result of PIN pads being replaced. This time the breach occurred at “a fast food chain” in a busy part of Edmonton, Canada. A "Bluetooth" device was used in the phony PIN pads to transmit all the card details, using a wireless connection.

The fraud was discovered when a large number of Edmonton cards started showing up with unusual activity in Montreal.”

Edmonton Police, March 18, 2007

Page 41: Latest Wireless Vulnerabilities & Wireless Incident Response

Bluetooth

Bluetooth Specs

All Bluetooth devices operate at the 2.4 GHz band

Bluetooth defines 79 channels for communication on the 2.4 GHz band each channel being separated by 1 MHz

The frequency range 2.402 GHz - 2.480 GHz

Allows for 1600 frequency hops per second

Class

Maximum Permitted Power Range

(approximate

) mW dBm

Class 1 100 20 ~100 meters

Class 2 2.5 4 ~10 meters

Class 3 1 0 ~1 meters

Page 42: Latest Wireless Vulnerabilities & Wireless Incident Response

Bluetooth Intrusion Detection Kit

Bluetooth USB Class 2 Dongle & Backtrack

• Intrusion detection kit

• Also a Hacker kit for targeting cell phones…

Page 43: Latest Wireless Vulnerabilities & Wireless Incident Response

Bluetooth Detection Kit

Identifying the services on the bluetooth device

Backtrack:

• hcitool – identify devices

• sdptool – identify services on device

Using this approach we can identify Bluetooth devices within 10 meters, and distinguish the radio types

Bottomline, we’re looking for anomalies (strange bluetooth radios that might be imbedded in a POS system)

Page 44: Latest Wireless Vulnerabilities & Wireless Incident Response

Incident Response & Forensic Analysis

Historical

• Device logs/syslog

• Firewall logs (wireless

switches, Access

Points, Wired Firewall)

• Wireless IDS alarms,

events, logs

• Wired IDS alarms,

events, logs

• Remnants on wireless

clients (registry, saved

wireless networks, etc.)

Live

• Wired Sniffing

• Wireless Sniffing

• Spectrum Analysis

• Bluetooth

• RF Analysis, Heat

Maps/Location Tracking

• Live analysis on IPS,

WIPS, Firewalls, etc.

• Roaming behavior (from

AP to AP, or client to

client attacks)

• Others…

Sources for analyzing wireless attacks

Page 45: Latest Wireless Vulnerabilities & Wireless Incident Response

CISCO

Page 46: Latest Wireless Vulnerabilities & Wireless Incident Response

ARUBA

Page 47: Latest Wireless Vulnerabilities & Wireless Incident Response

MOTOROLA (AIRDEFENSE)

Track Sequence of

Attack

Remote packet

capture

Attack

Visuals

Page 48: Latest Wireless Vulnerabilities & Wireless Incident Response

Final words…

Recommendations

Live Analysis

• Great, but you’re probably conducting it post-breach

• still helpful if suspicious devices are still present

Wired Firewall, Access Points, Wireless Switches, and Servers may provide very limited visibility into wireless attacks

• Probably NO visibility into wireless client attacks

Windows SMS policies can possibly be used to disable Win7 Virtual WiFi

• note that other operating systems are working on this feature as well…

• Currently available on Windows Server 2008, Windows 7, and drivers for Windows XP available from the Microsoft Research website

Page 49: Latest Wireless Vulnerabilities & Wireless Incident Response

Final words…

Recommendations

Mobile Devices

• Mobile devices such as wifi-enabled phones, iPads, etc. are just as susceptible to wireless sniffing and wireless attacks, especially in insecure deployments.

• Products exist for enforcing policies on mobile phones

• The aforementioned wireless vendors provide protection for end-users (Aruba Amigopod, Motorola AirDefense client isolation, Cisco PSPF)

Wireless Intrusion Detection & Prevention can provide 24/7 monitoring

• Historical audit trails and forensic analysis of the steps leading up to a breach

• Mitigation & prevention of many of the aforementioned attacks

• Whether you have wireless or not, this is a must-have for a critical network

• “We’re a no wireless zone” – Are you sure???

Page 50: Latest Wireless Vulnerabilities & Wireless Incident Response

Additional reading materials

Sites

The Greatest Hacking Breach in Cyber History

http://hakin9.org/magazine/1528-email-security

Joshua Wright

http://www.willhackforsushi.com/

Project Ubertooth (Bluetooth advanced detection techniques)

http://ubertooth.sourceforge.net/

My Security Website

http://www.spyhunter.org or http://www.spy-hunter.com

Page 51: Latest Wireless Vulnerabilities & Wireless Incident Response

C O M P A N Y C O N F I D E N T I A L 51

Q&A

Thank You

[email protected]