SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Attacking WPA-Enterprise
    Wireless Networks
                  By: Matt Neely
  Presented: March 17, 2010 at NEO InfoSec Forum
Speaker Biography



•  Matt Neely, CISSP, CTGA, GCIH, and GCWN –
   Manager of the Profiling Team at SecureState
    –  Areas of expertise: wireless, penetration testing,
       physical security, security convergence, and
       incident response
    –  Formed and ran the TSCM team at a Fortune 200
       company
    –  Over 10 years of security experience
•  Outside of work:
    –  Co-host of the Security Justice podcast
    –  Licensed amateur radio operator (Technician) for
       almost 20 years
•  First radio I hacked:
    –  Fisher-Price Sky Talker walkie talkie
SecureState Overview



•  Ohio-Based Company           CISSP – Certified Information Systems Security
    –  Founded 2001             Professional
                                CISM – Certified Information Security Manager
                                CISA – Certified Information Systems Auditor
•  30+ Security Professionals   QDSP – Qualified Data Security Professional
                                GSEC – SANS GIAC Security Essentials
                                NSA INFOSEC Assessment Methodology (IAM)
•  Information Assurance &      Forensics – NTI, EnCase
   Protection                   ANSI X9/TG-3


•  Audit and business
   background (Big 10)

•  Experts in ethical hacking
   across many specialized
   areas
What You Will Learn Today



•    Short history of wireless security
•    What is 802.11 Enterprise authentication
•    How PEAP works
•    How to attack WPA Enterprise networks
•    How to defend WPA Enterprise networks
Brief History of Wireless


•  WEP died over a decade ago
•  Cisco released LEAP to make up for the deficiencies in
   WEP
    –  Proprietary and susceptible to brute force attacks
•  WPA/WPA2 was developed to provide strong encryption
   and multiple authentication mechanisms
Brief History of Wireless - WPA


•  WPA/WPA2 encryption and authentication options
   –  Encryption
       •  WPA – TKIP (RC4 based algorithm)
       •  WPA2 – CCMP (AES based algorithm)
   –  Authentication
       •  Pre-Shared Key (PSK) Authentication
            –  Designed for home and small offices
            –  Anything that uses a shared password is not secure
       •  Enterprise Authentication
            –  Uses 802.1X as the authentication framework
            –  Provides per-user or per-system authentication
802.1X In One Slide


•  Provides network access
   authentication
    –  EAP provides authentication
    –  Access point handles encryption
       (TKIP/CCMP)
•  Three components:
    –  Supplicant (Client)
    –  Authenticator (AP)
    –  Authentication Server (RADIUS
       or IAS server)
•  Supplicant and authentication server
   use an EAP type to authenticate
EAP



•  Extensible Authentication Protocol (EAP) is an authentication
   framework
•  802.1X uses various EAP types to authenticate users
     –  Common EAP types used with wireless: TLS, PEAP, TTLS, and
        EAP-FAST
     –  EAP type and configuration can greatly impact the security of the
        wireless network
•  Breakdown of EAP deployments:
     –  80% PEAP and TTLS
     –  15% EAP-FAST or LEAP
     –  5% TLS
Introduction To PEAP and TTLS



•  EAP originally was designed to work over wired networks where
   interception required physical access.
•  Interception is a larger concern on wireless networks.
•  Protected EAP (PEAP) and Tunneled Transport Layer Security
   (TTLS) use TLS to protect legacy authentication protocols from
   interception.
•  Both require a certificate on the RADIUS server for the Supplicant to
   validate server identity.
•  PEAP supports MS-CHAPv2 as the inner authentication method.
•  TTLS supports a large number of inner authentication protocols
   (MS-CHAPv2, CHAP, PAP, etc).
PEAP Using MS-CHAPv2
Importance of TLS Certificate Validation With PEAP




•  Network SSID can be spoofed easily.
•  TLS provides a method for validating the access point
   (Authenticator) and, therefore, the network.
•  Once the certificate from the Authenticator is validated,
   the client passes authentication information to the
   network (Authentication Server).
•  Authentication traffic is protected from eavesdropping by
   the TLS tunnel.
Web Browser SSL/TLS Validation
What happens when your
 wireless client trusts an
    invalid certificate?
Vulnerable PEAP Misconfiguration One



•  Many deployments
   disable all validation
•  PEAP supplicant will trust
   any RADIUS server
How An Attacker Can Exploit This



•  Attacker sets up a fake AP
    –  Mirrors target network’s SSID, encryption type (WPA/WPA2),
       and band (a/b/g/n)
    –  Configures the AP to accept Enterprise authentication
    –  Sets AP to visible
•  Attacker connects the fake AP to the special FreeRADIUS-WPE
   server that captures and records all authentication requests
•  Attacker waits for users to attach to the fake network and captures
   their credentials
    –  Impatient attackers can de-auth clients from the legitimate
       network
•  Attacker cracks the challenge/response pair to recover the password
FreeRADIUS-WPE



•  Josh Wright created the Wireless Pwnage Edition (WPE) patch for
   FreeRADIUS 2.0.2
•  Adds the following features:
    –  Returns success for any authentication requests
    –  Logs all authentication credentials
        •  Challenge/response
        •  Password
        •  Username
    –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5,
       EAP-MSCHAPv2, PAP, CHAP, and others
DEMO
DEMO
Vulnerable PEAP Misconfiguration Two



•  Configuration:
    –  “Validate server certificate”
       is enabled
    –  Default Wireless Zero
       Configuration (WZC)
       settings
    –  Prompts users to validate
       server certificate
         •  Minimal detail is shown
            in the dialog box
•  Attack:
    –  Same attack applies but
       requires users to validate
       the certificate
Vulnerable PEAP Misconfiguration Three


•    Configuration:
      –  “Validate server certificate” is
         enabled
      –  Trusted Root Certificate
         Authority is selected
      –  Does not validate certificate CN!
•    Attack:
      –  Sniffs a valid login and identifies
         the CA of the TLS certificate
      –  Purchases a certificate from the
         trusted CA
           •  Any CN value can be used
      –  Configures the RADIUS server
         to use this certificate
Concerns Around Mobile Devices
If At First You Don’t Succeed



•  Some clients try multiple EAP types while trying to authenticate to a
   wireless network.
    –  Easy for attackers to detect by analyzing a packet capture.
•  Attackers can use this weakness to trick clients into authenticating to
   a fake AP with an insecure EAP type.
    –  Often de-auth floods are used to prevent the client from
       connecting to a legitimate AP.
SECURING WIRELESS
NETWORKS
Encryption and Authentication



•  Use CCMP for encryption
    –  Migrate off TKIP
    –  Never use WEP
•  Use PEAP, TTLS, or TLS for authentication
    –  TLS requires a PKI
    –  Avoid Pre-Shared Keys (PSK)
        •  Anything that is shared is not secure
        •  If you must use PSK, choose a unique SSID and use a
           complex passphrase over 14 characters
Secure the Infrastructure



•  Harden and patch the infrastructure:
    –  Access points
    –  Wireless controllers
    –  Authentication servers
        •  Apply the latest service pack to Windows Internet
           Authentication Service (IAS) servers
•  Do not use hidden access points
•  Make sure insecure EAP types such as MD5 are disabled
•  Prevent insecure clients from using the wireless network
•  Firewall and isolate the wireless network from the internal network
Wireless IDS



•  Consider deploying a wireless IDS
•  Can detect:
    –  De-auth attacks
    –  RTS and CTS denial of service attacks
    –  Rogue APs
         •  Both on and off your wired network
•  Remember IDS is only detection and not prevention
•  Be very careful with wireless IPS
    –  IPS system could end up attacking neighboring networks
•  Wireless IDS will not protect users while traveling
Secure the Clients



•  Require long and complex passwords
•  Apply all patches quickly
    –  Including firmware patches for wireless cards
•  Harden the system
    –  Run Anti-Virus software and keep definitions up to date
    –  Have users login with a non-administrative level account
    –  Encrypt sensitive data on drive
    –  Turned on and configured personal firewall
•  Disable ad-hoc networks
•  Prevent network bridging
•  Ensure the Supplicant is properly configured
Secure WZC PEAP Configuration


•    Ensure the following items are
     configured:
      –  Enable “Validate server
         certificate”
      –  Enable “Connect to these
         servers” and specify the CN of
         the RADIUS server
      –  Under “Trusted Root
         Certificate Authorities” check
         ONLY the CA that issued the
         certificate
      –  Enable “Do not prompt user to
         authorize new servers or
         trusted certification authorities
•    Enforceable through Group Policy
•    Refer to KB941123 for additional
     information
Perform Regular Assessments




                         Act




•  The Shewhart or Deming Cycle, used in Quality Assurance –
   instead of PDCA, it’s Check-Act-Plan-Do when relating to
   security strategy.
•  It’s imperative to perform assessments on a regular basis.
•  Have a third party perform a wireless security assessment.
     •  Ensure the assessment includes architecture and client
         configuration reviews.
QUESTIONS?
For More Information:
       www.SecureState.com
       www.MatthewNeely.com
       @matthewneely

Mais conteúdo relacionado

Mais procurados

Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS ProtocolsPeter R. Egli
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Introduction to CNI (Container Network Interface)
Introduction to CNI (Container Network Interface)Introduction to CNI (Container Network Interface)
Introduction to CNI (Container Network Interface)HungWei Chiu
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic ControlSUSE Labs Taipei
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2Yaser Rahmati
 
Installing and Troubleshooting the Basic Components
Installing and Troubleshooting the Basic ComponentsInstalling and Troubleshooting the Basic Components
Installing and Troubleshooting the Basic ComponentsAmir Villas
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformAshnikbiz
 
Mise en place d'une infrastructure VDI de A à Z
Mise en place d'une infrastructure VDI de A à ZMise en place d'une infrastructure VDI de A à Z
Mise en place d'une infrastructure VDI de A à ZGauthier Hubert
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentationnishantsri
 
Chapter 10 -Vlsm
Chapter 10 -VlsmChapter 10 -Vlsm
Chapter 10 -Vlsmphanleson
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware WorkstationBoni Yeamin
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPointSteven Washington
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labAhmed Abdelwahed
 

Mais procurados (20)

Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
AD & LDAP
AD & LDAPAD & LDAP
AD & LDAP
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
AAA & RADIUS Protocols
AAA & RADIUS ProtocolsAAA & RADIUS Protocols
AAA & RADIUS Protocols
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Introduction to CNI (Container Network Interface)
Introduction to CNI (Container Network Interface)Introduction to CNI (Container Network Interface)
Introduction to CNI (Container Network Interface)
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic Control
 
DHCP
DHCPDHCP
DHCP
 
SDN OpenDaylight
SDN OpenDaylightSDN OpenDaylight
SDN OpenDaylight
 
Wireshark
WiresharkWireshark
Wireshark
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Installing and Troubleshooting the Basic Components
Installing and Troubleshooting the Basic ComponentsInstalling and Troubleshooting the Basic Components
Installing and Troubleshooting the Basic Components
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Vlan
Vlan Vlan
Vlan
 
Mise en place d'une infrastructure VDI de A à Z
Mise en place d'une infrastructure VDI de A à ZMise en place d'une infrastructure VDI de A à Z
Mise en place d'une infrastructure VDI de A à Z
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Chapter 10 -Vlsm
Chapter 10 -VlsmChapter 10 -Vlsm
Chapter 10 -Vlsm
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
 
Network Administrator Project PowerPoint
Network Administrator Project PowerPointNetwork Administrator Project PowerPoint
Network Administrator Project PowerPoint
 
Windows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete labWindows server 2016 storage step by step complete lab
Windows server 2016 storage step by step complete lab
 

Destaque

Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
ACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerAli Badr
 
Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Sergio Chiarla
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesBulent Buyukkahraman
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Why Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessWhy Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessDrift
 
The Evolution of Sales Tools
The Evolution of Sales ToolsThe Evolution of Sales Tools
The Evolution of Sales ToolsDrift
 
Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy London Business School
 
The Drift Brand Book
The Drift Brand BookThe Drift Brand Book
The Drift Brand BookDrift
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

Destaque (18)

Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
ACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerACSR Clear Pass Policy Manager
ACSR Clear Pass Policy Manager
 
Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joiningEMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
 
Why Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessWhy Half of You Will Go Out of Business
Why Half of You Will Go Out of Business
 
The Evolution of Sales Tools
The Evolution of Sales ToolsThe Evolution of Sales Tools
The Evolution of Sales Tools
 
Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy
 
The Drift Brand Book
The Drift Brand BookThe Drift Brand Book
The Drift Brand Book
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Semelhante a Attacking and Securing WPA Enterprise Networks

Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXCisco Canada
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.pptDEEPAK948083
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Owasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet OverviewOwasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet Overviewowaspindy
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 

Semelhante a Attacking and Securing WPA Enterprise Networks (20)

Chapter08
Chapter08Chapter08
Chapter08
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
Unit08
Unit08Unit08
Unit08
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Web security
Web securityWeb security
Web security
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.ppt
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Owasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet OverviewOwasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet Overview
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Attacking and Securing WPA Enterprise Networks

  • 1. Attacking WPA-Enterprise Wireless Networks By: Matt Neely Presented: March 17, 2010 at NEO InfoSec Forum
  • 2. Speaker Biography •  Matt Neely, CISSP, CTGA, GCIH, and GCWN – Manager of the Profiling Team at SecureState –  Areas of expertise: wireless, penetration testing, physical security, security convergence, and incident response –  Formed and ran the TSCM team at a Fortune 200 company –  Over 10 years of security experience •  Outside of work: –  Co-host of the Security Justice podcast –  Licensed amateur radio operator (Technician) for almost 20 years •  First radio I hacked: –  Fisher-Price Sky Talker walkie talkie
  • 3. SecureState Overview •  Ohio-Based Company CISSP – Certified Information Systems Security –  Founded 2001 Professional CISM – Certified Information Security Manager CISA – Certified Information Systems Auditor •  30+ Security Professionals QDSP – Qualified Data Security Professional GSEC – SANS GIAC Security Essentials NSA INFOSEC Assessment Methodology (IAM) •  Information Assurance & Forensics – NTI, EnCase Protection ANSI X9/TG-3 •  Audit and business background (Big 10) •  Experts in ethical hacking across many specialized areas
  • 4. What You Will Learn Today •  Short history of wireless security •  What is 802.11 Enterprise authentication •  How PEAP works •  How to attack WPA Enterprise networks •  How to defend WPA Enterprise networks
  • 5. Brief History of Wireless •  WEP died over a decade ago •  Cisco released LEAP to make up for the deficiencies in WEP –  Proprietary and susceptible to brute force attacks •  WPA/WPA2 was developed to provide strong encryption and multiple authentication mechanisms
  • 6. Brief History of Wireless - WPA •  WPA/WPA2 encryption and authentication options –  Encryption •  WPA – TKIP (RC4 based algorithm) •  WPA2 – CCMP (AES based algorithm) –  Authentication •  Pre-Shared Key (PSK) Authentication –  Designed for home and small offices –  Anything that uses a shared password is not secure •  Enterprise Authentication –  Uses 802.1X as the authentication framework –  Provides per-user or per-system authentication
  • 7. 802.1X In One Slide •  Provides network access authentication –  EAP provides authentication –  Access point handles encryption (TKIP/CCMP) •  Three components: –  Supplicant (Client) –  Authenticator (AP) –  Authentication Server (RADIUS or IAS server) •  Supplicant and authentication server use an EAP type to authenticate
  • 8. EAP •  Extensible Authentication Protocol (EAP) is an authentication framework •  802.1X uses various EAP types to authenticate users –  Common EAP types used with wireless: TLS, PEAP, TTLS, and EAP-FAST –  EAP type and configuration can greatly impact the security of the wireless network •  Breakdown of EAP deployments: –  80% PEAP and TTLS –  15% EAP-FAST or LEAP –  5% TLS
  • 9. Introduction To PEAP and TTLS •  EAP originally was designed to work over wired networks where interception required physical access. •  Interception is a larger concern on wireless networks. •  Protected EAP (PEAP) and Tunneled Transport Layer Security (TTLS) use TLS to protect legacy authentication protocols from interception. •  Both require a certificate on the RADIUS server for the Supplicant to validate server identity. •  PEAP supports MS-CHAPv2 as the inner authentication method. •  TTLS supports a large number of inner authentication protocols (MS-CHAPv2, CHAP, PAP, etc).
  • 11. Importance of TLS Certificate Validation With PEAP •  Network SSID can be spoofed easily. •  TLS provides a method for validating the access point (Authenticator) and, therefore, the network. •  Once the certificate from the Authenticator is validated, the client passes authentication information to the network (Authentication Server). •  Authentication traffic is protected from eavesdropping by the TLS tunnel.
  • 12. Web Browser SSL/TLS Validation
  • 13. What happens when your wireless client trusts an invalid certificate?
  • 14. Vulnerable PEAP Misconfiguration One •  Many deployments disable all validation •  PEAP supplicant will trust any RADIUS server
  • 15. How An Attacker Can Exploit This •  Attacker sets up a fake AP –  Mirrors target network’s SSID, encryption type (WPA/WPA2), and band (a/b/g/n) –  Configures the AP to accept Enterprise authentication –  Sets AP to visible •  Attacker connects the fake AP to the special FreeRADIUS-WPE server that captures and records all authentication requests •  Attacker waits for users to attach to the fake network and captures their credentials –  Impatient attackers can de-auth clients from the legitimate network •  Attacker cracks the challenge/response pair to recover the password
  • 16. FreeRADIUS-WPE •  Josh Wright created the Wireless Pwnage Edition (WPE) patch for FreeRADIUS 2.0.2 •  Adds the following features: –  Returns success for any authentication requests –  Logs all authentication credentials •  Challenge/response •  Password •  Username –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5, EAP-MSCHAPv2, PAP, CHAP, and others
  • 17. DEMO
  • 18. DEMO
  • 19. Vulnerable PEAP Misconfiguration Two •  Configuration: –  “Validate server certificate” is enabled –  Default Wireless Zero Configuration (WZC) settings –  Prompts users to validate server certificate •  Minimal detail is shown in the dialog box •  Attack: –  Same attack applies but requires users to validate the certificate
  • 20. Vulnerable PEAP Misconfiguration Three •  Configuration: –  “Validate server certificate” is enabled –  Trusted Root Certificate Authority is selected –  Does not validate certificate CN! •  Attack: –  Sniffs a valid login and identifies the CA of the TLS certificate –  Purchases a certificate from the trusted CA •  Any CN value can be used –  Configures the RADIUS server to use this certificate
  • 22. If At First You Don’t Succeed •  Some clients try multiple EAP types while trying to authenticate to a wireless network. –  Easy for attackers to detect by analyzing a packet capture. •  Attackers can use this weakness to trick clients into authenticating to a fake AP with an insecure EAP type. –  Often de-auth floods are used to prevent the client from connecting to a legitimate AP.
  • 24. Encryption and Authentication •  Use CCMP for encryption –  Migrate off TKIP –  Never use WEP •  Use PEAP, TTLS, or TLS for authentication –  TLS requires a PKI –  Avoid Pre-Shared Keys (PSK) •  Anything that is shared is not secure •  If you must use PSK, choose a unique SSID and use a complex passphrase over 14 characters
  • 25. Secure the Infrastructure •  Harden and patch the infrastructure: –  Access points –  Wireless controllers –  Authentication servers •  Apply the latest service pack to Windows Internet Authentication Service (IAS) servers •  Do not use hidden access points •  Make sure insecure EAP types such as MD5 are disabled •  Prevent insecure clients from using the wireless network •  Firewall and isolate the wireless network from the internal network
  • 26. Wireless IDS •  Consider deploying a wireless IDS •  Can detect: –  De-auth attacks –  RTS and CTS denial of service attacks –  Rogue APs •  Both on and off your wired network •  Remember IDS is only detection and not prevention •  Be very careful with wireless IPS –  IPS system could end up attacking neighboring networks •  Wireless IDS will not protect users while traveling
  • 27. Secure the Clients •  Require long and complex passwords •  Apply all patches quickly –  Including firmware patches for wireless cards •  Harden the system –  Run Anti-Virus software and keep definitions up to date –  Have users login with a non-administrative level account –  Encrypt sensitive data on drive –  Turned on and configured personal firewall •  Disable ad-hoc networks •  Prevent network bridging •  Ensure the Supplicant is properly configured
  • 28. Secure WZC PEAP Configuration •  Ensure the following items are configured: –  Enable “Validate server certificate” –  Enable “Connect to these servers” and specify the CN of the RADIUS server –  Under “Trusted Root Certificate Authorities” check ONLY the CA that issued the certificate –  Enable “Do not prompt user to authorize new servers or trusted certification authorities •  Enforceable through Group Policy •  Refer to KB941123 for additional information
  • 29. Perform Regular Assessments Act •  The Shewhart or Deming Cycle, used in Quality Assurance – instead of PDCA, it’s Check-Act-Plan-Do when relating to security strategy. •  It’s imperative to perform assessments on a regular basis. •  Have a third party perform a wireless security assessment. •  Ensure the assessment includes architecture and client configuration reviews.
  • 30. QUESTIONS? For More Information: www.SecureState.com www.MatthewNeely.com @matthewneely