SlideShare uma empresa Scribd logo
1 de 73
5GHz Electronic Warfare
Part I - 802.11n
net user author /domain
Gabriel Ryan
Co-Founder / Principal Security Consultant @ Digital Silence
@s0lst1c3 @digitalsilence_
gabriel@digitalsilence.com
Typical Enterprise WiFi Configurations will have
Dedicated networks for:
● Guest internet
● Corporate network access
● Possibly BYOD
Varying levels of security for each of these. However, if it’s important it’ll probably
be protected using WPA-EAP
Unless it’s ICS/SCADA, in
which case it’ll probably be
protected by WEP
How do you attack WPA-EAP?
The primary means of breaching WPA-EAP networks is the Rogue AP Attack
● Bread of butter of wireless pentesting
Rogue AP Attack
Force client devices to connect to the attacker’s access point. Most reliable way
of doing this == evil twin attack
(VERY) High level WPA2-EAP overview
The problem
To perform an evil twin attack, the attacker must either:
1. Entice a client device to roam to a rogue AP by providing a better connection
(higher signal strength, better signal to noise ratio)
2. Coerce a client device to roam to a rogue AP by denying access to legitimate
AP (deauth packets)
The problem
Most modern hardware uses 802.11ac or 802.11n.
Existing tools for performing rogue AP attacks either:
1. Don’t support 802.11n and 802.11ac at all
2. Only do so with extensive manual configuration
What this means: timeboxed pentesters stuck using 802.11g or 802.11a
802.11n and 802.11ac provide notably better
throughput than 802.11a or 802.11g
802.11g – maximum of 54 Mbps
802.11n – theoretically can reach speeds of 600-900 Mbps (300 Mbps more
realistic)
What this means
It is very difficult to entice a client to roam from a 40 MHz 802.11n access point
to a 20MHz 802.11g rogue access point.
Coercion through denial service the only viable option in most cases.
Why coercion doesn’t always work
● Very rarely will you be going up against a single AP
● When you deauth a single AP the clients will just roam to another 802.11n or
802.11ac AP
Can’t you solve this problem by deauthenticating
BOTH target access points?
Sure, you’ll just need 3 WiFi interfaces (1 for rogue AP, 2 for deauthentication)
● but what if the target network uses 3 APs?
● now we need 4 WiFi interfaces
● … and so on and so forth
This can quickly get out of hand.
Other proposed solution: jam 5GHz spectrum using
SDR
I’ve heard of people doing this. Disclaimer: I do not endorse or recommend it.
Other proposed solution: jam 5GHz spectrum using
SDR
cat /dev/urandom | $FIVE_GHZ_SPECTRUM
Obviously a terrible idea
 Not a targeted attack
 802.11n and 802.11ac can still use 2.4Ghz spectrum
 5GHz used by all kinds of other neat stuff…. like aircraft radar
What we really need: a tool that can create rogue
APs using 802.11n and 802.11ac on both 2.4Ghz
and 5GHz spectrums
... This talk focuses primarily on 802.11n. Stay tuned
for 802.11ac.
Why 802.11n is so hard:
 Access point configuration is highly complicated
 Access points must be 802.11h compliant in order to work on DFS channels
(i.e. - must be able to detect and avoid interfering with airplane radar)
 BSS overlap prevention must be circumvented
What does any of this mean? Stay tuned for following sections.
Before we continue… let’s talk about 802.11n
802.11n offers five main technical improvements:
● Multiple Input Multiple Output (MIMO)
● Spatial Multiplexing
● Channel Bonding
● Short Guard Interval
● Mac Layer Improvements
Multiple Input Multiple Output
Spatial Multiplexing
Without Spatial Multiplexing:
With Spatial Multiplexing:
How 802.11n Uses Spatial Multiplexing
Multiple data streams transmitted at the same time and on the same channel.
How this works:
 Transmitter splits data streams into multiple spatial streams using MIMO
signal process
 Each spatial stream is transmitted using a dedicated antenna
 Receiver recombines the spatial streams using MIMO signal process
Channel Bonding
Channel Bonding
Traditional 802.11 channels (assuming OFDM):
 20 MHz wide
802.11n Channel Bonding
 Traditional 802.11 channels (assuming OFDM) are 20 MHz Wide
 Channel bonding combines two or adjacent channels to create a 40 MHz
wide channel, doubling bandwidth
Other improvements introduced by 802.11n:
 Short Guard Interval
 MAC improvements
This is a 45 minute presentation, so we don’t have time to talk about these ;)
Not as relevant to discussion as MIMO, spatial multiplexing, and channel
bonding. Look them up if you’re curious.
What this means for pentesters:
To create a rogue AP using 802.11n you must:
1. select a channel width (20 MHz or 40 MHz)
2. select an operating channel
3. select a hardware mode that works with that operating channel
4. set your HT parameters correctly
We’re not done…
To create a rogue AP using 802.11n you must:
5. decide whether to allow non-HT connections to your HT access point
6. select an appropriate number of spatial streams
Bonus: if you chose a 40MHz channel, you need to choose whether to place the
secondary channel above or below the primary channel. :D
If you mess up any of these up, hostapd
will either refuse to start or silently fail.
There is a method to this madness. You just need to
know what configuration options to use in any given
situation…
… or use a tool that will
handle configuration for
you.
Demo
Achieving 802.11h Compliance
Achieving 802.11h Compliance
● Certain parts of the 5Ghz spectrum are used by radar
● Regulations by FCC, EU, etc dictate that APs operating on this channel must
be capable of detecting and avoiding radar
● This means that if you want to legally operate on DFS channels, you need to
be compliant
Also a safety issue…
Achieving 802.11h Compliance
How we’ve addressed this:
● Added flags to eaphammer that enable 802.11h, granting access to DFS
channels
● Note: you may still have to enable DFS at the kernel level. That’s on you.
● For researchers: added flags that force eaphammer to use DFS channels
even if DFS is not enabled (do not use this outside of a lab)
Circumventing BSS Overlap Protection
BSS Conflicts:
Law of 802.11n - thou shall not occupy the same primary channel as another AP if
possible
BSS Conflicts
Evil Twin Attack - Deliberately occupying the same ESSID and channel
as another AP in order to force client devices to connect to the attacker
BSS Conflicts
Fortunately, we can resolve this issue by patching hostapd to ignore BSS
conflicts.
● People have been doing this for years, and it’s as easy as changing a couple
lines of code (hostapd only checks for conflicts at start) [3]
What’s been added to eaphammer:
Out of the box support for
● 5Ghz rogue access points
● 802.11n compatibility (ac comes next)
● Added support for wmm (for good measure)
● 802.11h compliant (yay)
● Minimal manual configuration needed, granular configuration still possible
Check out the source code:
https://github.com/s0lst1c3/eaphammer

Mais conteúdo relacionado

Mais procurados

Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network securityChippy Thomas
 
Optimizing wireless networks for maximum coverage and efficiency
Optimizing wireless networks for maximum coverage and efficiencyOptimizing wireless networks for maximum coverage and efficiency
Optimizing wireless networks for maximum coverage and efficiencyoldsouth
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemnewbie2019
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linuxNouman Baloch
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWispot
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
Chapter 6 firewall
Chapter 6 firewallChapter 6 firewall
Chapter 6 firewallnewbie2019
 
Wbs510 wbs210 datasheet_v1.2
Wbs510 wbs210 datasheet_v1.2Wbs510 wbs210 datasheet_v1.2
Wbs510 wbs210 datasheet_v1.2Akacio Marquez
 
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !Priyanka Aash
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaborationtelemetria
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP AddressAurelio Eslawan
 

Mais procurados (20)

Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network security
 
Optimizing wireless networks for maximum coverage and efficiency
Optimizing wireless networks for maximum coverage and efficiencyOptimizing wireless networks for maximum coverage and efficiency
Optimizing wireless networks for maximum coverage and efficiency
 
Best!
Best!Best!
Best!
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Iptables presentation
Iptables presentationIptables presentation
Iptables presentation
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection system
 
UCL
UCLUCL
UCL
 
Test
TestTest
Test
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
introduction of iptables in linux
introduction of iptables in linuxintroduction of iptables in linux
introduction of iptables in linux
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
Chapter 6 firewall
Chapter 6 firewallChapter 6 firewall
Chapter 6 firewall
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Wbs510 wbs210 datasheet_v1.2
Wbs510 wbs210 datasheet_v1.2Wbs510 wbs210 datasheet_v1.2
Wbs510 wbs210 datasheet_v1.2
 
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !
YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS !
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaboration
 
Assigning A Static IP Address
Assigning A Static IP AddressAssigning A Static IP Address
Assigning A Static IP Address
 

Semelhante a 5 ghz electronic warfare part i

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Netgear Italia
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptxMinecraftJava
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)Jeff Green
 
Sales presentation EAP1200H
Sales presentation EAP1200HSales presentation EAP1200H
Sales presentation EAP1200HEnGenius Europe
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 

Semelhante a 5 ghz electronic warfare part i (20)

Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
Webinar NETGEAR - Linee guida per il disegno di una rete wireless a elevate p...
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Darsh
DarshDarsh
Darsh
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wi fi
Wi fiWi fi
Wi fi
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 
Sales presentation EAP1200H
Sales presentation EAP1200HSales presentation EAP1200H
Sales presentation EAP1200H
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

5 ghz electronic warfare part i

  • 2. net user author /domain Gabriel Ryan Co-Founder / Principal Security Consultant @ Digital Silence @s0lst1c3 @digitalsilence_ gabriel@digitalsilence.com
  • 3. Typical Enterprise WiFi Configurations will have Dedicated networks for: ● Guest internet ● Corporate network access ● Possibly BYOD Varying levels of security for each of these. However, if it’s important it’ll probably be protected using WPA-EAP
  • 4. Unless it’s ICS/SCADA, in which case it’ll probably be protected by WEP
  • 5. How do you attack WPA-EAP? The primary means of breaching WPA-EAP networks is the Rogue AP Attack ● Bread of butter of wireless pentesting
  • 6. Rogue AP Attack Force client devices to connect to the attacker’s access point. Most reliable way of doing this == evil twin attack
  • 7.
  • 8.
  • 9. (VERY) High level WPA2-EAP overview
  • 10.
  • 11. The problem To perform an evil twin attack, the attacker must either: 1. Entice a client device to roam to a rogue AP by providing a better connection (higher signal strength, better signal to noise ratio) 2. Coerce a client device to roam to a rogue AP by denying access to legitimate AP (deauth packets)
  • 12. The problem Most modern hardware uses 802.11ac or 802.11n. Existing tools for performing rogue AP attacks either: 1. Don’t support 802.11n and 802.11ac at all 2. Only do so with extensive manual configuration What this means: timeboxed pentesters stuck using 802.11g or 802.11a
  • 13. 802.11n and 802.11ac provide notably better throughput than 802.11a or 802.11g 802.11g – maximum of 54 Mbps 802.11n – theoretically can reach speeds of 600-900 Mbps (300 Mbps more realistic)
  • 14.
  • 15.
  • 16.
  • 17. What this means It is very difficult to entice a client to roam from a 40 MHz 802.11n access point to a 20MHz 802.11g rogue access point. Coercion through denial service the only viable option in most cases.
  • 18.
  • 19. Why coercion doesn’t always work ● Very rarely will you be going up against a single AP ● When you deauth a single AP the clients will just roam to another 802.11n or 802.11ac AP
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Can’t you solve this problem by deauthenticating BOTH target access points? Sure, you’ll just need 3 WiFi interfaces (1 for rogue AP, 2 for deauthentication) ● but what if the target network uses 3 APs? ● now we need 4 WiFi interfaces ● … and so on and so forth This can quickly get out of hand.
  • 28. Other proposed solution: jam 5GHz spectrum using SDR I’ve heard of people doing this. Disclaimer: I do not endorse or recommend it.
  • 29. Other proposed solution: jam 5GHz spectrum using SDR cat /dev/urandom | $FIVE_GHZ_SPECTRUM
  • 30.
  • 31.
  • 32. Obviously a terrible idea  Not a targeted attack  802.11n and 802.11ac can still use 2.4Ghz spectrum  5GHz used by all kinds of other neat stuff…. like aircraft radar
  • 33.
  • 34.
  • 35. What we really need: a tool that can create rogue APs using 802.11n and 802.11ac on both 2.4Ghz and 5GHz spectrums ... This talk focuses primarily on 802.11n. Stay tuned for 802.11ac.
  • 36. Why 802.11n is so hard:  Access point configuration is highly complicated  Access points must be 802.11h compliant in order to work on DFS channels (i.e. - must be able to detect and avoid interfering with airplane radar)  BSS overlap prevention must be circumvented What does any of this mean? Stay tuned for following sections.
  • 37. Before we continue… let’s talk about 802.11n
  • 38. 802.11n offers five main technical improvements: ● Multiple Input Multiple Output (MIMO) ● Spatial Multiplexing ● Channel Bonding ● Short Guard Interval ● Mac Layer Improvements
  • 43. How 802.11n Uses Spatial Multiplexing Multiple data streams transmitted at the same time and on the same channel. How this works:  Transmitter splits data streams into multiple spatial streams using MIMO signal process  Each spatial stream is transmitted using a dedicated antenna  Receiver recombines the spatial streams using MIMO signal process
  • 45. Channel Bonding Traditional 802.11 channels (assuming OFDM):  20 MHz wide
  • 46.
  • 47. 802.11n Channel Bonding  Traditional 802.11 channels (assuming OFDM) are 20 MHz Wide  Channel bonding combines two or adjacent channels to create a 40 MHz wide channel, doubling bandwidth
  • 48.
  • 49. Other improvements introduced by 802.11n:  Short Guard Interval  MAC improvements This is a 45 minute presentation, so we don’t have time to talk about these ;) Not as relevant to discussion as MIMO, spatial multiplexing, and channel bonding. Look them up if you’re curious.
  • 50. What this means for pentesters: To create a rogue AP using 802.11n you must: 1. select a channel width (20 MHz or 40 MHz) 2. select an operating channel 3. select a hardware mode that works with that operating channel 4. set your HT parameters correctly
  • 51. We’re not done… To create a rogue AP using 802.11n you must: 5. decide whether to allow non-HT connections to your HT access point 6. select an appropriate number of spatial streams Bonus: if you chose a 40MHz channel, you need to choose whether to place the secondary channel above or below the primary channel. :D
  • 52. If you mess up any of these up, hostapd will either refuse to start or silently fail.
  • 53.
  • 54. There is a method to this madness. You just need to know what configuration options to use in any given situation…
  • 55. … or use a tool that will handle configuration for you.
  • 56. Demo
  • 58. Achieving 802.11h Compliance ● Certain parts of the 5Ghz spectrum are used by radar ● Regulations by FCC, EU, etc dictate that APs operating on this channel must be capable of detecting and avoiding radar ● This means that if you want to legally operate on DFS channels, you need to be compliant
  • 59. Also a safety issue…
  • 60.
  • 61. Achieving 802.11h Compliance How we’ve addressed this: ● Added flags to eaphammer that enable 802.11h, granting access to DFS channels ● Note: you may still have to enable DFS at the kernel level. That’s on you. ● For researchers: added flags that force eaphammer to use DFS channels even if DFS is not enabled (do not use this outside of a lab)
  • 63.
  • 64. BSS Conflicts: Law of 802.11n - thou shall not occupy the same primary channel as another AP if possible
  • 65. BSS Conflicts Evil Twin Attack - Deliberately occupying the same ESSID and channel as another AP in order to force client devices to connect to the attacker
  • 66.
  • 67. BSS Conflicts Fortunately, we can resolve this issue by patching hostapd to ignore BSS conflicts. ● People have been doing this for years, and it’s as easy as changing a couple lines of code (hostapd only checks for conflicts at start) [3]
  • 68.
  • 69.
  • 70.
  • 71.
  • 72. What’s been added to eaphammer: Out of the box support for ● 5Ghz rogue access points ● 802.11n compatibility (ac comes next) ● Added support for wmm (for good measure) ● 802.11h compliant (yay) ● Minimal manual configuration needed, granular configuration still possible
  • 73. Check out the source code: https://github.com/s0lst1c3/eaphammer