Journal of Digital Forensics, Security and Law Automated Man-In-The

Journal of Digital Forensics, Security and Law Automated Man-In-The

Journal of Digital Forensics, Security and Law Volume 13 Number 1 Article 9 3-31-2018 Automated Man-in-the-Middle Attack Against Wi‑Fi Networks Martin Vondráček Brno University of Technology, Brno, Czech Republic, [email protected] Jan Pluskal Brno University of Technology, Brno, Czech Republic, [email protected] Ondřej Ryšavý Brno University of Technology, Brno, Czech Republic, [email protected] Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Digital Communications and Networking Commons, Forensic Science and Technology Commons, Information Security Commons, OS and Networks Commons, and the Software Engineering Commons Recommended Citation Vondráček, Martin; Pluskal, Jan; and Ryšavý, Ondřej (2018) "Automated Man-in-the-Middle Attack Against Wi‑Fi Networks," Journal of Digital Forensics, Security and Law: Vol. 13 : No. 1 , Article 9. DOI: https://doi.org/10.15394/jdfsl.2018.1495 Available at: https://commons.erau.edu/jdfsl/vol13/iss1/9 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Automated Man-in-the-Middle Attack Against Wi‑Fi Networks Cover Page Footnote This paper is an extended version of the original paper that has been presented at the 9th EAI International Conference on Digital Forensics and Cyber Crime (Vondráček, Pluskal, & Ryšavý, 2018). This work was supported by Ministry of Interior of the Czech Republic project "Integrated platform for analysis of digital data from security incidents" VI20172020062; Ministry of Education, Youth and Sports of the Czech Republic from the National Programme of Sustainability (NPU II) project "IT4Innovations excellence in science" LQ1602; and by BUT internal project "ICT tools, methods and technologies for smart cities" FIT-S-17-3964. This article is available in Journal of Digital Forensics, Security and Law: https://commons.erau.edu/jdfsl/vol13/iss1/ 9 Automated Man-in-the-Middle Attack Against . JDFSL V13N1 AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS Martin Vondr´aˇcek Jan Pluskal OndˇrejRyˇsav´y Brno University of Technology Faculty of Information Technology Boˇzetˇechova 2, Brno, Czech Republic fxvondr20g@stud.fit.vutbr.cz, fipluskal,rysavyg@fit.vutbr.cz ABSTRACT Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated should raise public awareness about the state of wireless security. Keywords: Man-in-the-Middle attack, accessing secured wireless networks, password crack- ing, dictionary personalization, tampering network topology, impersonation, phishing 1. INTRODUCTION proposed wireless security standards aim at prevention of such unauthorized access. Un- Recent enhancements to wireless technology fortunately, the first standard called WEP is strengthen the benefits of wireless commu- so weak that it is possible to crack the pass- nication. It is convenient to access the net- word in a few seconds using a conventional work from any location within the network laptop computer. The answer was the intro- coverage area. For most of the portable de- duction of stronger standard WPA and later vices, this is the only way to connect to the even stronger WPA2. In 2017, Mathy Van- network. Installation and network setup are hoef announced that he discovered a vulner- easy, and the network is further expandable. ability in security mechanisms that use the The main benefit of Wi-Fi, its accessibility, four-way handshake (WPA and WPA2) and makes this technology a suitable target of at- demonstrated how easily this vulnerability tacks. A potential attacker needs to be in the can be exploited. physical proximity of a Wi-Fi network. The The main focus of this paper is security 1This paper is an extended version of the original paper that has been presented at the 9th EAI Inter- of wireless networks. It provides a study of national Conference on Digital Forensics and Cyber widely used network technologies and mech- Crime (Vondr´aˇcek,Pluskal, & Ryˇsav´y,2018). anisms of wireless security. Analyzed tech- c 2018 ADFSL Page 59 JDFSL V13N1 Automated Man-in-the-Middle Attack Against . nologies and security algorithms suffer weak- evidence, it is scarcely used, because it re- nesses that can be exploited to perform Man- quires expert domain knowledge. Thus, this in-the-Middle attacks. A successful realiza- process of evidence collection is very expen- tion of this kind of attack allows not only sive and human resource demanding. to eavesdrop on all the victim's network traffic but also to spoof his communication (Prowell, Kraus, & Borkin, 2010, pp. 101{ Internet ISP 120; Callegati, Cerroni, & Ramilli, 2009). In an example scenario (Figure 1), the victim is a suspect conducting illegal activ- ity on a target network. The attacker is a law-enforcement agency investigator with appropriate legal authorization to intercept the suspect's communication and to perform a direct attack on the network. In some cases, the suspect may be aware that his communication can be intercepted by the In- AP ternet Service Provider and harden his net- work. For example, he could use an over- lay network technology, e.g., VPN (imple- mented by L2TP, IPsec (Kent & Seo, 2005, Suspect Investigator pp. 09{10), PPTP) or anonymization net- works (Tor, I2P, etc.) to create an encrypted tunnel configured on his gateway, for all Figure 1. Example forensics scenario where his external communication. This concept the suspect has hardened his network and is easy to implement and does not require uses an encrypted tunnel from the gate- any additional configuration on endpoint de- way (AP). vices. Generally, this would not be con- sidered a properly secured network (Godber The aim of this research is to design, im- & Dasgupta, 2003, pp. 425-431), but this plement and test a tool able to automate scheme, or similar, is often used by large ven- the process of accessing a secured WLAN dors like Cisco (Deal & Cisco Systems, 2006) and to perform data interception. Further- or Microsoft (Thomas, 2017) for branch of- more, this tool should be able to tamper with fice deployment and can also be seen in home the network to collect more evidence by redi- routers1. In such cases, intercepting traffic recting traffic to place itself in the middle on the ISP level would not yield meaning- of the communication and tamper with it, ful results, because all the communication is to access otherwise encrypted data in plain encrypted by the hardening. On the other form. Using the automated tool should not hand, direct attack on the suspect's LAN require any expert knowledge from the in- will intercept plain communication. But, vestigator. even when an investigator is legally permit- We designed a generic framework, see Fig- ted to carry out such an attack to acquire ure 3, capable of accessing and acquiring evidence from a wireless network regardless 1Asus RT-AC5300 { Merlin WRT has an option of used security mechanisms. This frame- to tunnel all traffic thought Tor. work can be split into several steps. First, Page 60 c 2018 ADFSL Automated Man-in-the-Middle Attack Against . JDFSL V13N1 it is necessary for an investigator to ob- 2. SECURITY tain access to the WLAN used by the sus- pect. Therefore, this research focuses on WEAKNESSES IN exploitable weaknesses of particular secu- WLAN TECHNOLOGIES rity mechanisms, see Section 2 for more de- Following network technologies (Sec- tails. Upon successful connection to the net- tions 2.1, 2.2), which find a significant work, the investigator needs to tamper with utilization, unfortunately, suffer from the network topology. For this purpose, security weaknesses in their protocols. weaknesses of several network technologies These flaws can be used in the process of can be exploited. From this point on, the in- the MitM attack. vestigator can start to capture and break the encryption on the suspect's communication. 2.1 Wireless Security Wired Equivalent Privacy (WEP) is a se- Specialized tools focused on exploiting in- curity algorithm introduced as a part of dividual weaknesses in security mechanisms the IEEE 802.11 standard (Halsall, 2005, currently used by WLAN s are already avail- p. 665; IEEE-SA, 2012, pp. 1167{1169). To- able. There are also specialized tools focused day, WEP is deprecated and superseded by on individual steps of MitM attacks. Tools subsequent algorithms, but is still sometimes that were analyzed and used in implemen- used, as can be seen from Table 1 avail- tation of the wifimitm package are outlined able from Wifileaks.cz 2. Fluhrer, Mantin, in Section 2. and Shamir (2001) presented that WEP is broken. There are tools that provide access Based on the acquired knowledge, refer- to wireless networks secured by WEP avail- enced studies and practical experience from able (Tews, Weinmann, & Pyshkin, 2007). manual experiments, authors were able to Regarding WEP secured WLAN s, authenti- create an attack strategy which is composed cation can be either Open System Authenti- of a suitable set of available tools. The strat- cation (OSA) or Shared Key Authentication egy is then able to select and manage in- (SKA) (IEEE-SA, 2012, pp. 1170{1174). In dividual steps for a successful MitM at- the case of WEP OSA, any station (STA) tack tailored to a specific WLAN configura- can successfully authenticate to the Access tion.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    24 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us