SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
Attacking WPA-Enterprise
    Wireless Networks
                  By: Matt Neely
  Presented: March 17, 2010 at NEO InfoSec Forum
Speaker Biography



•  Matt Neely, CISSP, CTGA, GCIH, and GCWN –
   Manager of the Profiling Team at SecureState
    –  Areas of expertise: wireless, penetration testing,
       physical security, security convergence, and
       incident response
    –  Formed and ran the TSCM team at a Fortune 200
       company
    –  Over 10 years of security experience
•  Outside of work:
    –  Co-host of the Security Justice podcast
    –  Licensed amateur radio operator (Technician) for
       almost 20 years
•  First radio I hacked:
    –  Fisher-Price Sky Talker walkie talkie
SecureState Overview



•  Ohio-Based Company           CISSP – Certified Information Systems Security
    –  Founded 2001             Professional
                                CISM – Certified Information Security Manager
                                CISA – Certified Information Systems Auditor
•  30+ Security Professionals   QDSP – Qualified Data Security Professional
                                GSEC – SANS GIAC Security Essentials
                                NSA INFOSEC Assessment Methodology (IAM)
•  Information Assurance &      Forensics – NTI, EnCase
   Protection                   ANSI X9/TG-3


•  Audit and business
   background (Big 10)

•  Experts in ethical hacking
   across many specialized
   areas
What You Will Learn Today



•    Short history of wireless security
•    What is 802.11 Enterprise authentication
•    How PEAP works
•    How to attack WPA Enterprise networks
•    How to defend WPA Enterprise networks
Brief History of Wireless


•  WEP died over a decade ago
•  Cisco released LEAP to make up for the deficiencies in
   WEP
    –  Proprietary and susceptible to brute force attacks
•  WPA/WPA2 was developed to provide strong encryption
   and multiple authentication mechanisms
Brief History of Wireless - WPA


•  WPA/WPA2 encryption and authentication options
   –  Encryption
       •  WPA – TKIP (RC4 based algorithm)
       •  WPA2 – CCMP (AES based algorithm)
   –  Authentication
       •  Pre-Shared Key (PSK) Authentication
            –  Designed for home and small offices
            –  Anything that uses a shared password is not secure
       •  Enterprise Authentication
            –  Uses 802.1X as the authentication framework
            –  Provides per-user or per-system authentication
802.1X In One Slide


•  Provides network access
   authentication
    –  EAP provides authentication
    –  Access point handles encryption
       (TKIP/CCMP)
•  Three components:
    –  Supplicant (Client)
    –  Authenticator (AP)
    –  Authentication Server (RADIUS
       or IAS server)
•  Supplicant and authentication server
   use an EAP type to authenticate
EAP



•  Extensible Authentication Protocol (EAP) is an authentication
   framework
•  802.1X uses various EAP types to authenticate users
     –  Common EAP types used with wireless: TLS, PEAP, TTLS, and
        EAP-FAST
     –  EAP type and configuration can greatly impact the security of the
        wireless network
•  Breakdown of EAP deployments:
     –  80% PEAP and TTLS
     –  15% EAP-FAST or LEAP
     –  5% TLS
Introduction To PEAP and TTLS



•  EAP originally was designed to work over wired networks where
   interception required physical access.
•  Interception is a larger concern on wireless networks.
•  Protected EAP (PEAP) and Tunneled Transport Layer Security
   (TTLS) use TLS to protect legacy authentication protocols from
   interception.
•  Both require a certificate on the RADIUS server for the Supplicant to
   validate server identity.
•  PEAP supports MS-CHAPv2 as the inner authentication method.
•  TTLS supports a large number of inner authentication protocols
   (MS-CHAPv2, CHAP, PAP, etc).
PEAP Using MS-CHAPv2
Importance of TLS Certificate Validation With PEAP




•  Network SSID can be spoofed easily.
•  TLS provides a method for validating the access point
   (Authenticator) and, therefore, the network.
•  Once the certificate from the Authenticator is validated,
   the client passes authentication information to the
   network (Authentication Server).
•  Authentication traffic is protected from eavesdropping by
   the TLS tunnel.
Web Browser SSL/TLS Validation
What happens when your
 wireless client trusts an
    invalid certificate?
Vulnerable PEAP Misconfiguration One



•  Many deployments
   disable all validation
•  PEAP supplicant will trust
   any RADIUS server
How An Attacker Can Exploit This



•  Attacker sets up a fake AP
    –  Mirrors target network’s SSID, encryption type (WPA/WPA2),
       and band (a/b/g/n)
    –  Configures the AP to accept Enterprise authentication
    –  Sets AP to visible
•  Attacker connects the fake AP to the special FreeRADIUS-WPE
   server that captures and records all authentication requests
•  Attacker waits for users to attach to the fake network and captures
   their credentials
    –  Impatient attackers can de-auth clients from the legitimate
       network
•  Attacker cracks the challenge/response pair to recover the password
FreeRADIUS-WPE



•  Josh Wright created the Wireless Pwnage Edition (WPE) patch for
   FreeRADIUS 2.0.2
•  Adds the following features:
    –  Returns success for any authentication requests
    –  Logs all authentication credentials
        •  Challenge/response
        •  Password
        •  Username
    –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5,
       EAP-MSCHAPv2, PAP, CHAP, and others
DEMO
DEMO
Vulnerable PEAP Misconfiguration Two



•  Configuration:
    –  “Validate server certificate”
       is enabled
    –  Default Wireless Zero
       Configuration (WZC)
       settings
    –  Prompts users to validate
       server certificate
         •  Minimal detail is shown
            in the dialog box
•  Attack:
    –  Same attack applies but
       requires users to validate
       the certificate
Vulnerable PEAP Misconfiguration Three


•    Configuration:
      –  “Validate server certificate” is
         enabled
      –  Trusted Root Certificate
         Authority is selected
      –  Does not validate certificate CN!
•    Attack:
      –  Sniffs a valid login and identifies
         the CA of the TLS certificate
      –  Purchases a certificate from the
         trusted CA
           •  Any CN value can be used
      –  Configures the RADIUS server
         to use this certificate
Concerns Around Mobile Devices
If At First You Don’t Succeed



•  Some clients try multiple EAP types while trying to authenticate to a
   wireless network.
    –  Easy for attackers to detect by analyzing a packet capture.
•  Attackers can use this weakness to trick clients into authenticating to
   a fake AP with an insecure EAP type.
    –  Often de-auth floods are used to prevent the client from
       connecting to a legitimate AP.
SECURING WIRELESS
NETWORKS
Encryption and Authentication



•  Use CCMP for encryption
    –  Migrate off TKIP
    –  Never use WEP
•  Use PEAP, TTLS, or TLS for authentication
    –  TLS requires a PKI
    –  Avoid Pre-Shared Keys (PSK)
        •  Anything that is shared is not secure
        •  If you must use PSK, choose a unique SSID and use a
           complex passphrase over 14 characters
Secure the Infrastructure



•  Harden and patch the infrastructure:
    –  Access points
    –  Wireless controllers
    –  Authentication servers
        •  Apply the latest service pack to Windows Internet
           Authentication Service (IAS) servers
•  Do not use hidden access points
•  Make sure insecure EAP types such as MD5 are disabled
•  Prevent insecure clients from using the wireless network
•  Firewall and isolate the wireless network from the internal network
Wireless IDS



•  Consider deploying a wireless IDS
•  Can detect:
    –  De-auth attacks
    –  RTS and CTS denial of service attacks
    –  Rogue APs
         •  Both on and off your wired network
•  Remember IDS is only detection and not prevention
•  Be very careful with wireless IPS
    –  IPS system could end up attacking neighboring networks
•  Wireless IDS will not protect users while traveling
Secure the Clients



•  Require long and complex passwords
•  Apply all patches quickly
    –  Including firmware patches for wireless cards
•  Harden the system
    –  Run Anti-Virus software and keep definitions up to date
    –  Have users login with a non-administrative level account
    –  Encrypt sensitive data on drive
    –  Turned on and configured personal firewall
•  Disable ad-hoc networks
•  Prevent network bridging
•  Ensure the Supplicant is properly configured
Secure WZC PEAP Configuration


•    Ensure the following items are
     configured:
      –  Enable “Validate server
         certificate”
      –  Enable “Connect to these
         servers” and specify the CN of
         the RADIUS server
      –  Under “Trusted Root
         Certificate Authorities” check
         ONLY the CA that issued the
         certificate
      –  Enable “Do not prompt user to
         authorize new servers or
         trusted certification authorities
•    Enforceable through Group Policy
•    Refer to KB941123 for additional
     information
Perform Regular Assessments




                         Act




•  The Shewhart or Deming Cycle, used in Quality Assurance –
   instead of PDCA, it’s Check-Act-Plan-Do when relating to
   security strategy.
•  It’s imperative to perform assessments on a regular basis.
•  Have a third party perform a wireless security assessment.
     •  Ensure the assessment includes architecture and client
         configuration reviews.
QUESTIONS?
For More Information:
       www.SecureState.com
       www.MatthewNeely.com
       @matthewneely

Contenu connexe

Tendances

Cisco acs configuration guide
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guideRichardsCCNA
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepAhmed Abdelwahed
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol AMahmmoud Mahdi
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1Kishore Kumar
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouDouglas Bienstock
 
FreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of LinuxFreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of LinuxJulian Catrambone
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)rinnocente
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Yogeshwaran R
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecturerahuldaredia21
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...DirkjanMollema
 
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceNetwork Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceCloudian
 
OWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsOWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsKaty Anton
 
Creación de certificados digitales con openssl CA local
Creación de certificados digitales con openssl CA localCreación de certificados digitales con openssl CA local
Creación de certificados digitales con openssl CA localHenry Cristian Cuesta Vega
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITMd. Abdul Barek
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing TechniquesAvinash Thapa
 

Tendances (20)

Cisco acs configuration guide
Cisco acs configuration guideCisco acs configuration guide
Cisco acs configuration guide
 
Rap split tunnelv2
Rap split tunnelv2Rap split tunnelv2
Rap split tunnelv2
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
Installing and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by stepInstalling and configuring a dhcp on windows server 2016 step by step
Installing and configuring a dhcp on windows server 2016 step by step
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
 
FreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of LinuxFreeIPA - Attacking the Active Directory of Linux
FreeIPA - Attacking the Active Directory of Linux
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
 
Active directory architecture
Active directory architectureActive directory architecture
Active directory architecture
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
 
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage ServiceNetwork Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
Network Setup Guide: Deploying Your Cloudian HyperStore Hybrid Storage Service
 
OWASP Top 10 Proactive Controls
OWASP Top 10 Proactive ControlsOWASP Top 10 Proactive Controls
OWASP Top 10 Proactive Controls
 
Creación de certificados digitales con openssl CA local
Creación de certificados digitales con openssl CA localCreación de certificados digitales con openssl CA local
Creación de certificados digitales con openssl CA local
 
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-ITPresentation On Group Policy in Windows Server 2012 R2 By Barek-IT
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
 

En vedette

Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
ACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerAli Badr
 
Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Sergio Chiarla
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesBulent Buyukkahraman
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Why Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessWhy Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessDrift
 
The Evolution of Sales Tools
The Evolution of Sales ToolsThe Evolution of Sales Tools
The Evolution of Sales ToolsDrift
 
Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy London Business School
 
The Drift Brand Book
The Drift Brand BookThe Drift Brand Book
The Drift Brand BookDrift
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

En vedette (19)

Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
ACSR Clear Pass Policy Manager
ACSR Clear Pass Policy ManagerACSR Clear Pass Policy Manager
ACSR Clear Pass Policy Manager
 
Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013Presentazione E-commerce Day 12/4/2013
Presentazione E-commerce Day 12/4/2013
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joiningEMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
 
Why Half of You Will Go Out of Business
Why Half of You Will Go Out of BusinessWhy Half of You Will Go Out of Business
Why Half of You Will Go Out of Business
 
The Evolution of Sales Tools
The Evolution of Sales ToolsThe Evolution of Sales Tools
The Evolution of Sales Tools
 
Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy Japan's Abenomics and its implication on Asian economy
Japan's Abenomics and its implication on Asian economy
 
The Drift Brand Book
The Drift Brand BookThe Drift Brand Book
The Drift Brand Book
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similaire à Attacking and Securing WPA Enterprise Networks

Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXCisco Canada
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.pptDEEPAK948083
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Owasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet OverviewOwasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet Overviewowaspindy
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 

Similaire à Attacking and Securing WPA Enterprise Networks (20)

Chapter08
Chapter08Chapter08
Chapter08
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
Unit08
Unit08Unit08
Unit08
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Web security
Web securityWeb security
Web security
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.ppt
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Owasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet OverviewOwasp Indy Q2 2012 Cheat Sheet Overview
Owasp Indy Q2 2012 Cheat Sheet Overview
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Attacking and Securing WPA Enterprise Networks

  • 1. Attacking WPA-Enterprise Wireless Networks By: Matt Neely Presented: March 17, 2010 at NEO InfoSec Forum
  • 2. Speaker Biography •  Matt Neely, CISSP, CTGA, GCIH, and GCWN – Manager of the Profiling Team at SecureState –  Areas of expertise: wireless, penetration testing, physical security, security convergence, and incident response –  Formed and ran the TSCM team at a Fortune 200 company –  Over 10 years of security experience •  Outside of work: –  Co-host of the Security Justice podcast –  Licensed amateur radio operator (Technician) for almost 20 years •  First radio I hacked: –  Fisher-Price Sky Talker walkie talkie
  • 3. SecureState Overview •  Ohio-Based Company CISSP – Certified Information Systems Security –  Founded 2001 Professional CISM – Certified Information Security Manager CISA – Certified Information Systems Auditor •  30+ Security Professionals QDSP – Qualified Data Security Professional GSEC – SANS GIAC Security Essentials NSA INFOSEC Assessment Methodology (IAM) •  Information Assurance & Forensics – NTI, EnCase Protection ANSI X9/TG-3 •  Audit and business background (Big 10) •  Experts in ethical hacking across many specialized areas
  • 4. What You Will Learn Today •  Short history of wireless security •  What is 802.11 Enterprise authentication •  How PEAP works •  How to attack WPA Enterprise networks •  How to defend WPA Enterprise networks
  • 5. Brief History of Wireless •  WEP died over a decade ago •  Cisco released LEAP to make up for the deficiencies in WEP –  Proprietary and susceptible to brute force attacks •  WPA/WPA2 was developed to provide strong encryption and multiple authentication mechanisms
  • 6. Brief History of Wireless - WPA •  WPA/WPA2 encryption and authentication options –  Encryption •  WPA – TKIP (RC4 based algorithm) •  WPA2 – CCMP (AES based algorithm) –  Authentication •  Pre-Shared Key (PSK) Authentication –  Designed for home and small offices –  Anything that uses a shared password is not secure •  Enterprise Authentication –  Uses 802.1X as the authentication framework –  Provides per-user or per-system authentication
  • 7. 802.1X In One Slide •  Provides network access authentication –  EAP provides authentication –  Access point handles encryption (TKIP/CCMP) •  Three components: –  Supplicant (Client) –  Authenticator (AP) –  Authentication Server (RADIUS or IAS server) •  Supplicant and authentication server use an EAP type to authenticate
  • 8. EAP •  Extensible Authentication Protocol (EAP) is an authentication framework •  802.1X uses various EAP types to authenticate users –  Common EAP types used with wireless: TLS, PEAP, TTLS, and EAP-FAST –  EAP type and configuration can greatly impact the security of the wireless network •  Breakdown of EAP deployments: –  80% PEAP and TTLS –  15% EAP-FAST or LEAP –  5% TLS
  • 9. Introduction To PEAP and TTLS •  EAP originally was designed to work over wired networks where interception required physical access. •  Interception is a larger concern on wireless networks. •  Protected EAP (PEAP) and Tunneled Transport Layer Security (TTLS) use TLS to protect legacy authentication protocols from interception. •  Both require a certificate on the RADIUS server for the Supplicant to validate server identity. •  PEAP supports MS-CHAPv2 as the inner authentication method. •  TTLS supports a large number of inner authentication protocols (MS-CHAPv2, CHAP, PAP, etc).
  • 11. Importance of TLS Certificate Validation With PEAP •  Network SSID can be spoofed easily. •  TLS provides a method for validating the access point (Authenticator) and, therefore, the network. •  Once the certificate from the Authenticator is validated, the client passes authentication information to the network (Authentication Server). •  Authentication traffic is protected from eavesdropping by the TLS tunnel.
  • 12. Web Browser SSL/TLS Validation
  • 13. What happens when your wireless client trusts an invalid certificate?
  • 14. Vulnerable PEAP Misconfiguration One •  Many deployments disable all validation •  PEAP supplicant will trust any RADIUS server
  • 15. How An Attacker Can Exploit This •  Attacker sets up a fake AP –  Mirrors target network’s SSID, encryption type (WPA/WPA2), and band (a/b/g/n) –  Configures the AP to accept Enterprise authentication –  Sets AP to visible •  Attacker connects the fake AP to the special FreeRADIUS-WPE server that captures and records all authentication requests •  Attacker waits for users to attach to the fake network and captures their credentials –  Impatient attackers can de-auth clients from the legitimate network •  Attacker cracks the challenge/response pair to recover the password
  • 16. FreeRADIUS-WPE •  Josh Wright created the Wireless Pwnage Edition (WPE) patch for FreeRADIUS 2.0.2 •  Adds the following features: –  Returns success for any authentication requests –  Logs all authentication credentials •  Challenge/response •  Password •  Username –  Performs credential logging on PEAP, TTLS, LEAP, EAP-MD5, EAP-MSCHAPv2, PAP, CHAP, and others
  • 17. DEMO
  • 18. DEMO
  • 19. Vulnerable PEAP Misconfiguration Two •  Configuration: –  “Validate server certificate” is enabled –  Default Wireless Zero Configuration (WZC) settings –  Prompts users to validate server certificate •  Minimal detail is shown in the dialog box •  Attack: –  Same attack applies but requires users to validate the certificate
  • 20. Vulnerable PEAP Misconfiguration Three •  Configuration: –  “Validate server certificate” is enabled –  Trusted Root Certificate Authority is selected –  Does not validate certificate CN! •  Attack: –  Sniffs a valid login and identifies the CA of the TLS certificate –  Purchases a certificate from the trusted CA •  Any CN value can be used –  Configures the RADIUS server to use this certificate
  • 22. If At First You Don’t Succeed •  Some clients try multiple EAP types while trying to authenticate to a wireless network. –  Easy for attackers to detect by analyzing a packet capture. •  Attackers can use this weakness to trick clients into authenticating to a fake AP with an insecure EAP type. –  Often de-auth floods are used to prevent the client from connecting to a legitimate AP.
  • 24. Encryption and Authentication •  Use CCMP for encryption –  Migrate off TKIP –  Never use WEP •  Use PEAP, TTLS, or TLS for authentication –  TLS requires a PKI –  Avoid Pre-Shared Keys (PSK) •  Anything that is shared is not secure •  If you must use PSK, choose a unique SSID and use a complex passphrase over 14 characters
  • 25. Secure the Infrastructure •  Harden and patch the infrastructure: –  Access points –  Wireless controllers –  Authentication servers •  Apply the latest service pack to Windows Internet Authentication Service (IAS) servers •  Do not use hidden access points •  Make sure insecure EAP types such as MD5 are disabled •  Prevent insecure clients from using the wireless network •  Firewall and isolate the wireless network from the internal network
  • 26. Wireless IDS •  Consider deploying a wireless IDS •  Can detect: –  De-auth attacks –  RTS and CTS denial of service attacks –  Rogue APs •  Both on and off your wired network •  Remember IDS is only detection and not prevention •  Be very careful with wireless IPS –  IPS system could end up attacking neighboring networks •  Wireless IDS will not protect users while traveling
  • 27. Secure the Clients •  Require long and complex passwords •  Apply all patches quickly –  Including firmware patches for wireless cards •  Harden the system –  Run Anti-Virus software and keep definitions up to date –  Have users login with a non-administrative level account –  Encrypt sensitive data on drive –  Turned on and configured personal firewall •  Disable ad-hoc networks •  Prevent network bridging •  Ensure the Supplicant is properly configured
  • 28. Secure WZC PEAP Configuration •  Ensure the following items are configured: –  Enable “Validate server certificate” –  Enable “Connect to these servers” and specify the CN of the RADIUS server –  Under “Trusted Root Certificate Authorities” check ONLY the CA that issued the certificate –  Enable “Do not prompt user to authorize new servers or trusted certification authorities •  Enforceable through Group Policy •  Refer to KB941123 for additional information
  • 29. Perform Regular Assessments Act •  The Shewhart or Deming Cycle, used in Quality Assurance – instead of PDCA, it’s Check-Act-Plan-Do when relating to security strategy. •  It’s imperative to perform assessments on a regular basis. •  Have a third party perform a wireless security assessment. •  Ensure the assessment includes architecture and client configuration reviews.
  • 30. QUESTIONS? For More Information: www.SecureState.com www.MatthewNeely.com @matthewneely