25 December 2011

Surveillance

Once the wireless target has been identified, the attacker can proceed to gather information about the network using tools like kismet or airodump. Data gathered can be saved into pcap format for subsequent offline analysis. 

If the traffic stream is not encrypted, immediately the attacker could look at the traffic stream and identify the network parameters (e.g. MAC address, IP address range, gateway etc) from the traffic.

If the traffic stream is WEP encrypted, there are also WEP crackers which are available  for  him.  In  this  case,  airodump  is  used  to  gather  all  the  encrypted packets transmitted and aircrack (shown below) is then used to try to crack the WEP key given enough WEP IVs that are gathered.


In cases where there isn’t sufficient traffic on the network, packet injection tools like WEPWedgie can be employed to  insert  arbitrary  traffic  into  the  WEP  encrypted  network.  This  will  solicit responses from the network, which can then be collected and send for WEP key cracking. This is made possible because in WEP implementation, as long as one obtains the keystream used for the XOR operation using a single IV value, one can effectively reuse the same IV for all subsequent communications. To obtain a single keystream that corresponds to a particular IV, one has to look for a known plaintext and a corresponding ciphertext in the network. Using that, one can then perform an XOR operation to obtain the keystream used to encrypt the packet. One example where you’ll find the plaintext and its corresponding ciphertext is when  a  wireless  client is  authenticating to the  access  point  using  shared  key authentication.

Even  when  you  are  unable to  get the  shared  key  authentication traffic  on the network, tools like Chopchop which makes use of the access point to help it decrypt 1 WEP encrypted packet at a time without knowing the WEP key is available.





reference:
-Christopher Low, 13 April 2005, Understanding Wireless Attacks and Detection, SANS Institute InfoSec Reading Room 
-Quequero, 'How to Attack a WEP/WPA Protected Wireless Network

0 comments:

Post a Comment