CIPS CompSEC SIG

29
CIPS CompSEC SIG Feb 20, 2003 Speech by Renderman [email protected]

description

CIPS CompSEC SIG. Feb 20, 2003 Speech by Renderman [email protected]. Wardriving Edmonton Results. “It’s not a bug, it’s a feature”. Technology Background. 802.11b Spread Spectrum 2.4Ghz – License free 11 channels, 2.412 –2.462 GHz 11Mbps - PowerPoint PPT Presentation

Transcript of CIPS CompSEC SIG

Page 1: CIPS CompSEC SIG

CIPS CompSEC SIG

Feb 20, 2003

Speech by Renderman

[email protected]

Page 2: CIPS CompSEC SIG

Wardriving Edmonton Results

“It’s not a bug, it’s a feature”

Page 3: CIPS CompSEC SIG

Technology Background

• 802.11b– Spread Spectrum– 2.4Ghz – License free– 11 channels, 2.412 –2.462 GHz– 11Mbps– 40, 64, 128 bit WEP Encryption, MAC filtering– SSID – logical network name– Cellular nature

• Wi-Fi Alliance– Founded 1999, Certifies devices for compliance

Page 4: CIPS CompSEC SIG

Technology Background

• Various features among different models• Usually have DHCP server, MAC filtering, WEP• Wi-Fi is designed to ‘roam’ to strongest signal• Many different manufacturers and many brands

– Dlink– Linksys– Cisco– Apple– M$

Page 5: CIPS CompSEC SIG

Which brings us to today..

• 802.11b is a multi billion Dollar industry– $1.546 Billion in 2002– Set to rise (or fall, depending on the report)

• Prices falling dramatically• Many laptops/PDA’s Wi-Fi enabled from

the factory• Airports, Airplanes, Café’s, Hotels• Very pervasive, very chic, ‘hot’ technology

Page 6: CIPS CompSEC SIG

Enough marketing and history

Time for the realities

Page 7: CIPS CompSEC SIG

What is ‘Wardriving’

• WarDriving v. The benign act of locating and logging

wireless access points while in motion. - Blackwave • A.k.a, Network stumbling, lanjacking(?), whacking(?)

• Using a Wi-Fi enabled device (laptop, PDA), to discover the presence of wireless networks.

• Factory software allows rudimentary ‘stumbling’

• First coined and automated by Pete Shipley of Dis.org

• Completely LEGAL!

• Frighteningly effective

Page 8: CIPS CompSEC SIG

Wardriving is not a crime

• Detection is legal – public frequencies

• Connecting is illegal

• ‘Stumbler Ethic’

• Trying to raise security awareness with the Worldwide Wardrive

• Bad people do bad thing, Wardrivers are not bad people

Page 9: CIPS CompSEC SIG

Edmonton, Alberta as of Feb 2nd 2003, 1689 Access points

Page 10: CIPS CompSEC SIG

Downtown and University Detail

Page 11: CIPS CompSEC SIG

Downtown Detail

Page 12: CIPS CompSEC SIG

Edmonton Statistics

Since March 2002– 1689 separate Access points detected– 1194 without WEP (not necessarily insecure)– 600 on default settings (very insecure)

• In the strangest of places– Hospitals, health facilities, gov’t, hotels,

trucking companies, breweries, homes, oil companies, schools, cafes….

Page 13: CIPS CompSEC SIG

Wireless Intruder Implications

• Bandwidth theft

• Spamming, threats, attacks

• All tracks lead back to you

• Access to your internal network

• Untraceable

• Easy to do, cheap

Page 14: CIPS CompSEC SIG

Edmonton Survey Conclusions

• After 11 months and a lot of miles, no one has learned anything

• No-one is paying attention

• Wireless is popular even in the frozen north

• ‘It can’t happen here’ attitude

• Severe lack of understanding

• There is an interest in learning though

Page 15: CIPS CompSEC SIG

Now that I have your attention…

How is this accomplished?

Page 16: CIPS CompSEC SIG

Wardriving made easy

• Laptop or PDA• 802.11b card• Special software that supports the card

(Netstumbler or Kismet)• Some form of conveyance (feet, bike, car, etc)• Optional:

– External antennas (Pringles can)– GPS for generating maps– Misc software (realtime tracking, routing)

Page 17: CIPS CompSEC SIG

Passive Vs Active

• Netstumbler – Active, Listens for ‘Broadcast’ announcements ~10 per second)

• Kismet – Passive, Listens for any 802.11b traffic and determines network settings from packet capture. Able to detect ‘cloaked’ AP’s (SSID broadcast turned off)

• Both Free (as in beer)

• Both useful as site survey tools, used throughout the industry

Page 18: CIPS CompSEC SIG

The RenderVan Wardriving Rig

Page 19: CIPS CompSEC SIG

The problems with Wi-Fi

• No one RTFM’s

• AP’s left on defaults

• WEP – unsafe at any key length

• Inappropriate deployment

• ‘Rougue’ AP’s

• It’s a bloomin RADIO!

Page 20: CIPS CompSEC SIG

RTFM

• Buried security warnings and instructions

• No deployment warnings

• Manufacturers ignoring problem, bad for sales

Page 21: CIPS CompSEC SIG

Defaults

• 36% of AP’s in Edmonton on Default, ‘out of box’ settings

• ‘It works, don’t screw with it’ attitude

• Quick start Guides ignore security

Page 22: CIPS CompSEC SIG

Demo

Default access point

Page 23: CIPS CompSEC SIG

Wired equivalency protocol

• Uses RC4• Export restrictions kept key at 40bit, very weak 64bit later

on• Proprietary extensions for 128bit, incompatible between

manufacturers, making for headaches and users ignoring it• Static Key• Found weak in July 2001• Fluhrer, Mantin, and Shamir (‘S’ in RSA) Broke RC4 in

August 2001 which lead to…• Airsnort : 30 seconds + 2 gig of data = WEP Key

Page 24: CIPS CompSEC SIG

Deployment problems

• Often behind firewalls and other security devices on the ‘Trusted’ side of the network

• Should be treated as a wall jack; Would you run cat5 to the parking lot?

• Current implementation makes security hard to maintain (rotating keys, updating MAC filters)

• Attitudes: ‘No one would want to break in here’, ‘No one will find me’, ‘Security costs too much’

Page 25: CIPS CompSEC SIG

Rogue AP’s

• Employee’s being ‘helpful’, or ‘creative’

• IT staff unaware, not caring

• No company policies, or no enforcment

• No IT auditing – ‘rouge hunting’

• Often on defaults (ID10T errors)

• Geewhiz factor for the boss

Page 26: CIPS CompSEC SIG

It’s a RADIO!!!

• Broadcasts far beyond walls and property• If WEP not enabled, data is sent in the clear• Email, database queries, FTP, messenger…• Data sent in all directions• Long distance detection <25 miles• Long distance connection <5miles• All Wi-Fi gear is a Tx & Rx• Wi-Fi is ‘cellular’ in nature, designed to associate

with the strongest signal (even if it’s not yours)

Page 27: CIPS CompSEC SIG

Suggestions

• Set a company policy on Wireless and enforce it• Use WEP at a minimum – Keep out sign• EAP (Extensible Authentication Protocol), Cisco• RADIUS, 802.1x, VPNs• Audit network from wired side• Audit network from wireless side• Locate AP’s in front of firewall, captive portal or

other authentication (RADIUS, etc)• Hire professionals for installation and advice

Page 28: CIPS CompSEC SIG

Sites

• www.renderlab.net - Edmonton and Alberta wardriving

• www.dis.org/wl/maps/ - Pete shipleys original research

• www.netstumbler.com - Active wardriving software

• www.kismetwireless.net - Passive wardriving software

• www.wardrivingisnotacrime.com - Fashions by Blackwave

• www.worldwidewardrive.org - We have our own event

• www.wardriving.com - General resource

• forums.netstumbler.com – My hangout, great info & ppl

Page 29: CIPS CompSEC SIG

Q & A

Questions, comments, and accusations