76
Advanced Wi-Fi Attacks Using Commodity Hardware Mathy Vanhoef @vanhoefm BruCON, Belgium, 3 October 2018

Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Advanced Wi-Fi Attacks Using

Commodity HardwareMathy Vanhoef — @vanhoefm

BruCON, Belgium, 3 October 2018

Page 2: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Background

› Wi-Fi assumes each stations behaves fairly

› With special hardware we don’t have to

Continuous jamming: channel unusable

Selective jamming: block specific packets

2

Page 3: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Background

› Wi-Fi assumes each stations behaves fairly

› With special hardware we don’t have to

Continuous jamming: channel unusable

Selective jamming: block specific packets

3

>$4000

Page 4: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Research: use cheap hardware?

Small 15$ USB sufficient to:

› Testing selfish behavior in practice

› Continuous & selective jamming

› Enables reliable manipulation of encrypted traffic

4

Page 5: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Research: use cheap hardware?

Attacks are cheaper than expected!

› We should be able to detect them.

5

>$4000 ~$20

Page 6: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Impact of selfish behavior?

Implement & Test!

6

Page 7: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

7

In use

Page 8: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

1. SIFS: let hardware process the frame

8

In use SIFS

Page 9: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

1. SIFS: let hardware process the frame

2. AIFSN: depends on priority of the frame

9

In use SIFS AIFSN

Page 10: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

1. SIFS: let hardware process the frame

2. AIFSN: depends on priority of the frame

3. Random backoff: avoid collisions

10

In use SIFS AIFSN Backoff

Page 11: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

1. SIFS: let hardware process the frame

2. AIFSN: depends on priority of the frame

3. Random backoff: avoid collisions

4. Send the packet

11

In use SIFS AIFSN Backoff Packet 2

Page 12: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

Manipulate by modifying Atheros firmware:

› Disable backoff

› Reducing AIFSN

› Reducing SIFS

12

In use SIFS AIFSN Backoff Packet 2

Page 13: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Steps taken to transmit a frame:

Manipulate by modifying Atheros firmware:

› Disable backoff

› Reducing AIFSN

› Reducing SIFS

13

In use SIFS AIFSN Backoff Packet 2

Optimal strategy

From 14 to 37 Mbps

Reduces throughput

Page 14: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How to control radio chip?

Using memory mapped registers

› Disable backoff:

int *GBL_IFS_MISC = (int*)0x10F0;

*GBL_IFS_MISC |= IGNORE_BACKOFF;

› Reset AIFSN and SIFS:

int *AR_DLCL_IFS = (int*)0x1040;

*AR_DLCL_IFS = 0;

14

Page 15: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

We can’t we just modify the driver?

15

WiFi Dongle

CPUradio

chip

Main machine

Userspace

Operating

System

Driver

Code runs on CPU of dongle

Firmware control needed

USB

Page 16: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Countermeasures

DOMINO defense

system reliably detects

this selfish behavior [1].

16

Page 17: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

What if there are multiple selfish stations?

› In a collision, both frames are lost

17

Page 18: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

What if there are multiple selfish stations?

› In a collision, both frames are lost

› Capture effect: in a collision, frame with the best signal and

lowest bitrate is decoded

Similar to FM radioDemo: The Queen station generally

“wins” the collision with other stations.

18

Page 19: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

FM Radio Demo

19

Page 20: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selfish Behavior

Attack can abuse capture effect

› Selfish clients will lower their bitrate to beat other selfish

stations!

› Until this gives no more advantage

To increase throughput, bitrate is lowered!

Other station = background noise

20

Page 21: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Continuous jammer

Want to build a continuous jammer

› Instant transmit: disable carrier sense

› No interruptions: queue infinite #packets

Frames to be transmitted are in a linked list:

21

Frame 1radio

chip …Frame 2

Page 22: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Continuous jammer

Want to build a continuous jammer

› Instant transmit: disable carrier sense

› No interruptions: queue infinite #packets

Frames to be transmitted are in a linked list:

22

Frame 1radio

chip …Frame 2

Infinite list!

Page 23: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Continuous Jammer

Experiments

› Only first packet visible in monitor mode!

› Other devices are silenced.

23

Default antenna gives range of ~80 meters

Amplifier gives rangeof ~120 meters

Page 24: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Demo: continuous jammer

Demo: continuous jammer

24

Page 25: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Rapsberry Pi Supported!

25

Page 26: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Practical Implications

Devices in 2.4 and 5 GHz band?

26

› Home automation

› Industrial control

› Internet of Things

› …

Can all easily be jammed!

Page 27: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Practical Implications

Devices in 2.4 and 5 GHz band?

27

Page 28: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Practical Implications

Devices in 2.4 and 5 GHz band?

28

Page 29: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Not just wild speculation …

29

$45 Chinese jammer to prevent

cars from being locked [4]

GPS jammer to disable anti-theft

tracking devices in stolen cars [5]

Disable mobile phone service after

cutting phone and alarm cables [6]

Page 30: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selective Jammer

Decides, based on the header,

whether to jam the frame

30

Page 31: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How does it work?

1. Detect and decode header

31

Physical packet

Detect

Page 32: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How does it work?

1. Detect and decode header

2. Abort receiving current frame

32

Physical packet

Detect Init

Page 33: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How does it work?

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

33

Physical packet

Detect Init Jam

Page 34: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How does it work?

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

34

Physical packet

Detect Init Jam

Easy

Page 35: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

How does it work?

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

35

Physical packet

Detect Init Jam

Easy

Hard

Page 36: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Detecting frame headers?

Can read header of frames still in the air!

36

RAM

DMA

Internal

CPU

while(recvbuff[0] == 0): pass

radio

chipDecode physical WiFi signal

Page 37: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

In practice

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

37

Poll memory until data is being written:

Timeout Detect incoming packet

Page 38: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

In practice

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

38

Probe request or beacon?

buff + 10: sender of packet

source : target MAC address

Page 39: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

In practice

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

39

Set specific bit in register

Page 40: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

In practice

1. Detect and decode header

2. Abort receiving current frame

3. Inject dummy packet

40

TXE: Transmit (TX) enable (E)

Pointer to dummy packet

Page 41: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selective Jammer: Reliability

Jammed beacons with many devices/positions

How fast can it react?

› Position of first mangled byte?

› 1 Mbps beacon in 2.4 GHz: position 52

› 6 Mbps beacon in 5 GHz: position 88

Context: MAC header is 34 bytes

41

Page 42: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Selective Jammer: Reliability

Jammed beacons with many devices/positions

Conclusion

› 100% reliable jammer not possible

› Medium to large packets can be jammed

› Surprising this is possible with a limited API!

42

Page 43: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Demo: selective jammer

Demo: jammin’ beacons

43

Page 44: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Code is online (and got updates)

Virtual Machine:

github.com/vanhoefm/modwifi

44

Page 45: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Using your mobile phone

Schulz & co: jamming using mobile phones [9]

45

Nexus 5

+

=

github.com/seemoo-lab/wisec2017_nexmon_jammer

Page 46: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Impact on higher-layers

46

What if we could

reliably manipulate

encrypted traffic?

We could attack WPA-TKIP

Page 47: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Impact on higher-layers

47

What if we could

reliably manipulate

encrypted traffic?

We could attack WPA-TKIP

We can break WPA2

Page 48: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Breaking WPA2

48

Key Reinstallation Attacks (KRACKs)

› Block & delay handshake frames

› Jammers can block packets!

› Or help with getting a MitM

Page 49: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

WPA2 uses a 4-way handshake

Used to connect to any protected Wi-Fi network

49

Negotiates fresh PTK:

pairwise transient keyMutual authentication

Page 50: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Channel 1

50

KRACK Attack

Channel 6

Jam AP on channel 6

victim will use channel 1

Page 51: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

51

KRACK Attack

Page 52: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

52

KRACK Attack

PTK = Combine(shared secret,

ANonce, SNonce)

Page 53: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

53

KRACK Attack

Block Msg4

Page 54: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

54

KRACK Attack

Block Msg4

Page 55: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

55

KRACK Attack

PTK is installed &

nonce set to zeroBlock Msg4

Page 56: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Block Msg4

56

KRACK Attack

Page 57: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

57

KRACK Attack

Page 58: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

58

KRACK Attack

Page 59: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

59

KRACK Attack

In practice Msg4

is sent encrypted

Page 60: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

60

KRACK Attack

Page 61: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

61

KRACK Attack

Key reinstallation:

nonce again reset!

Page 62: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

62

KRACK Attack

Page 63: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

63

KRACK Attack

Encrypted data can

now be exchanged

Page 64: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Quick background: encryption

64

Plaintext data

Nonce reuse implies keystream reuse (in all WPA2 ciphers)

Nonce

MixPTK(session key)

Nonce(packet number)

Packet key

Page 65: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

65

KRACK Attack

Next frame reuses

previous nonce!

Page 66: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

66

KRACK Attack

Keystream

Page 67: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

67

KRACK Attack

Keystream

Decrypted!

Page 68: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Conclusion

› Jamming is cheap

› Selective jamming also possible

› Can even use mobile phone!

› Facilitates KRACK attacks

68

Page 69: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Questions?github.com/vanhoefm/modwifi

Thank you!

Page 70: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

References

1. M. Raya, J.-P. Hubaux, and I. Aad. DOMINO: a system to detect greedy behavior in EEE 802.11 hotspots. In MobiSys, 2004.

2. M. Vanhoef and F. Piessens. Practical verification of WPA-TKIP vulnerabilities. In ASIACCS, 2013.

3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC, 2014.

4. C. Cox. Hi-tech car thieves hit the streets with £30 jamming devices bought over the internet. In Manchester Evening News, 2014.

5. C. Arthur. Car thieves using GPS 'jammers'. In The Guardian, 2010.

6. J. Weiner. High-tech thieves used phone-jammer in $74k sunglass heist, cops say. In Orlando Sentinel, 2011.

7. P. Dandumont. Don’t trust geolocation! Retrieved 5 October, 2015, from journaldulapin.com/2013/08/26/dont-trust-geolocation/

8. Gollakota et al. They can hear your heartbeats: non-invasive security for implantable medical devices. In SIGCOMM, 2011.

9. Schulz et al. Massive Reactive Smartphone-Based Jamming using Arbitrary Waveforms and Adaptive Power Control. In WiSec, 2017.

10. M. Vanhoef and F. Piessens. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In ACM CCS, 2017.

70

Page 71: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Multi-channel MitM also enables other attacks

71

Attacking broadcast TKIP

› Block MIC failures

› Modify encrypted frames

Traffic Analysis

› Capture all encrypted frames

› Block certain encrypted frames

Page 72: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

Multi-channel MitM also enables other attacks

72

Exploit implementation bugs

› Block certain handshake messages

› E.g. bugs in 4-way handshake

Specialized attack scenarios

› E.g. modify advertised capabilities

› See [X] for details

Page 73: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

1. Attack Wi-Fi Geolocation

Location determined by nearby SSIDs

Geolocation attack [7]

› Inject SSIDs of another location

› Problem: can only spoof locations with more APs

› Solution: selectively jam nearby Aps

Never blindly trust Wi-Fi geolocation!

73

Page 74: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

2. Use as a defense system

Use jamming to protect a network

› Selectively jam rouge APs

› Wearable shield to protect medical implants

that constantly sends jamming signal [8]

› … (it’s an active research topic)

74

Page 75: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

2. Use as a defense system

Legal aspects are unclear

Blocking personal hotspots:

› Done by Marriott and Smart City Holdings

› Complaint was filled to the FCC

› Settled for fine of $600,000 and $750,000

75

Is blocking malicious or

rogue hotspots legal?

Page 76: Advanced Wi-Fi Attacks Using Commodity Hardware › brucon2018-slides.pdf · 2020-01-10 · 3. M. Vanhoef and F. Piessens. Advanced Wi-Fi attacks using commodity hardware. In ACSAC,

DOMINO defense system

Also capable of detecting selective jammers

› Assumes MAC header is still valid

› Attacker has low #(corrupted frames)

› Thrown of the network

Unfortunately it’s flawed

› Jammer (corrupted) frames are not authenticated

› We can pretend that a client is jamming others

76