Evil twin

21
EvilTwin Sanoop Thomas @s4n7h0 Null Mumbai Chapter

Transcript of Evil twin

Page 1: Evil twin

EvilTwinSanoop Thomas

@s4n7h0

Null Mumbai Chapter

Page 2: Evil twin

Agenda

• WiFi Security Evolution• How system talks in WiFi• Threats in Hotspot • EvilTwin Attacks • Countermeasures

Page 3: Evil twin

WiFi Security – A Century Back

Source : theatlantic.com/tech.......

“There was a young fellow of Italy, who diddled the public quite prettily…”

Page 4: Evil twin

WiFi Security – A Century After

A heart defibrillator remotely controlled by a villainous hacker to trigger a fatal heart attack

Source : gao.gov/prod...

Page 5: Evil twin

Technical Aspects

• To see the invisible..– Packet sniffer– Packet injector

• “Weapon”ising– Aircrack-ng Suite• Developed by Thomas d'Otreppe

– ALFA AWSUS036H• Provides 1 wattage • Can be extended

Page 6: Evil twin

Life Connected with WiFi

• Hotspots– Open Authentication– Central login portal– Authentication by SMS token– May have MAC filtering

Page 7: Evil twin

WiFi Handshake

ESSID : MyWiFiBSSID : AA:AA:AA:AA:AA:AA

ESSID : MyWiFiBSSID : BB:BB:BB:BB:BB:BB

Probe Request

Beacon/Probe ResponseESSID: MyWiFi BSSID: AA:AA:AA:AA:AA:AAESSID: MyWiFi BSSID: BB:BB:BB:BB:BB:BB

Authentication RequestBSSID: AA:AA:AA:AA:AA:AA, Auth Algo, SEQ, Status Code

Authentication ResponseBSSID: AA:AA:AA:AA:AA:AA, Auth Algo, SEQ, Status Code

Association RequestBSSID: AA:AA:AA:AA:AA:AA, Privacy info

Association ResponseBSSID: AA:AA:AA:AA:AA:AA, Status Code

Who is over there ? I’m here

Hi

Hello

Can we talk ?

Yeah, surely

Page 8: Evil twin

WiFi Handshake – Packet View

Page 9: Evil twin

EvilTwin

• Replica with radically inverted moralities• Can be physical or logical

Page 10: Evil twin

Making EvilTwin with “MyWiFi”

Page 11: Evil twin

Take a close look at real APmon0

at0

Page 12: Evil twin

Concept of Bridge

• All mobile devices will be connected to mon0• mon0 will be connected to at0• at0 should be bridged with eth0• eth0 can connect to the internet

Page 13: Evil twin

Bridging the Interfaces

Page 14: Evil twin

Eavesdropping

Page 15: Evil twin

Network Redirection

• All mobile’s internet access can be redirected to the attackers’ machine

Page 16: Evil twin

Challenges

• The attackers’ machine is not running abc.com• Concept of proxy

Page 17: Evil twin

Proxy interception

Page 18: Evil twin

Information Stealing

Page 19: Evil twin

Further Attacks on Mobile Devices

Page 20: Evil twin

Countermeasures

• We are talking about Client Side protection • Keep a constant check on the saved WiFi

profiles• Verify WiFi Profiles with “autoconnect” enable• Make sure the mobile devices are updated

with security patches

Page 21: Evil twin

Thanks