Evil twin
-
Upload
sanoop-thomas -
Category
Technology
-
view
86 -
download
1
Transcript of Evil twin
![Page 1: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/1.jpg)
EvilTwinSanoop Thomas
@s4n7h0
Null Mumbai Chapter
![Page 2: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/2.jpg)
Agenda
• WiFi Security Evolution• How system talks in WiFi• Threats in Hotspot • EvilTwin Attacks • Countermeasures
![Page 3: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/3.jpg)
WiFi Security – A Century Back
Source : theatlantic.com/tech.......
“There was a young fellow of Italy, who diddled the public quite prettily…”
![Page 4: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/4.jpg)
WiFi Security – A Century After
A heart defibrillator remotely controlled by a villainous hacker to trigger a fatal heart attack
Source : gao.gov/prod...
![Page 5: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/5.jpg)
Technical Aspects
• To see the invisible..– Packet sniffer– Packet injector
• “Weapon”ising– Aircrack-ng Suite• Developed by Thomas d'Otreppe
– ALFA AWSUS036H• Provides 1 wattage • Can be extended
![Page 6: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/6.jpg)
Life Connected with WiFi
• Hotspots– Open Authentication– Central login portal– Authentication by SMS token– May have MAC filtering
![Page 7: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/7.jpg)
WiFi Handshake
ESSID : MyWiFiBSSID : AA:AA:AA:AA:AA:AA
ESSID : MyWiFiBSSID : BB:BB:BB:BB:BB:BB
Probe Request
Beacon/Probe ResponseESSID: MyWiFi BSSID: AA:AA:AA:AA:AA:AAESSID: MyWiFi BSSID: BB:BB:BB:BB:BB:BB
Authentication RequestBSSID: AA:AA:AA:AA:AA:AA, Auth Algo, SEQ, Status Code
Authentication ResponseBSSID: AA:AA:AA:AA:AA:AA, Auth Algo, SEQ, Status Code
Association RequestBSSID: AA:AA:AA:AA:AA:AA, Privacy info
Association ResponseBSSID: AA:AA:AA:AA:AA:AA, Status Code
Who is over there ? I’m here
Hi
Hello
Can we talk ?
Yeah, surely
![Page 8: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/8.jpg)
WiFi Handshake – Packet View
![Page 9: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/9.jpg)
EvilTwin
• Replica with radically inverted moralities• Can be physical or logical
![Page 10: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/10.jpg)
Making EvilTwin with “MyWiFi”
![Page 11: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/11.jpg)
Take a close look at real APmon0
at0
![Page 12: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/12.jpg)
Concept of Bridge
• All mobile devices will be connected to mon0• mon0 will be connected to at0• at0 should be bridged with eth0• eth0 can connect to the internet
![Page 13: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/13.jpg)
Bridging the Interfaces
![Page 14: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/14.jpg)
Eavesdropping
![Page 15: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/15.jpg)
Network Redirection
• All mobile’s internet access can be redirected to the attackers’ machine
![Page 16: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/16.jpg)
Challenges
• The attackers’ machine is not running abc.com• Concept of proxy
![Page 17: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/17.jpg)
Proxy interception
![Page 18: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/18.jpg)
Information Stealing
![Page 19: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/19.jpg)
Further Attacks on Mobile Devices
![Page 20: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/20.jpg)
Countermeasures
• We are talking about Client Side protection • Keep a constant check on the saved WiFi
profiles• Verify WiFi Profiles with “autoconnect” enable• Make sure the mobile devices are updated
with security patches
![Page 21: Evil twin](https://reader034.fdocuments.in/reader034/viewer/2022042821/55d30a58bb61ebe0278b466f/html5/thumbnails/21.jpg)
Thanks