Penetration Testing mailing list archives

Re: Wireless Pent-Test


From: Seth Fogie <seth () fogieonline com>
Date: Mon, 06 Oct 2003 16:25:08 -0400

Joshua Wright did the LEAP research, which was shown as part of a panel at Defcon 11. At the same panel Anton Rager illustrated how one can insert their own traffic into a WEP encrypted network to port scan the WLAN, and even in theory create a reverse connection back through a firewall by spoofing the source address of the inserted packets ...and this is without decrypting WEP. So basically, even with VPN, user auth, MAC filtering, dynamic keying, rules based firewall controlling in AND out traffic, and LO-Jack on your WLAN enabled devices...and you still cant be 100% secure. In addition, another attack was alluded to that was supposed to turn WLAN security upside down. Still waiting for that one!

Seth!

R. DuFresne wrote:

there was a FD posting last week that indicated that cisco's LEAP was also
insecure and borked.

The thing is, a wireless lan should be considered untrustworthy, or at
least untrusted, all traffic into the wired net has to be tunneled and
safely wrapped in encryption, and  there has to be a better auth mech to
allow the tunnel access thn what is provided in simple AP/laptop setups.
Network Mag had some interesting articles lately, one in July mentioneing
some newer AP gateway systems coming into play, but, they are not cheap,
and not for small to medium biz folks.

Our impression, and mirroed by lawerence livermore, wireless is not  ready
for  prime time play.

Thanks,

Ron DuFresne

On Mon, 6 Oct 2003, Matthew Leeds wrote:

OK, I keep hearing about how simple it is to crack WEP using a variety of tools. I also keep hearing that some WLAN hardware manfacturers 
have modified their firmware to eliminate the generation of 'weak' WEP keys. Has anyone investigated this sufficiently to 
authortatively discuss whether the 'removal' of weak keys reduces/eliminates the risk of WEP? Whether it renders the current 
generation of tools for cracking WEP ineffective?

Some references:
http://www.agere.com/NEWS/PRESS2001/111201b.html
http://www.ydi.com/deployinfo/wp-wep-plus.php

---Matthew
*********** REPLY SEPARATOR  ***********

On 10/6/2003 at 5:09 PM Daniel Nylander wrote:

Getting the WEP-key from a WLAN is "pretty" simple.
Download airsnort, wepcrack, kismet and other usefull tools.. then capture
enough packets to wepcrack and .. voila!

Daniel

----- Original Message ----- From: "Cesar Diaz" <cesadiz () yahoo com>
To: <pen-test () securityfocus com>
Sent: Sunday, October 05, 2003 3:16 AM
Subject: Wireless Pent-Test


Remote users in my company have been begging for permission to use
wireless NICs in their laptops for awhile now.  When they are not on the
road, most of them work from home and would like to be able to use their
laptops anywhere in their house.
Due to our industry and business requierements, we have to document every
process and method used to access our data and prove that we've tested the
security of our data.In order to let the users go wireless I have to show
that I've tested the security on a wireless network.
 Our idea is to let the users buy wireless routers to connect to their
cable/dsl routers and then wireless PCMCIA or USB cards on the laptop.  We
would implement 128 bit WEP security to prevent unauthorized access.  I
realize that WEP does not provide for stringent security, but we feel that
by forcing users to change their WEP key regularly we can meet our
requierements.
My question is, how do I test WEP and document wether or not it's secure?
Any way to sniff for WEP keys, or to brute force attack a WEP session?  If
there is, how hard is it to set up?  How much of a risk of a wireless
connection with WEP enabled to be comprimised other than a dedicated, brute
force attack?
Any information is greatly appreciated.


Cesar


--------------------------------------------------------------------------
-
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2

--------------------------------------------------------------------------
--

---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------





---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------


Current thread: