COMMAND
Wireless Lans
SYSTEMS AFFECTED
Wireless Lans
PROBLEM
Russell Handorf posted following. Traditional authentication
with wireless lan's consist of the following simplified procedure:
1). Wireless nic asks for an IP
2). Base station checks to see if the MAC Address can be passed.
3). If the authentication is successful then the DHCP server
leases an IP to the Wireless nic.
For sniffing onto a wireless network without a registered MAC
Address AND using WEP Encryption Methods:
1). Set the IP Address of the card to 127.0.0.1 and the Netmask
to 255.255.0.0
2). The card takes care of the rest. Just sit back and listen to
the sounds of the network (NOTE: There will NOT be any DNS
RESOLVING and quite possibly NO IP's will show up, only the
computers MAC Addressed) (Double NOTE: All you need is
another machines MAC Address to start a Man-in-the-Middle).
First Method requires that you have already sniffed on the
network for an extended amount of time. Needed information is the
IP Ranges, Netmask, and Gateway of the Lan. All of this can be
acquired through HUNT. All you do is sift through the data
generated, find an IP that hasn't sent any traffic take it and
configure the other things (such as Netmask and Gateway manually).
Second method requires you to have physical access to the lan.
Take a hardwired nic and spoof it's MAC Address to that of the
wireless nic's address. Run a command like 'pump,' swap cards
and you should be on the network.
The following instructions were executed on a Dell laptop with
Redhat 7.0. The Ethernet card that was used is a Xircom 10/100
56k Combo thingy and the wireless lan card is a Lucent
Technologies Wavelan Gold Turbo 128RC4. The base stations that
these were tested on is a D-Link 1000AP, Orinoco AP-1000 Access
Point, Orinoco COR-1100, and Cisco Aironet 350 Series.
SOLUTION
This point has been made re+peat+ly by the White-Hat (and other)
communities. Wireless lans are totally public. Furthermore, most
people don't even use WEP! So everything is cleartext. There
was a great presentation at DefCon about hacking wireless
networks. There are something like 40 accessible WAPs (wireless
access points) from the corner of First and Market in SF.
(That's the financial district for those not in the bay area)
Only 40% of all WAPs were running WEP, and of these running WEP
only 15% were actually secure (running IPSEC or some other
variant).
Use vpn for authenication. We would go a step further and say to
use IPSEC between machines and the vpn server, as wep has been
proven insecure.
Here is a nice article on Cisco's solution to secure your WLAN.
It was written in July and is very informative:
http://www.cisco.com/warp/public/784/packet/jul01/p74-cover.html