53
Argonne National Laboratory is managed by The University of Chicago for the U.S. Department of Energy War Driving, Why and How George Beranek [email protected] (630) 252-7219 Senior Security and Network Administrator Argonne National Laboratory NETSECURE 06, Illinois Institute of Technology's Rice Campus Center for Professional Development 08-Mar-2006 Room 118 10:00 am – 11:30 am

War Driving, Why and How

  • Upload
    shepry

  • View
    38

  • Download
    2

Embed Size (px)

DESCRIPTION

George Beranek [email protected] (630) 252-7219 Senior Security and Network Administrator Argonne National Laboratory NETSECURE 06, Illinois Institute of Technology's Rice Campus Center for Professional Development 08-Mar-2006 Room 118 10:00 am – 11:30 am. War Driving, Why and How. - PowerPoint PPT Presentation

Citation preview

Page 1: War Driving, Why and How

Argonne National Laboratory is managed by The University of Chicago for the U.S. Department of Energy

War Driving, Why and How

George Beranek [email protected] (630) 252-7219

Senior Security and Network Administrator

Argonne National Laboratory

NETSECURE 06, Illinois Institute of Technology's Rice Campus Center for Professional Development

08-Mar-2006 Room 118 10:00 am – 11:30 am

Page 2: War Driving, Why and How

2

What is War Driving?

war driving n. A computer cracking technique that involves driving through a neighborhood with a wireless-enabled notebook computer and mapping houses and businesses that have wireless access points.

Wardriving is driving around a city searching for the existence of Wireless LAN (802.11) Networks. It's locating and logging wireless access points while in motion. Often, this task is automated using dedicated wardriving software and a GPS unit.

Wardriving was invented by Peter Shipley and is now commonly practiced by hobbyists, hackers and security analysts worldwide.

"Wireless technology sets data free from the physical confines of wire — which also means that controlling who receives the data is problematic. Peter Shipley, the director of labs at OneSecure, told me about his new hobby of driving around Silicon Valley and picking up networks on his laptop. war driving is replacing war dialing in the wireless age." —Carole Fennelly, Unix Insider, December 2000

Page 3: War Driving, Why and How

3

Why War Drive?

Do tech managers know where all their wireless LAN access points (AP) are? Since they can be plugged into a LAN and stashed almost anywhere, even by users, they can be a challenge to manage internally. Meanwhile, strangers can be discovering them be "war driving," cruising around with a wireless-enabled laptop seeking wireless LANs that can be entered and explored. —"IBM Tool Targets Wireless 'War Driving'," e-Business Advisor, August, 2002t

From a technical perspective War Driving can be very interesting, White Hat Hacking

As a hobbyist War Driving is both FUN technically challenging.

Bandwidth Stealers (warez sharing, etc...)

Anonymity Seekers (legal and illegal motives)

True Black Hat Hackers

Page 4: War Driving, Why and How

4

Hardware

Required:

– A portable computer (laptop / palmtop)

– Dell Latitude D810 (ear bud recommended)

– A compatible built in or pcmcia Wireless NIC

• external antennae (omnidirectional / unidirectional)

– A GPS http://www.cantenna.com/

• http://www.deluoelectronics.com/ Optional: (but very very cool)

– Linksys WRT54G Wireless Router / Access Point

Page 5: War Driving, Why and How

5

Netstumbler vs. Kismet (Windows vs. Linux) Netstumbler http://www.netstumbler.com/

– Runs on Windows XP

– Great for a quick war-walk / war-drive or a quick vulnerability assessment (rogue access point detection) or coverage / interference testing on an unprotected network, but....

– Netstumbler sends out 802.11 “Probe Request” frames for SSID “Any” providing no real advantage, but making it easily detectable.

– Netstumbler does not sniff. Kismet http://www.kismetwireless.net/

– Runs on Linux / Unix (client ported to Windows)

– Kismet puts your wireless NIC into RFMON mode and does Passive Scanning

– Kismet will discover and report the IP address, netmask, and default gateway as well as the SSID of “no ssid” sites if possible.

– Kismet sniffs and records packets for later use with Ethereal, AirSnort, AirCrack, etc...

– Kismet's intrusion detection feature will detect many probing / attack fingerprints including Netstumbler

Page 6: War Driving, Why and How

6

Basic Software Packages that you'll need:

– gpsd GPS (Global Positioning System) service daemon http://gpsd.berlios.de/

– kismet Wireless 802.11b monitoring tool http://www.kismetwireless.net/

Packages that you'll want:

– Ethereal network traffic analyzer http://www.ethereal.com/

– gpsdrive Car navigation system http://gpsdrive.kraftvoll.at/

– festival general speech synthesis http://www.cstr.ed.ac.uk/projects/festival/

– MySQL database package http://www.mysql.com/

– xgps gui client for the GPS service daemon http://gpsd.berlios.de/xgps.html

– wifi-radar gui for managing Wi-Fi profiles http://www.bitbuilder.com/wifi_radar/

Other Packages:

– Airsnort WLAN sniffer http://airsnort.shmoo.com/

– Aircrack wireless WEP cracker http://www.wirelessdefence.org/Contents/AircrackMain.htm

– Dsniff sniffs network traffic for cleartext insecurities http://www.monkey.org/~dugsong/dsniff/

Page 7: War Driving, Why and How

7

Setup

Install NIC, GPS, and Software Paclages Compile RFMON mode NIC driver kernel modules if necessary Setup the MySQL database

– mysql -u root -p < /usr/share/gpsdrive/create.sql (This will add a user : gast / gast)

Edit /etc/kismet/kismet.conf for your NIC and configuration.

– source=ipw2915,eth1,BuiltIn,6

– source=orinoco,eth2,BuiltIn,6

– source=cisco,eth2,BuiltIn,6

– source=kismet_drone,192.168.108.1:3501,drone

Page 8: War Driving, Why and How

8

Execution

Start the GPS daemon:

– `ps -ef | grep -i gps` Kill gpsd -F /var/run/gpsd.sock if present

– `dmesg | grep -i usb` check to make sure your GPS has associated with a port

– `ln -s /dev/ttyUSB0 /dev/gps ; gpsd -K -f /dev/gps ; ps -ef | grep -i gps` make sure that mysqld is running `ps -ef | grep -i sql` , `/etc/init.d/mysql

restart` if not make sure festival is running `ps -ef | grep -i sql` , `festival --server &` if

not Add localhost to xhosts `xhost ; xhost + localhost ; xhost` Start xgps `xgps -speedunits mph -altunits ft &` Make sure that no kismet components are running `ps -ef | grep -i

kismet`, kill if present Start Kismet `kismet` Start gpsdrive `gpsdrive` Start wifi-radar `wifi-radar`

Now Do Your War Drive!

Page 9: War Driving, Why and How

9

Kismet can be integrated with MySQL, GPSDrive, and SNORT

Page 10: War Driving, Why and How

10

War Driving with Kismet http://www.kismetwireless.net/

Synthesized voice announces discoveries. (Great while driving, but an ear bud makes it even better)

Real Time Commands:

– s Sort network list

– l Show wireless card power levels

– i Detailed information about selected network

– r Packet rate graph

– a Statistics

– d Dump printable strings

– e List Kismet servers

– m Toggle muting of sound and speech

– c Show clients in current network

– H Return to normal channel hopping

– x Close popup window

– h Help (Many Other Controls)

Page 11: War Driving, Why and How

11

Mapping the results

`gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers]`

Page 12: War Driving, Why and How

12

Power

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 13: War Driving, Why and How

13

Power

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 14: War Driving, Why and How

14

IIT Rice Campus with Intel ipw2915 mini pci internal

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 15: War Driving, Why and How

15

IIT Rice Campus with Orinoco Gold pcmcia card and external antenna

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 16: War Driving, Why and How

16

IIT Rice Campus with Linksys WRT54G OpenWRT Kismet Drone

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 17: War Driving, Why and How

17

IIT Rice Campus aggregate of all 3 war drives

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 18: War Driving, Why and How

18

ShoniBrook I

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 19: War Driving, Why and How

19

ShoniBrook II

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 20: War Driving, Why and How

20

ShoniBrook III

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 21: War Driving, Why and How

21

1840

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 22: War Driving, Why and How

22

2648

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 23: War Driving, Why and How

23

FCC Berwyn

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 24: War Driving, Why and How

24

Argonne 200

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 25: War Driving, Why and How

25

Argonne 300

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 26: War Driving, Why and How

26

Unidirectional Antenna & War Walk to eliminate clutter

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 27: War Driving, Why and How

27

ShoniBrook GPSDrive with Kismet (friends mode)

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 28: War Driving, Why and How

28

ShoniBrook GPSDrive with MySQL

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 29: War Driving, Why and How

29

IIT Rice Campus GPSDrive with Kismet

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 30: War Driving, Why and How

30

IIT Rice Campus GPSDrive with MySQL

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 31: War Driving, Why and How

31

IIT Rice Campus using Orinoco NIC and Unidirectional Cantenna

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 32: War Driving, Why and How

32

A War Walk using Windows XP

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 33: War Driving, Why and How

33

NetStumbler War Walk of IIT Rice Campus

gpsmap -v -l ssid -L 0 -G -t -D -p -r -a -e -k -S 2 Kismet-[date]-[numbers].*

Page 34: War Driving, Why and How

34

Results of Kismet IIT Rice Campus War Walk (No GPS indoors) Network 1: "rice_wireless" BSSID: "00:C0:49:A9:7B:B1" infrastructure 06

10.0.0.67 Network 2: "rice_wireless" BSSID: "00:C0:49:A9:75:5A" infrastructure 06 10.0.0.0 Network 3: "rice_wireless" BSSID: "00:C0:49:A9:A0:FF" infrastructure 06

10.0.0.173 Network 4: "rice_wireless" BSSID: "00:C0:49:A9:75:8E" infrastructure 01 10.0.0.1 Network 5: "voiplab" BSSID: "00:40:96:A1:11:1D" infrastructure 03 WEP Network 6: "tsunami" BSSID: "00:0D:28:8E:56:DE" probe 00 Network 7: "rice_wireless" BSSID: "00:C0:49:A9:75:7A" infrastructure 11

216.47.135.65 Network 8: "cuwireless.net" BSSID: "02:02:6F:21:E9:1A" ad-hoc 11

169.254.233.26 Network 9: "rice_wireless" BSSID: "00:C0:49:A9:75:80" infrastructure 11

192.168.1.3 Network 10: "rice_wireless" BSSID: "00:C0:49:A9:75:88" infrastructure 11

10.0.0.101 Network 11: "BlackHole" BSSID: "00:12:17:08:74:58" infrastructure 01 WEP Network 12: "wirelessR624" BSSID: "00:0F:3D:3B:42:A8" infrastructure 06 WEP Network 13: "2WIRE501" BSSID: "00:0D:72:D5:C3:99" infrastructure 06 WEP Network 14: "linksys" BSSID: "00:13:10:05:50:AE" infrastructure 06 Network 15: "2WIRE937" BSSID: "00:14:95:78:BE:B1" infrastructure 06 WEP Network 16: "<no ssid>" BSSID: "00:12:17:E4:CE:22" probe 00 Network 17: "2WIRE085" BSSID: "00:0D:72:A2:0D:F9" infrastructure 06 WEP Network 18: "Aegus 243" BSSID: "00:14:6C:45:8D:E6" infrastructure 11

Page 35: War Driving, Why and How

35

Map Sources – GPS maps are available from many sources Mapblast http://www.slhonline.org/MapBlast! Mapblast!.htm

http://www.mapblast.com/ MapPoint http://mappoint.msn.com/ Terraserver http://www.terraserver.com/ http://terraserver.microsoft.com/ Tiger Census http://tiger.census.gov/cgi-bin/mapbrowse-tbl FreeGIS http://www.freegis.org/ http://www.freegis.org/browse.en.html NASA satellite topology maps

ftp://mitch.gsfc.nasa.gov/pub/stockli/bluemarble/ USGS http://www.usgs.gov/

• Netstumbler data can be plotted at a number of websites http://www.wifimaps.com/

Page 36: War Driving, Why and How

36

Data Analysis (/var/log/kismet/Kismet-Mar-03-2006-10.dump) Kismet's .dump files can be read and analyzed by Ethereal, AirSnort,

AirCrack, etc... Kismet

Page 37: War Driving, Why and How

37

Data Analysis

AirSnort – load pcap file Kismet-Feb-15-2006-3.dump

Page 38: War Driving, Why and How

38

Data Analysis AirCrack – Kismet-Feb-15-2006-2.dump aircrack Kismet-Feb-15-2006-2.dump

Page 39: War Driving, Why and How

39

Linux on the Linksys WRT54G

History

– The WRT54G was released in 2003 in anticipation of the 802.11g standard.

– In June 2003 some folks on the Linux Kernel Mailing List sniffed around the WRT54G and found that its firmware was based on Linux components. Because Linux is released under the GNU General Public License, or GPL, the terms of the license obliged Linksys to make available the source code to the WRT54G firmware. As most router firmware is proprietary code, vendors have no such obligation. It remains unclear whether Linksys was aware of the WRT54G’s Linux lineage, and its associated source requirements, at the time they released the router. But ultimately, under outside pressure to deliver on their legal obligation under the GPL, Linksys open sourced the WRT54G firmware in July 2003.

– With the code in hand, developers learned exactly how to talk to the hardware inside and how to code any features the hardware could support. It has spawning a handful of open source firmware projects for the WRT54G that extend its capabilities, and reliability, far beyond what is expected from a cheap consumer-grade router. Seattle Wireless is generally credited as being the first to upload new firmware to the WRT54G. You can now actually run snort or kismet right on your wireless router.

Page 40: War Driving, Why and How

40

Linksys Firmware Replacements

There now exists plethora of firmware replacements for the WRT54G, such as:

– Sveasoft (no longer free) http://www.sveasoft.com/

– Wifi-Box https://sourceforge.net/projects/wifi-box

– BatBox http://www.batbox.org/wrt54g-linux.html These distributions can provide a lot of additional functionality:

– Radio Transmit power adjustment

– Antenna selection

– Iptables filtering / Shorewall firewall

– Snort intrusion detection

– Telnet, SSH, local caching DNS, SNMP daemons

– Kismet Drone With the right replacement firmware, it can do what you’d only expect to be

able to on a commercial-grade router costing several times as much BUT it can be difficult to find a firmware that contains exactly the functionality that you're looking for.

Page 41: War Driving, Why and How

41

OpenWRT http://openwrt.org/

The OpenWRT firmware takes a completely different approach, turning your WRT54G into a complete generalized interactive Linux system including package (ipkg list) management. It is not based on Linksys code at all.

Some notable features are the ability to telnet/SSH to your router, install software such as Snort, Kismet, Mini-Sendmail, and Iptables, and create and control VLANs for every Ethernet port on the device.

By default, OpenWrt's installation emulates the normal Linksys firmware functionality. This means that although you installed OpenWrt, your router still acts as a wireless access point and switch. (nvram show | more)

OpenWrt obeys common networking conventions, taking advantage of route, ifconfig, and /etc/resolv.conf.

One of the great things about OpenWrt is its use of iPKG, a tiny package management system inspired by Debian's APT. With iPKG, installing packages, such as tcpdump, is simple as running a command like ipkg install tcpdump. Use ipkg update and ipkg list to see what add-on software is available.

You could use the WRT54G as a repeater or a bridge. Create a wireless distribution system (WDS) or a mesh network. Run a VPN server or a VoIP server or a managed hotspot with a RADIUS server. Manage bandwidth use per protocol. Control traffic shaping. Support IPv6. Boost antenna power. Remotely access router logs. Operate the router as a miniature low-power PC, running a variety of Linux applications. (UART hardware mod)

Page 42: War Driving, Why and How

42

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/

Page 43: War Driving, Why and How

43

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/cgi-bin/webif/wireless-config.sh

Page 44: War Driving, Why and How

44

http://192.168.108.1:1840/cgi-bin/webif.sh

http://192.168.108.1:1840/cgi-bin/webif/ipkg.sh

Page 45: War Driving, Why and How

45

Wireless intrusion detection using stationary Kismet drones

Kismet will provide alerts based on fingerprints (specific netstumbler versions, other specific attacks) and trends (unusual probes, excessive disassociation, etc). Kismet focuses on the 802.11 (layer 2) network layer, and provides integration via named pipes with layer3+ IDS systems such as Snort.

You can create inexpensive Kismet drone(s) using WRT54G Wireless Routers and place them strategically at your facility. A single Linux system can act as the Kismet client for all of these drones. In this way your wireless installation can be continuously and inexpensively monitored. Logs can even be intelligently parsed for the appearance of rogue access points with perl, swatch, etc.

Page 46: War Driving, Why and How

46

Turn your Wireless Laptop / Desktop into an Access Point

By building your own Access Point on a Linux server you can:

– Run an iptables firewall to protect your network

– Set up intrusion detection

– Build a captive portal

– Build a web caching server

– Actually you can do ALMOST ANYTHING!ALMOST ANYTHING! The ability to turn you laptop into a WAP can come in very handy at times. The ability to turn you laptop into a WAP can come in very handy at times.

It can overcome the disadvantages of ad-hoc mode. It can also be used It can overcome the disadvantages of ad-hoc mode. It can also be used to spoof an existing AP to attack / audit a wireless installation.to spoof an existing AP to attack / audit a wireless installation.

What is actually necessary to achieve access point functionality is to get your wireless NIC into MASTER mode or to emulate this mode. `iwconfig wlan0 essid myAP mode master`

This can be accomplished through the use of enhanced driver software depending upon your NIC's chipset: hostap for Prism / cisco Aironet , Hermes AP for Orinoco cards , madwifi for Atheros , etc.

Page 47: War Driving, Why and How

47

Specialized Linux Distributions

If you're a Windows user who doesn't want to install Linux then here's a live filesystem CD distribution that will run everything you need without touching your hard drive!

– Knoppix STD (Security Tool Distribution) http://www.knoppix-std.org/

• Contains: http://www.knoppix-std.org/tools.html

– airsnarf : rogue AP setup utility

– airsnort : sniff, find, crack 802.11b

– airtraf : 802.11b network performance analyzer

– gpsdrive : use GPS and maps

– kismet 3.0.1 : for 802.11 what else do you need?

– kismet-log-viewer : manage your kismet logs

– macchanger : change your MAC address

– wellenreiter : 802.11b discovery and auditing

– patched orinoco drivers : automatic (no scripts necessary) WARLINUX

– an easy form of Linux with Kismet for windows users to try out https://sourceforge.net/projects/warlinux/

Page 48: War Driving, Why and How

48

Some Useful Commands

iwconfig – used to configure the basic operating parameters of your wireless NIC.

cardctl - used to monitor and control the state of PCMCIA sockets iwlist - shows current parameters and available access points - `iwlist eth1

scanning` iwspy - shows quality of link parameters iwpriv – allows you to configure private wireless options specific to a

single wireless driver.

Page 49: War Driving, Why and How

49

Wireless Security Countermeasures Change Default Administrator Passwords (and Usernames) Turn on highest level WPA / WEP Encryption Change the Default SSID Enable MAC Address Filtering Disable SSID Broadcast Assign Static IP Addresses to Devices Position the Router or Access Point Safely Turn Off the Network During Extended Periods of Non-Use Use strong encryption like ssh for all applications you use over the wireless network. Encrypt wireless traffic using a VPN Keep firmware up to date Authenticate wireless users with protocols like EAP Create a dedicated segment for your Wireless Network, and take additional steps to

restrict access to this segment Regularly TEST the security of your wireless network, using the latest Wardriving

Tools. Enable strict LOGGING on all devices and routinely audit these logs. Implement Wireless Intrusion Detection

Page 50: War Driving, Why and How

50

Some Excellent References

Linux Unwired by Roger Weeks

– A comprehensive and thoroughly useful treatment of the basics of wireless Linux.

– Great sections on Blue Tooth and IR for Linux too.

– http://www.oreilly.com/catalog/lnxunwired/

WI-FOO : The Secrets of Wireless Hacking Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky

– A much more advanced reference.

– The definitive guide to wireless attack and defense.

– http://www.wi-foo.com/

Page 51: War Driving, Why and How

51

QUESTIONS?

USE OPEN SOURCE http://www.opensource.org/ UBUNTU http://www.ubuntu.com/ FIREFOX http://www.mozilla.com/firefox/ Open Office http://www.openoffice.org/ http://www.anl.gov/ Argonne National Laboratory is located on 1,500 acres, 25 miles southwest of

downtown Chicago.

Page 52: War Driving, Why and How

52

Speaker Bio

George Beranek began his professional computer career in the early 1980's as a test engineer / designer programming in HP Rocky Mountain Basic, Pascal, Fortran, and C supplying intelligent replacement for electro-mechanical test systems as an independent contractor for Eaton Corporation and Gould Research Center. In 1990 he transitioned into Unix System and Network administration at Motorola where he eventually headed a team of system administration and networking professionals dedicated to quick response and high performance technical computing for their Cellular Infrastructure International Systems Engineering Group during the peak of their cellular boom. George is presently a Senior Security and Network Administrator at Argonne National Laboratory where he essentially functions as an internal Linux consultant. George received a BS in Electrical Engineering and Computer Science from Northwestern University's Technological Institute and a MS in Electrical Engineering and Computer Engineering from IIT. He is also a RedHat Certified Engineer (RHCE) but of late has become passionate about the Debian based Ubuntu Linux distribution. George has been a member of the IEEE for the past 24 years.

Page 53: War Driving, Why and How

53

The Advanced Photon Source (APS) is the nation’s brightest source of X-rays for research.