The Dark Side Of DefCon's Wireless Network 185
An anonymous reader writes "While there's been a few postings on events happening at DefCon 12, one event seems to have been overlooked. A new wireless packet injection tool was quietly released (unleashed?) during DefCon: AirPwn. Here's a write-up of the tool as deployed by its author and crew at DefCon 12."
awesome . . . (Score:5, Informative)
Re:awesome . . . (Score:3, Interesting)
LK
Re:awesome . . . (Score:2)
Re:awesome . . . (Score:2, Funny)
When you got your gmail account, I got no invite. Now, you come to me asking a favor...
Re:awesome . . . (Score:2)
Hrm sounds like WRT-54G to me... (Score:2)
Ethereal dump? (Score:5, Interesting)
Re:Ethereal dump? (Score:5, Interesting)
Re:Ethereal dump? (Score:2)
Early ./? (Score:2, Funny)
wireless protection (Score:5, Funny)
Re:wireless protection (Score:5, Funny)
Re:wireless protection (Score:4, Funny)
i was owned (Score:4, Interesting)
Re:i was owned (Score:3, Insightful)
This type of attack doesn't bother people that don't request images.
Stop karma whoring.
Server dead, here's the text: (Score:4, Informative)
Images from Dave's camera
Movies from Dave's camera
Images from my phone
At Defcon 12 this year my cow-orkers and I brought along a little piece of code called "airpwn." Airpwn is a platform for injection of application layer data on an 802.11b network. Although the potential for evil is very high with this tool, we decided to demonstrate it (and give it its first real field trial) on something nasty, but harmless (compared to say, wiping your hard-drive)
Over the course of defcon, we fielded 7 different airpwn configurations to see how well it worked, and of course to watch as 31337 h4x0rz got goatse up in their mug. The configurations were:
HTTP goatse, 100% of the screen
HTTP goatse replacing all images
HTTP goatse as the page background via CSS
HTTP tubgirl replacing all images
HTTP "owned" graphic, replacing all images (eventually I felt bad about all the ass pictures)
HTTP javascript alert boxes, letting people know just how pwned they were
FTP banners (while this worked, nobody pays attention to FTP banners so we abandoned this quickly)
How does it work?
airpwn requires two 802.11b interfaces, one for listening, and another for injecting. It uses a config file with multiple config sections to respond to specific data packets with arbitrary content. For example, in the HTML goatse example, we look for any TCP data packets starting with "GET" or "POST" and respond with a valid server response including a reference to the canonical goatse image. Here's the configuration file used for this mode:
begin goatse_html
match ^(GET|POST)
ignore ^GET [^ ?]+\.(jpg|jpeg|gif|png|tif|tiff)
response content/goatse_html
and here is the content that we return when the match is triggered:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
pwnedOPEN YOUR MIND -- TO
THE ANUS!!
Each of the 7 modes mentioned previously varied in the configuration and content returned. In each case the poor user of the web browser was left feeling disgusted, afraid and/or confused. While I was busy operating airpwn at the laptop, my accomplices wandered the show-floor taking pictures and the occasional video of our victims. Links to our victims are at the top of the page.
In all honesty, the reaction to airpwn wasn't exactly what I had expected. When I was writing the code, I imagined that the second I turned airpwn on we'd hear immediate groans of disgust radiating out at the speed of light. In practice, airpwn's effect was simultaneously more private, and more full of personal drama. First off, the full-screen goatse seemed to be too powerful . The second it flashed on the screen, the savvy user would have the browser closed already. This made it incredibly difficult to actually catch the victims on film. Based on the logs generated by airpwn we would be hitting multiple people per second, but finding someone with goatse up on their screen was still a bit of a challenege.. Once we did find a victim, the results were pretty hillarious.. I had tears rolling down my cheeks on multiple occasions. The typical goatse reaction went something like this:
Open browser, see goatse, jump backwards a little
quickly close browser, take a breath
open browser, see goatse, close browser (faster this time)
scratch head, quit browser process, re-launch browser
see page indicating that goatse will load soon (page header, etc.) immediately close browser.
open up browser preferences, click all the tabs, look for the "no goatse" checkbox
clear the browser cache
open browser, see goatse, close browser
open network preferences, click on all the tabs, look for the "no goatse" checkbox.
disconnect from network, re-associate
open browser, see goatse, close browser
At this point, the less l33t people would generally give up and either 1) do something else or 2) look deep into goatse's anus with a 10-yard stare.. The m
Hardly bad (Score:5, Insightful)
Re:Hardly bad (Score:1, Informative)
Re:Hardly bad (Score:2, Insightful)
Re:Hardly bad (Score:2)
flipping the bird (Score:3, Funny)
Re:flipping the bird (Score:1)
why.. (Score:4, Insightful)
There's a worrisome pattern, in the IT security biz, of repetition. Hacks discovered a few years ago re-appear in new clothes as "new," technologies for protecting against them resurface every few years in the same way. Computing as a whole tends to re-invent things on something like a 15 year cycle, but security seems to be on a truly frenetic clock, cycling every 2 years or so (very very approximately
Is there some connection between this and that vulnerabilties re-surface in new clothes constantly as well?
Re:why.. (Score:5, Funny)
Yes. Human Stupidity
Headless chickens (Score:2, Insightful)
What are they going to do this time, ban WiFi cards? (Perhaps a warning sticker on products: "This is not a phone or a LAN. This is a two-way radio. Wireless means they don't need wires either.")
Fuck. (Score:5, Funny)
Mirror mirror on the wall?
Starbucks! (Score:5, Funny)
Re:Starbucks! (Score:3, Funny)
Re:Starbucks! (Score:1, Funny)
Re:Starbucks! (Score:2)
Nothing like ruining this culture's obsessions with "protecting kids" than leaving porn mags around the local schools for the eager tikes to snatch up and hide in their bookbags.
Heh, heh.
"Stunned", my ass. "Stunned" at their good fortune, more likely.
(Of course, goatsex wouldn't be my first choice of material. You have to have SOME taste.)
Re:Starbucks! (Score:2)
I'd shit myself too. Then fire up ethereal, but I would shit myself first.
Re:Starbucks! (Score:2)
As a side note, what's with mr. goatse's ring... take off your rings when you're expanding your anus, please
Re:Starbucks! (Score:2)
Goatse! (Score:1, Interesting)
And you'd be yucked out. But the repost of the article explaining the wireless goatse injection is +5 informative. That's weird too.
If you're confused (RIP goatse) see wikipedia.com and search slashdot.
Working on a mirror of the video/images (Score:3, Informative)
http://leela.lasthome.net/airpwn/
Re:Working on a mirror of the video/images (Score:2)
Multiple Wifi Cards!?? (Score:1)
Re:Multiple Wifi Cards!?? (Score:1)
Sample product. [dlink.com]
Re:Multiple Wifi Cards!?? (Score:3, Informative)
I doubt this tool will make it's way to OSX anytime soon, but OSX(and OS9) has EtherPEG [etherpeg.org]. When I run it in my dorm I get a nice porn collage.
Re:Multiple Wifi Cards!?? (Score:2)
I should have written:
I doubt this wireless packet injection tool will make it's way to OSX anytime soon, but OSX(and OS9) has EtherPEG. When I run it in my dorm I get a nice porn collage.
Re:Multiple Wifi Cards!?? (Score:2)
There could be uses (Score:5, Interesting)
Three scenarios to point this out.
You're at Joes Internet Cafe, munching on your slightly overpriced muffin and glad for the free Wi-Fi access since you're out of town, and don't get to check your email much on the road. You hit the link to a message you want to read on webmail, when all of a sudden, an ad comes up. Nothing too bad, but it seems that Joe has decided that instead of charging people directly for 'net access, he'll rig up an old desktop with wireless to transmit the ad source for every 100th HTTP request that comes through his system.
This is a potentially annoying way of using the technology, but it also sounds like it could be a good way for Joe to help recoup his costs on the internet. Not a place I'd mind going.
Scenario Two
You're at Joes Internet Cafe, munching on your slightly overpriced bagel, glad for the...well, you know. This time the 'net access isn't free, but Joe's giving it out for $1 an hour, more than reasonable. 58 minutes in, you make an HTTP request, and a small javascript window pops up informing you that you've just got a couple minutes left, more time can be bought at the counter. After 60 minutes, instead of locking you out, all your requests simply get a screen advising you that if you want to keep going, Joe's going to need a dollar at the counter.
Seems useful to me.
Scenario Three
You're in Joes Internet Cafe, sipping some slightly overpriced coffee and you try to get online. After you've payed your dollar to the friendly man at the counter.
You keep gettings ads. You click out, thinking that it's a popup window, and no, you really don't need to enlarge that, it's fine how it is.
All browser windows closed. You try again.
No, I don't really need those drugs...
Or those pieces of software
Or...
You get the idea. Turns out, that guy in the corner is making some quick cash by spamming everyone in the place. The only sites that are coming through are from those ads. He leaves after about 15 minutes, because it can't be long until someone figures it out, but you've just lost 15 minutes of your time.
I realize it's an extreme example, but you think someone won't try it?
Joe, if you're out there, we need to talk. I've got some ideas for you.
Re:There could be uses (Score:5, Interesting)
The point of AirPwn is intercepting wifi traffic on someone else's network; the uses of which are overwhelmingly malicious than benign, to my thinking. Exactly like Scenario 3. Or worse, detecting passwords, requests for secure connections to eBay, banks, etc.
My question to the crowd is, how effective would existing wireless encryption standards be at disabling AirPwn?
Re:There could be uses (Score:1)
Re:There could be uses (Score:4, Informative)
Use IPSec instead of WEP for the wireless network, and AirPwn would not amount to much more than DoS. OpenBSD has IPSec in the base install, and is fairly easy to setup.
ssh with protocoll 2 is also safe. If you connect to someone impersonating the ssh server, and you try to connect, ssh will give a warning that the keys on the ssh server has changed.
Re:There could be uses (Score:2)
No, SSH protocoll 1 is vulnerable to man in the middle attacks. There is even a program called dsniff [oreilly.com] that do MITM attacks against SSH protocol 1.
Re:There could be uses (Score:3, Insightful)
If your servers share user directories and allow public key user authentication, you should probably disable ssh1 to force your u
It could be worse... (Score:4, Insightful)
Yes, it could happen, particularly, if the geek in the corner is sniffing your WiFi traffic, and singles you out.
More serious would be something which noted when you wanted a secure site, such as a bank, and proxied to a full-screen web page image complete with security icons that tricked the user into sending you their password in the clear.
There are malicious 14 year olds with laptops out there that would find this awfully amusing.
Joe doesn't need AirPwn (Score:1, Insightful)
Re:There could be uses (Score:2)
Re:There could be uses (Score:2)
This idea was shamelessly stolen from here [defcon.org].
response of a victim (Score:5, Informative)
Once the shock wore off, I pointed out the issue to my friends sitting next to me. They spent some time analyzing ethereal output, while I downloaded and ran arpwatch. It's pretty sad to hear that some kiddies were checking browser settings....
The article claims there was no arp poisoning going on, but actually there was. I saw plenty of that. Which kinda confused us, since there doesn't seem to be much need for that in a wireless environment. You can sniff w/o arping, and you can inject traffic (as they were). But yes, it was definitely happening, though apparently by a different group. (Actually, I detected three different MAC addresses competing for the AP's IP.)
In hindsight I should have saved some of my packet captures. Might have been fun to look over later.
Re:response of a victim (Score:2, Insightful)
I will say that I thought twice about using telnet even with a OTP specifically because of TCP hijacking fears. (Initially I thought it would be funny for someon
Re:response of a victim (Score:2)
Yes, I know it's a waste of time to respond to a troll, but I'm bored. ;)
I never said airpwn did arp poisoning. Must have been one of your imaginary friends. All I said was that I suspected arp poisoning, and when I checked for it, I saw it was occurring. By multiple groups.
As another poster mentioned, it's quite possible that airpwn made arpwatch think arp poisoning was occurring by spoofing packets wi
Moral of the story is.... (Score:1, Insightful)
Suprised? Not really. (Score:2, Insightful)
But this is the best part. Become the middle man.
Re:Suprised? Not really. (Score:2)
You'll have a hard time exploiting a properly configured IPSec.
Re:Suprised? Not really. (Score:2)
But it's not. So WiFi is open to this kind of shit. What's easier, plugging in an AP? Or setting up a router, plugging in the wifi interface, plugging in ethernet, routing the packets, getting the ipsec stuff working, getting all the clients ipsec clients, etc, etc, etc?
That's the point.
You're absolutely wrong. (Score:2)
It's easy to forget now that WiFi was by no means a "sure thing". I was working at a wireless networking company (that's still going strong today) in early 2001 that used 802.11b, a
ahh, how clever (Score:1, Interesting)
But I'm a little surprised that this is "new", I thought stuff like this would've been written already a long time ago.
Re:ahh, how clever (Score:1)
Bad News... (Score:2, Interesting)
Re:Bad News... (Score:5, Interesting)
After reading a few posts on this thread, I find it peculiar that so many slashdotters don't know that IPSec or related vpn products can be used to secure wireless.
Re:Bad News... (Score:2)
Read the examples section of the man page. You only need a couple of options to get started. Trust me, it won't take you an hour or two.
Re:Bad News... (Score:1)
A few questions (Score:4, Interesting)
2) What about the data stream that ocmes thru the wire legimately?
3) What effect does WEP encryption have on the new "sploit"?
4) What about SSL? Do HTTPS websites remain at all vulnerable to this attack? Nearest I can tell, the answer is "no".
So, what we have herei is a lame way to spoof packets for unsecuredd onnections. So.... secure your IP already!
Re:A few questions (Score:1)
Re:A few questions (Score:2, Informative)
Yes. You cannot hack into a SSL stream by just injecting packets, you'd have to recover the session key first
If the faked response arrives earlier, the legitmate data gets discarded.
WEP will prevent the attack, unless it has been hacked itself before
Re:A few questions (Score:3, Interesting)
Additionally, copied from Jim Geier's article at wi-fi planet.com:
"You can view the frames sent back and forth between a user's radio NIC and access point during the association process. As a result, you'll learn information about the radio card and access point, such as IP address of both devices, association ID for the radio NIC, and SSID of the n
Re:A few questions (Score:2)
Re:A few questions (Score:3, Insightful)
1) does SSL prevent this attack from working?
Yes and no. If you do the packet injection after the SSL session is negotiated, yes (since you'll no longer be able to read the HTTP get or post). If you do the packet injection before the SSL session is negotiated (and setup your own SSL session with your own self-signed certificate), no.
Someone correct me if I'm wrong, but I believe the way it works is to hijack the TCP connection. If you can do that, you can take over anything (though obviously authenti
Re:A few questions (Score:1)
About the self-signed certificate: any self-respecting browser will complain about self-signed certificates (unless already known and told to accept it). Highjacking SSL isn't that easy.
Re:A few questions (Score:2)
About the self-signed certificate: any self-respecting browser will complain about self-signed certificates (unless already known and told to accept it). Highjacking SSL isn't that easy.
I'm not denying this at all. But the fact remains that people will simply just click OK and not think much about it.
Re:A few questions (Score:2)
>
>If you do the packet injection before the SSL session is negotiated (and setup your own SSL session with your own self-signed certificate), no.
The whole purpose of certificates in SSL/TLS is to prevent against man-in-the-middle attacks such as this. A self-signed certificate is as good as no certificate at all, and this should not fool any decent SSL application.
Re:A few questions (Score:2)
Or at least, you're supposed to. You could self-sign and most people would probably click "accept".
Re:A few questions (Score:2)
Once you are getting the "wrong" IPs for every DNS request you're pretty screwed.
This can happen on wired networks too. On april fool's day this year I made the DNS entries of tons of ad sites to be a local webserver. So plenty of banner ads were showing the corporate logo instead of ads.
You could show locally relevant ads if you want: e.g. a company could have company related ads (meetings etc). Starbucks could
Re:A few questions (Score:2)
Re:A few questions (Score:2)
Re:A few questions (Score:5, Informative)
1. SSL would effectively block this attack IF the user pays attention to invalid certs. Your browser contains certain CAs it trusts and, unless they had control of your PC which is certainly possible but was not done in this case, the CA they would use would be invalid and generate that pop-up box telling you so. If you ignore that box and click yes you do so at your own peril.
2. What about it? Once the data is on wifi than it is fair game for any type of manipulation. That is why they have 2 nics. The first nic "hears" your request for content "GET" and then responded much more quickly than the remote web server can with the corrupted "POST". When the correct information finally gets to your PC it is simply ignored as invalid TCP traffic and a RST packet is generated.
3. WEP would have stopped it in this instant. WEP is breakable but requires a good amount of data to be sent over the wire. Since your average user is not going to send GBs of data over HTTP and the processing power needed to break 100s of connection would be more than a couple of laptops could handle this attack would have been alot less fun. Still possible but would need to be much more dedicated. I run WEP at home, I know it will not stop the determined hacker but the casual war-drive will ignore me in favor of my many neighbors with open APs.
4. You are correct AS LONG AS you pay attention to the cert's trail. SSL really is two seperate pieces in my mind. 1 - encryption - End - To - End data encryption and 2 - Trust - I know the data I am receiving comes from the correct website. This is done with certificates. Since there is no God of the internet and we have to trust someone initially companies like verisign, etc have working with Microsoft, Mozilla, etc to get their root certs pre-installed in your browser. Anybody can generate a certificate but only companies that have passed the "Idenitifcation Test" with Verisgin or whoever can issue certs that will have the proper path back to a valid root cert. Please note Verisign has been duped before and even given out valid MS certs to non-microsoft organizations.
You may think it is lame but it is actually a harmless example of things to come. Why is wardriving so popular? Because 90% of the APs do NOT use WEP. If everyone used WEP that would stop casual attacks. Consider two fences. One a 3-ft high fence. This fence is only going to stop people who don't want to go in. The 2nd fence is 10' high with barbed wire. This can still be overcome but will require some dedication. That is the difference between open and WEP. The problem is nobody uses WEP so this attack will work most of the time with ease.
Regards
Re:A few questions (Score:2)
As soon as drivers are available for a Belkin PCI card that support WPA on Win98. In the meantime, I'm left with 128 bit WEP, and a silent (unbroadcasted) SSID.
Is the use of AirPwn anonymous? (Score:1)
let's just say I go to a school which has wireless internet access : D
Re:Is the use of AirPwn anonymous? (Score:3, Insightful)
I mean, get real. You won't get any chicks because of it.
...as we all know, chicks just love haxx0rs...
I wrote the man page for airpwn (Score:5, Interesting)
I wrote the manual page for airpwn.
All I see in this discussion is either people joking, bitching or having no idea how airpwn works.
Let's just set things straight.
First of all, there is no arp posioning.
Do you disagree? Well it's a GPL app, go read the source, show me the arp posion part of the code. What's that you can't find it? Oh, well jesus, it's because it doesn't do that.
You can hijack any tcp connection with this, it cannot be blocked without blocking the legit traffic.
This is accomplished by using raw frame injection.
One network card listens on a given channel (or in the case of a cisco card, all channels) and the other card simply injects custom frames with perfect replies. If your reply (it's up to you how big it is) is the right size, it's injected so perfectly that the connection not only still works, all of your webpage stuff still works, images just load as whatever the attacker wants.
It works with ftp, http, aim or whatever.
You can just have a ball.
It would be entirely possible to write regex that replied over aim or icq or any of that crap with a raw frame telling the other people in the conversation that they were coming out, it's up to you.
The software uses a very customizable framework to allow for use of regular expressions for matching. It's really useful for things other than goatse, but at defcon, they deserve the best.
Anyway, the totally clueless people here that claim to know how it works haven't even compiled it, so don't listen to them.
If you have any questions, feel free to ask.
Re:I wrote the man page for airpwn (Score:3, Interesting)
I've never even bothered to attend defcon and I can field this one. Defcon is not about being taken seriously by the mainstream. It's about networking (in the older sense, and the newer) with other geeks, it's about alcohol, it's about strippers, and it's about destroying hotels. I've heard even seasoned geeks speak with glee about the destruction of property, which is kind of amusing and kind of sad.
The people who they
Re:I wrote the man page for airpwn (Score:3, Funny)
I know many assorted people who have gone to defcon and returned to tell me stories, not all of whom are the get drunk types. Nonetheless there is no need whatsoever to go to defcon to learn this shit, to interface with these people, et cetera, thanks to the internet. It's a party, build a bridge and get over it.
Incidentally, your little comment about laps flipping - was that intentional? If so, it wasn't clever - just marks you as being the same kind of wanker that I expect to try to defend the reputat
Re:I wrote the man page for airpwn (Score:2)
Re:I wrote the man page for airpwn (Score:2)
Re:I wrote the man page for airpwn (Score:3, Insightful)
Re:I wrote the man page for airpwn (Score:2)
Re:I wrote the man page for airpwn (Score:2)
Secure your wireless network and hope that your attacker doesn't use one of 8billion other software tricks to mess with you.
Airpwn doesn't crack WEP, but it can inject anything, so secure your network.
Of course a legit user can use it, so it becomes nontrivial at that point.
I'm new to wireless (Score:3, Interesting)
I just got an Airport Express recently and during the setup process it gave me the option of using WEP or WPA, which it said was more secure, so I chose the latter. Why hasn't anyone mentioned WPA in this discussion? I don't really know anything about it other than it is supposed to be a more secure alternative to WEP, yet I've never heard anyone mention it even from the store I bought the Airport Express from.
Also, is there IPSEC for OS X? It's not mentioned anywhere in the Airport Admin Utility. Is it built-in? I Googled [google.com] for it, and some of the first few links mention vulnerabilities in Mac OS X IPSEC. What's this all about?
Okay, I found it (Score:2)
Re:Okay, I found it (Score:2)
Re:I'm new to wireless (Score:3, Interesting)
I don't think that alot of wireless vendors implement WPA. Apple has chosen to do so for a whil
SSH port forward is your friend (Score:4, Interesting)
At home, my AP is connected to a dedicated interface that only allows SSH. You could add port knocking for additional security.
Sure, SSH port forwards can still be disrupted or messed with. But not like plain HTTP.
BTW, nice hack!
the continued deterioration of the net. film at 11 (Score:2)
*while i do recognize that this is a hacker's conference...
*while i do realize that it's a good thing to do this, to prove that we should use encryption...
it's just sad. i'm old enough to remember open mail relays, not being abused, so maybe i'm just tired of the continual need to upgrade, secure, and encrypt.
wireless is cool, no two words about it. i'm sitting on my front porch, enjoying the cool air, waving to the neighbors who are ou
Mirror in case anyone cares. (Score:2)
Here's a mirror [pbp.net] in case it goes *splat* again.
Have fun!
Subject (Score:2)
does anyone know of a WEPcracker dealy that will run on Windows XP or Cygwin?
I don't have a laptop running *nix, unfortunately, I could always boot to Phlack for this sort of thing but that's not quite what I want to do.
Help appreciated.
Re:I don't get it. (Score:1)
I was on the site much earlier today looking at con pics and he has 4(?) videos.
>OMFG
>WTF?
For those you get no accMORONess tonight.. You can see the 15MORON0MB mpeMORONg in 2 days.. go to beMORONd.
Re:I don't get it. (Score:2)
(Oh yeah, I am in Tokyo, and you are in