Page 238 - StudyBook.pdf
P. 238

222    Chapter 4 • Communication Security: Wireless

                 There are several reasons that an attacker would spoof. If a network allows only
             valid interfaces through MAC or IP address filtering, an attacker would need to
             determine a valid MAC or IP address to be able to communicate on the network.
             Once that is accomplished, the attacker could then reprogram their interface with
             that information, allowing them to connect to the network by impersonating a
             valid machine.
                 IEEE 802.11 networks introduce a new form of spoofing: authentication
             spoofing.As described in their paper “Intercepting Mobile Communications:The
             Insecurities of 802.11,” Borisov, Goldberg, and Wagner identified a way to utilize
             weaknesses within WEP and the authentication process to spoof authentication into
             a closed network.The process of authentication, as defined by IEEE 802.11, is very
             simple. In a shared-key configuration, the AP sends out a 128-byte random string
             in a cleartext message to the workstation that is attempting to authenticate.The
             workstation then encrypts the message with the shared key and returns the
             encrypted message to the AP. If the message matches what the AP is expecting, the
             workstation is authenticated onto the network and access is allowed.
                 As described in the paper, if an attacker has knowledge of both the original
             plaintext and ciphertext messages, it is possible to create a forged encrypted mes-
             sage. By sniffing the wireless network, an attacker is able to accumulate many
             authentication requests, each including the original plaintext message and the
             returned ciphertext-encrypted reply. From this, the attacker can easily identify the
             keystream used to encrypt the response message.The attacker could then use it to
             forge an authentication message that the AP accepts as a proper authentication.
                 The wireless hacker does not need many complex tools to succeed in spoofing
             a MAC address. In many cases, these changes are either features of the wireless
             manufacturers or can be easily changed through a Windows Registry modification
             or through Linux system utilities. Once a valid MAC address is identified, the
             attacker needs only to reconfigure his device to trick the AP into thinking he is a
             valid user.
                 The ability to forge authentication onto a wireless network is a complex pro-
             cess.There are no known “off-the-shelf” packages available that provide these ser-
             vices.Attackers need to either create their own tool or take the time to decrypt the
             secret key by using AirSnort or WEPCrack.
                 If an attacker is using Windows 2000, and their network card supports reconfig-
             uring the MAC address, there is another way to reconfigure this information.A
             card supporting this feature can be changed through the System Control Panel.
                 Once an attacker is utilizing a valid MAC address, they are able to access any
             resource available from the wireless network. If WEP is enabled, the attacker will



          www.syngress.com
   233   234   235   236   237   238   239   240   241   242   243