Monday, 7 July 2014
Cracking WPA/WPA2 By brute forcing Wi-fi Protected Setup
For legal purposes, please don’t try
this on any equipment that you don’t
own.
Intro
Wi-fi Protected Setup more
commonly known as WPS is an
optional configuration tool
introduced in many Small office and
Home Office (SOHO) Wireless
routers starting in early 2007. This
Wi-Fi alliance certification program
was designed to ease the task of
SOHO wireless configuration by
providing an industry wide network
setup solution. Now a day most
major vendors of the SOHO class of
Wi-Fi routers ship there product
with WPS support and is activated
by default.
Today we will be taking a look at 2
flaws in the WPS design that can be
exploited in order to brute force
the WPS PIN. I will do a brief
overview of these 2 flaws then
follow up by providing instruction on
how to work through exploiting WPS
on a SOHO router using Backtrack 5
R3 and a tool called Reaver.
The Flaws
The flaws we will be looking at have
to do with WPS’s support for in-band
configuration over IEEE 802.11/EAP
specifically with the External
registrar process. This is the
process used by a WLAN host to
associate with a WAP by using the
devices WPS PIN. That being said
the first flaw with this external
registrar option is that it does not
require any authentication from the
WLAN host to associate with the
WAP leaving the PIN vulnerable to
Brute force type attacks.
The second Flaw has to do with the
way the WPS authentication process
is implemented with 802.11/EAP.
This process uses a challenge
response methodology and if at any
point in the process you fail to
correctly respond to the challenge
you receive a EAP-NACK Message.
This process also splits the key into
2 parts as shown below
|1|2|3|4|5|6|7|0|
1st half| 2nd half &
of PIN | Checksum
So by knowing what at what step we
are in the process when we receive
the EAP-NACK we reduce the
number of possibilities from 10^8
down to 10^4 +10^4 or 100,000,000
to 20,000 but since we know the 8th
digit is a checksum of the pin we are
really looking at 10^4 + 10^3 or
11,000 total testable combinations to
solve for the completed WPS PIN.
So with a tool like reaver testing 4
Pin’s every 3 seconds we can get
through all possible combinations in
approximately 4 hours.
Using Reaver with Backtrack 5 R3
What you will need: A copy of
Backtrack 5, and an external WLAN
adapter ( I use the Alfa networks
AWUS036H ) You will also need to
know the BSSID (MAC Address ) of
the Router you plan to attack. for
this you can use something like
airodump-ng to analyze all the AP’s in
the area.
So lets get to the fun stuff.
1. Load up your Backtrack 5 instance
2. Open up terminal and run the
following commands
a. CODE :
Sudo apt-get update
b. CODE :
Sudo apt-get install reaver
3. Make sure your Wi-fi adapter is
connected and then place it into
monitor mode
a. CODE :
Airmon-ng start wlan0
4. Next run the following command
to invoke reaver
a. CODE :
Reaver –I mon0 –b <BSSID of
target> -VV
Note: you can use CTRL+C to pause
and save the attack progress to
continue at a later time
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment