-----Original Message-----
From: will***********************************
Sent: Wednesday, October 26, 2005 12:19 PM
To: Wilds, Beatrice
Cc: Paul Box
Subject: RE: Project Website

 

Yes and no... which is to say, it doesn't have to be that complicated.

 

Chow wants us to demonstrate a MitM attack across a wireless network... in

class. What we're breaking is less an issue, and here's why:

 

1) Once we have the software to do it in a cleartext WAP, we've proven that it

can be done.

2) Once we've got WEP to break (not that hard...) we just implement the same

attack and allow it to tear apart WEP (there are tons of tools for this)

3) MitM has been proven against many systems, including ssh and https. We can

either prove, or provide secondhand research to show it can be done.

 

MitM on Ethernet:

1) Poison the ARP Caches of the server/gateway and the client/victim.

Tell each

one that your MAC address is linked to their IPs. Route all packets from the

victim to you,

 

then to the server. Victim requests data, you request from the server, victim

thinks it comes from the server.

2) Read victim's traffic. Since it all passes through you, you can pcap or

tcpdump most of it into readable files/logs.

3) Sift the traffic for interesting things (passwords, handshakes,

certificates)

and optionally, use them to spoof the end user allowing you access to their

sites (think about the

 

client-side certificate demo... you present their cert.)

4) Proxy their secure connections. Present the server's cert to the client,

present your cert to the server. Filter all data. (https)

 

How it would work on Wireless:

1) Track the WAP's channel and learn its' MAC address, SSID, etc.

2) Listen for clients to connect to the WAP. Echo bad data to the WAP

to make it

look like the client's misauthenticating or set up wrong. Complete the

handshake

with the

 

client while spoofing the SSID/MAC/etc. Client thinks you're the WAP and

handshakes with you. Now establish your own session with the real WAP

using the

client's

 

credentials (all the way down to the IV if using WEP).

3) You're now the MitM, and since 802.11 works a lot like the old token ring,

hosts are going to ignore packets that are not destined for them. Suck up

passwords and spoof

 

connections just like you're on a wired LAN.

 

Tools worth considering (linux):

Wired:

Ethereal

Ettercap <--check this shit out.

Wireless:

Airsnort

Wepcrack

 

Immediate goals:

1) Get an acedemic understanding of how MitM works, then how 802.11 works.

2) Pick a testbed and build it

3) Crack/MitM a cleartext WAP

4) Crack/MitM a WEP WAP (man, that's confusing...)

5) Consider harder methods to try

6) Write it up and demo it in class

 

...and you thought I had dropped off the face of the earth...

Will :D

 

((have coffee, will travel))