SlideShare a Scribd company logo
1 of 33
COEN 350
Mobile Security
Wireless Security
 Wireless offers additional challenges:
 Physical media can easily be sniffed.
 War Driving

Legal?
 U.S. federal computer crime statute, Title 18 U.S.C. 1030,

Crime to knowingly access a computer used in interstate or
foreign communication "without authorization" and obtain any
information from the computer.

Crime to access a computer without authorization with "intent
to defraud" to obtain "anything of value."

But not if "the object of the fraud and the thing obtained
consists only of the use of the computer and the value of
such use is not more than $ 5,000 in any 1-year period."
Wireless Security
 Wireless offers additional challenges:
 Physical media can easily be sniffed.
 Mobile computing needs to preserve
battery power.

Calculations cost more on a mobile platform.

Especially important for sensor networks
Wireless Security:
Attackers Perspective
 Knowing the Threat
 Targets of opportunity

Goal is
 Internet access.
 Easy pickings.
 Targeted attacks

Targets assets valuable enough.
 Internal attackers

Most Dangerous

Can open an unintentional security hole
COEN 351 E-Commerce
Security
 E-Commerce Security Course Homepage
 Lecture Notes
IEEE 802.11
 Wired Equivalent Privacy (WEP)
Protocol
 Based on a shared secret k.

Distributed out of band.
 Uses CRC for internal integrity protection.
 Uses RC4 to encrypt network traffic.
WEP Protocol
WEP Protocol
 Confidentiality
 Original packet is first check-summed.
 Checksum and data form the payload.
 Transmitting device creates a 24-bit
random initialization vector IV.
 IV and shared key are used to encrypt with
RC4
WEP Protocol
 RC4
 Generates a pseudo-random stream of
bytes (keystream)

Based on a secret internal state
 Permutation S of all 256 possible bytes
 Two index pointers
 Plaintext is XORed with keystream
WEP Protocol
 RC4
 Key Scheduling Algorithm (KSA)

Initializes S based on a key
for i from 0 to 255
S[i] := i
j := 0
for i from 0 to 255
j := (j + S[i] + key[i mod keylength]) mod 256
swap(S[i],S[j])
WEP Protocol
 RC4
 Pseudo-Random Generation Algorithm
(PRGA)

Generates pseudo-random byte stream
i := 0
j := 0
while GeneratingOutput:
i := (i + 1) mod 256
j := (j + S[i]) mod 256
swap(S[i],S[j])
output S[(S[i] + S[j]) mod 256]
WEP Protocol
 RC4
 Known weaknesses

Keystream slightly biased
 Fluhrer & McGrew attack can distinguish keystream
from random stream given a GB of input.
 Fluhrer, Mantin, Shamir: statistics for output of the
first few bytes of output keystream are non-random,
leaking information about key.
WEP Protocol
 Authentication
 Station associating with access point
needs to authenticate itself.
 Both exchange the type of authentication
that is accepted.

Open: Just identification between station and
AP

Shared Secret: Participants send nonces to
each other, encrypt the nonce using WEP (and
the shared secret key), and verify the other’s
response.
WEP has no key management
 Everyone allowed to have access to a
wireless network has the same key.
 Anyone with the key can read ALL
traffic.
WEP: RC4
 RC4 uses the key and the IV to produce
a stream of pseudo-random bytes.
 Calculates cipher text from plaintext by
XORing the pseudo-random stream
with the plain-text.
WEP: RC4
WEP: Attacks on RC4
 Dictionary Attack

Build database:

224
different IVs

Build a database of 224
streams of MTU bytes
(2,312 B) for each different IV.

Takes < 40 GB storage.
 XOR two entries with the same IV.

Result are the two plaintexts XORed.

Natural language text has enough redundancy
to decrypt the XOR of two text streams.
WEP: Attacks on RC4
 Dictionary Attack
 Many packages can be completely or
partially guessed.
 XORing guessed plaintext and captured
cipher gives pseudo-random byte stream
for a given IV.
 Some implementations reset IVs poorly.
 This simplifies dictionary attacks.
WEP: Attacks on RC4
 Injection Attack
 Attacker creates packets on the wireless
connection.
 Attacker XORs plaintext and cipher.

Builds Pseudo-Random Stream database
indexed by IV.
RC4
Fluhrer, Mantin, Shamir Attack
 First few bits of several thousand
messages reveals key.
 Based on an analysis of the RC4 code.

Originally kept secret, but later leaked on the
internet.
RC4
Fluhrer, Mantin, Shamir Attack
 Key Scheduling Algorithm
 Sets up RC4 state array S
 S is a permutation of 0, 1, … 255
 Output generator uses S to create a
pseudo-random sequence.
 First byte of output is given by
S[S[1]+S[S[1]]].

First byte depends on
 {S[1], S[S[1], S[S[1]+S[S[1]]}
RC4
Fluhrer, Mantin, Shamir Attack
 Key Scheduling Algorithm
 First byte of plain text package is part of the SNAP header

0xAA for IP and ARP packages

0xFF or 0xE0 for IPX

Guessing the first byte is trivial
 Some IVs are vulnerable: “resolved”

(KeyByte+3, 0xFF, *)

Plus some more
 Easy to test whether an IV is vulnerable.
 Search for vulnerable IVs.
 They leak key bytes probabilistically.
 Large number of packets does it.
RC4
Fluhrer, Mantin, Shamir Attack
 Optimization needs about 5,000,000 to
1,000,000 packages.
 Counter-measures:
 Change key frequently.
 Change IV counters to avoid bad IVs.
WEP Message Modification
 WEP uses CRC code to ascertain integrity of
messages.
 CRC code is linear:
 CRC(x ⊕ y) = CRC(x) ⊕ CRC(y).
 Attacker knows plaintext M and desired modification
∆ for target plaintext M’ = M ⊕ ∆.
 Attacker want to substitute X = P⊕(M,CRC(M)) for
P⊕(M’,CRC(M’)).
 Attacker sends
X⊕(∆,CRC(∆)) = P⊕(M,CRC(M)) ⊕(∆,CRC(∆))
= P⊕(M’,CRC(M’))
Wireless Insecurity Problems
 WiFi card software allows users to
change the MAC address.
Wireless Security
 Casual user, low yield traffic
 WEP is good enough.
 Enterprise, Commercial
 Combine WEP with higher order security

SSH

VPN

IPSec
WPA
 Created by WiFi Alliance
 Certification started April 2003
 Uses 802.1X authentication server

Distributed different keys to each user.
 Can also be used in “pre-shared key”
(PSK) mode

Every user uses the same passphrase.

Called WPA Personal
IEEE 802.1X
http://www.linux.com/howtos/8021X-HOWTO/index.shtml
 Standard for port-
based authentication.
 Uses a third-party
authentication server
such as Radius
WPA
 Protocol changes over WEP
 CRC is replaced by “Michael” MIC.

MIC now includes a frame counter, preventing replay
attacks.

Payload bit flipping is now impossible.
 Data encryption still uses RC4, but now

Prevents key recovery attacks on WEP by using
 128b Key
 48b Initialization vector
 Temporal Key Integrity Protocol (TKIP) changes key
dynamically.
TKIP
 Temporal Key Integrity Protocol
 Ensures that every data packet has its own
encryption key.
802.11i
 Uses AES instead of RC4.
 Subset published as WPA2
 Uses 802.1X authentication
Protocol Layers
 WEP
 Privacy only.
 Very elementary security.
 WPA
 Temporal Key Exchange Protocol

Fixes WEP that scrambles keys between packages and adds a secure
message check.
 AES: Advanced Encryption Standard
 802.11i
 Military grade encryption, replaces DES
 802.1X
 General purpose and extensible framework for authentication users
and generating / distributing keys.
 Simple Secure Network (SSN)
 Recipe for authentication based on 802.1X
COEN 351 E-Commerce
Security
 E-Commerce Security Course Homepage
 Lecture Notes

More Related Content

What's hot

Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talkanoean
 
Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPvanhoefm
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suiteYash Kotak
 

What's hot (20)

Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
CMIT 321 QUIZ 1
CMIT 321 QUIZ 1CMIT 321 QUIZ 1
CMIT 321 QUIZ 1
 
Ipsec
IpsecIpsec
Ipsec
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ipsec
IpsecIpsec
Ipsec
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Firewalls
FirewallsFirewalls
Firewalls
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Best!
Best!Best!
Best!
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Informal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIPInformal Presentation on WPA-TKIP
Informal Presentation on WPA-TKIP
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 

Viewers also liked

Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Sparkphanleson
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsphanleson
 
Lecture 1 - Getting to know XML
Lecture 1 - Getting to know XMLLecture 1 - Getting to know XML
Lecture 1 - Getting to know XMLphanleson
 
Lecture 4 - Adding XTHML for the Web
Lecture  4 - Adding XTHML for the WebLecture  4 - Adding XTHML for the Web
Lecture 4 - Adding XTHML for the Webphanleson
 
Lecture 07 - Executive Information Systems and the Data Warehouse
Lecture 07 - Executive Information Systems and the Data WarehouseLecture 07 - Executive Information Systems and the Data Warehouse
Lecture 07 - Executive Information Systems and the Data Warehousephanleson
 
HBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - OperationsHBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - Operationsphanleson
 
Learning spark ch10 - Spark Streaming
Learning spark ch10 - Spark StreamingLearning spark ch10 - Spark Streaming
Learning spark ch10 - Spark Streamingphanleson
 
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your DataLearning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your Dataphanleson
 
Session 1 Tp1
Session 1 Tp1Session 1 Tp1
Session 1 Tp1phanleson
 
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value PairsLearning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value Pairsphanleson
 
Hibernate Tutorial
Hibernate TutorialHibernate Tutorial
Hibernate TutorialRam132
 
Introduction to hibernate
Introduction to hibernateIntroduction to hibernate
Introduction to hibernatehr1383
 
Intro To Hibernate
Intro To HibernateIntro To Hibernate
Intro To HibernateAmit Himani
 
Hibernate tutorial for beginners
Hibernate tutorial for beginnersHibernate tutorial for beginners
Hibernate tutorial for beginnersRahul Jain
 

Viewers also liked (18)

Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Spark
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Lecture 1 - Getting to know XML
Lecture 1 - Getting to know XMLLecture 1 - Getting to know XML
Lecture 1 - Getting to know XML
 
Lecture 4 - Adding XTHML for the Web
Lecture  4 - Adding XTHML for the WebLecture  4 - Adding XTHML for the Web
Lecture 4 - Adding XTHML for the Web
 
Lecture 07 - Executive Information Systems and the Data Warehouse
Lecture 07 - Executive Information Systems and the Data WarehouseLecture 07 - Executive Information Systems and the Data Warehouse
Lecture 07 - Executive Information Systems and the Data Warehouse
 
HBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - OperationsHBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - Operations
 
Learning spark ch10 - Spark Streaming
Learning spark ch10 - Spark StreamingLearning spark ch10 - Spark Streaming
Learning spark ch10 - Spark Streaming
 
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your DataLearning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your Data
 
Session 1 Tp1
Session 1 Tp1Session 1 Tp1
Session 1 Tp1
 
COM Introduction
COM IntroductionCOM Introduction
COM Introduction
 
enterprise java bean
enterprise java beanenterprise java bean
enterprise java bean
 
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value PairsLearning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value Pairs
 
Hibernate Tutorial
Hibernate TutorialHibernate Tutorial
Hibernate Tutorial
 
JPA and Hibernate
JPA and HibernateJPA and Hibernate
JPA and Hibernate
 
Introduction to hibernate
Introduction to hibernateIntroduction to hibernate
Introduction to hibernate
 
Intro To Hibernate
Intro To HibernateIntro To Hibernate
Intro To Hibernate
 
Hibernate performance tuning
Hibernate performance tuningHibernate performance tuning
Hibernate performance tuning
 
Hibernate tutorial for beginners
Hibernate tutorial for beginnersHibernate tutorial for beginners
Hibernate tutorial for beginners
 

Similar to Mobile Security - Wireless hacking

Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and securityAdel Zalok
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Wireless Security (1).ppt
Wireless Security (1).pptWireless Security (1).ppt
Wireless Security (1).pptEvaBlessed
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Computer network (3)
Computer network (3)Computer network (3)
Computer network (3)NYversity
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security PresentationRenjith K P
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 

Similar to Mobile Security - Wireless hacking (20)

Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Security (1).ppt
Wireless Security (1).pptWireless Security (1).ppt
Wireless Security (1).ppt
 
Wireless security
Wireless securityWireless security
Wireless security
 
Hash
HashHash
Hash
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
G05114043
G05114043G05114043
G05114043
 
Chapter 15 - Security
Chapter 15 - SecurityChapter 15 - Security
Chapter 15 - Security
 
Computer network (3)
Computer network (3)Computer network (3)
Computer network (3)
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
WEP
WEPWEP
WEP
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 

More from phanleson

E-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server AttacksE-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server Attacksphanleson
 
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table designHBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table designphanleson
 
Hbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBaseHbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBasephanleson
 
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlibLearning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlibphanleson
 
Learning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQLLearning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQLphanleson
 
Learning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a ClusterLearning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a Clusterphanleson
 
Learning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark ProgrammingLearning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark Programmingphanleson
 
Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Sparkphanleson
 
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about LibertagiaHướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagiaphanleson
 
Lecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many PurposesLecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many Purposesphanleson
 
SOA Course - SOA governance - Lecture 19
SOA Course - SOA governance - Lecture 19SOA Course - SOA governance - Lecture 19
SOA Course - SOA governance - Lecture 19phanleson
 
Lecture 18 - Model-Driven Service Development
Lecture 18 - Model-Driven Service DevelopmentLecture 18 - Model-Driven Service Development
Lecture 18 - Model-Driven Service Developmentphanleson
 
Lecture 15 - Technical Details
Lecture 15 - Technical DetailsLecture 15 - Technical Details
Lecture 15 - Technical Detailsphanleson
 
Lecture 10 - Message Exchange Patterns
Lecture 10 - Message Exchange PatternsLecture 10 - Message Exchange Patterns
Lecture 10 - Message Exchange Patternsphanleson
 
Lecture 9 - SOA in Context
Lecture 9 - SOA in ContextLecture 9 - SOA in Context
Lecture 9 - SOA in Contextphanleson
 
Lecture 07 - Business Process Management
Lecture 07 - Business Process ManagementLecture 07 - Business Process Management
Lecture 07 - Business Process Managementphanleson
 
Lecture 04 - Loose Coupling
Lecture 04 - Loose CouplingLecture 04 - Loose Coupling
Lecture 04 - Loose Couplingphanleson
 
Lecture 2 - SOA
Lecture 2 - SOALecture 2 - SOA
Lecture 2 - SOAphanleson
 
Lecture 3 - Services
Lecture 3 - ServicesLecture 3 - Services
Lecture 3 - Servicesphanleson
 
Lecture 01 - Motivation
Lecture 01 - MotivationLecture 01 - Motivation
Lecture 01 - Motivationphanleson
 

More from phanleson (20)

E-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server AttacksE-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server Attacks
 
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table designHBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table design
 
Hbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBaseHbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBase
 
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlibLearning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlib
 
Learning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQLLearning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQL
 
Learning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a ClusterLearning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a Cluster
 
Learning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark ProgrammingLearning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark Programming
 
Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Spark
 
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about LibertagiaHướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
 
Lecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many PurposesLecture 2 - Using XML for Many Purposes
Lecture 2 - Using XML for Many Purposes
 
SOA Course - SOA governance - Lecture 19
SOA Course - SOA governance - Lecture 19SOA Course - SOA governance - Lecture 19
SOA Course - SOA governance - Lecture 19
 
Lecture 18 - Model-Driven Service Development
Lecture 18 - Model-Driven Service DevelopmentLecture 18 - Model-Driven Service Development
Lecture 18 - Model-Driven Service Development
 
Lecture 15 - Technical Details
Lecture 15 - Technical DetailsLecture 15 - Technical Details
Lecture 15 - Technical Details
 
Lecture 10 - Message Exchange Patterns
Lecture 10 - Message Exchange PatternsLecture 10 - Message Exchange Patterns
Lecture 10 - Message Exchange Patterns
 
Lecture 9 - SOA in Context
Lecture 9 - SOA in ContextLecture 9 - SOA in Context
Lecture 9 - SOA in Context
 
Lecture 07 - Business Process Management
Lecture 07 - Business Process ManagementLecture 07 - Business Process Management
Lecture 07 - Business Process Management
 
Lecture 04 - Loose Coupling
Lecture 04 - Loose CouplingLecture 04 - Loose Coupling
Lecture 04 - Loose Coupling
 
Lecture 2 - SOA
Lecture 2 - SOALecture 2 - SOA
Lecture 2 - SOA
 
Lecture 3 - Services
Lecture 3 - ServicesLecture 3 - Services
Lecture 3 - Services
 
Lecture 01 - Motivation
Lecture 01 - MotivationLecture 01 - Motivation
Lecture 01 - Motivation
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Mobile Security - Wireless hacking

  • 2. Wireless Security  Wireless offers additional challenges:  Physical media can easily be sniffed.  War Driving  Legal?  U.S. federal computer crime statute, Title 18 U.S.C. 1030,  Crime to knowingly access a computer used in interstate or foreign communication "without authorization" and obtain any information from the computer.  Crime to access a computer without authorization with "intent to defraud" to obtain "anything of value."  But not if "the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $ 5,000 in any 1-year period."
  • 3. Wireless Security  Wireless offers additional challenges:  Physical media can easily be sniffed.  Mobile computing needs to preserve battery power.  Calculations cost more on a mobile platform.  Especially important for sensor networks
  • 4. Wireless Security: Attackers Perspective  Knowing the Threat  Targets of opportunity  Goal is  Internet access.  Easy pickings.  Targeted attacks  Targets assets valuable enough.  Internal attackers  Most Dangerous  Can open an unintentional security hole
  • 5. COEN 351 E-Commerce Security  E-Commerce Security Course Homepage  Lecture Notes
  • 6. IEEE 802.11  Wired Equivalent Privacy (WEP) Protocol  Based on a shared secret k.  Distributed out of band.  Uses CRC for internal integrity protection.  Uses RC4 to encrypt network traffic.
  • 8. WEP Protocol  Confidentiality  Original packet is first check-summed.  Checksum and data form the payload.  Transmitting device creates a 24-bit random initialization vector IV.  IV and shared key are used to encrypt with RC4
  • 9. WEP Protocol  RC4  Generates a pseudo-random stream of bytes (keystream)  Based on a secret internal state  Permutation S of all 256 possible bytes  Two index pointers  Plaintext is XORed with keystream
  • 10. WEP Protocol  RC4  Key Scheduling Algorithm (KSA)  Initializes S based on a key for i from 0 to 255 S[i] := i j := 0 for i from 0 to 255 j := (j + S[i] + key[i mod keylength]) mod 256 swap(S[i],S[j])
  • 11. WEP Protocol  RC4  Pseudo-Random Generation Algorithm (PRGA)  Generates pseudo-random byte stream i := 0 j := 0 while GeneratingOutput: i := (i + 1) mod 256 j := (j + S[i]) mod 256 swap(S[i],S[j]) output S[(S[i] + S[j]) mod 256]
  • 12. WEP Protocol  RC4  Known weaknesses  Keystream slightly biased  Fluhrer & McGrew attack can distinguish keystream from random stream given a GB of input.  Fluhrer, Mantin, Shamir: statistics for output of the first few bytes of output keystream are non-random, leaking information about key.
  • 13. WEP Protocol  Authentication  Station associating with access point needs to authenticate itself.  Both exchange the type of authentication that is accepted.  Open: Just identification between station and AP  Shared Secret: Participants send nonces to each other, encrypt the nonce using WEP (and the shared secret key), and verify the other’s response.
  • 14. WEP has no key management  Everyone allowed to have access to a wireless network has the same key.  Anyone with the key can read ALL traffic.
  • 15. WEP: RC4  RC4 uses the key and the IV to produce a stream of pseudo-random bytes.  Calculates cipher text from plaintext by XORing the pseudo-random stream with the plain-text.
  • 17. WEP: Attacks on RC4  Dictionary Attack  Build database:  224 different IVs  Build a database of 224 streams of MTU bytes (2,312 B) for each different IV.  Takes < 40 GB storage.  XOR two entries with the same IV.  Result are the two plaintexts XORed.  Natural language text has enough redundancy to decrypt the XOR of two text streams.
  • 18. WEP: Attacks on RC4  Dictionary Attack  Many packages can be completely or partially guessed.  XORing guessed plaintext and captured cipher gives pseudo-random byte stream for a given IV.  Some implementations reset IVs poorly.  This simplifies dictionary attacks.
  • 19. WEP: Attacks on RC4  Injection Attack  Attacker creates packets on the wireless connection.  Attacker XORs plaintext and cipher.  Builds Pseudo-Random Stream database indexed by IV.
  • 20. RC4 Fluhrer, Mantin, Shamir Attack  First few bits of several thousand messages reveals key.  Based on an analysis of the RC4 code.  Originally kept secret, but later leaked on the internet.
  • 21. RC4 Fluhrer, Mantin, Shamir Attack  Key Scheduling Algorithm  Sets up RC4 state array S  S is a permutation of 0, 1, … 255  Output generator uses S to create a pseudo-random sequence.  First byte of output is given by S[S[1]+S[S[1]]].  First byte depends on  {S[1], S[S[1], S[S[1]+S[S[1]]}
  • 22. RC4 Fluhrer, Mantin, Shamir Attack  Key Scheduling Algorithm  First byte of plain text package is part of the SNAP header  0xAA for IP and ARP packages  0xFF or 0xE0 for IPX  Guessing the first byte is trivial  Some IVs are vulnerable: “resolved”  (KeyByte+3, 0xFF, *)  Plus some more  Easy to test whether an IV is vulnerable.  Search for vulnerable IVs.  They leak key bytes probabilistically.  Large number of packets does it.
  • 23. RC4 Fluhrer, Mantin, Shamir Attack  Optimization needs about 5,000,000 to 1,000,000 packages.  Counter-measures:  Change key frequently.  Change IV counters to avoid bad IVs.
  • 24. WEP Message Modification  WEP uses CRC code to ascertain integrity of messages.  CRC code is linear:  CRC(x ⊕ y) = CRC(x) ⊕ CRC(y).  Attacker knows plaintext M and desired modification ∆ for target plaintext M’ = M ⊕ ∆.  Attacker want to substitute X = P⊕(M,CRC(M)) for P⊕(M’,CRC(M’)).  Attacker sends X⊕(∆,CRC(∆)) = P⊕(M,CRC(M)) ⊕(∆,CRC(∆)) = P⊕(M’,CRC(M’))
  • 25. Wireless Insecurity Problems  WiFi card software allows users to change the MAC address.
  • 26. Wireless Security  Casual user, low yield traffic  WEP is good enough.  Enterprise, Commercial  Combine WEP with higher order security  SSH  VPN  IPSec
  • 27. WPA  Created by WiFi Alliance  Certification started April 2003  Uses 802.1X authentication server  Distributed different keys to each user.  Can also be used in “pre-shared key” (PSK) mode  Every user uses the same passphrase.  Called WPA Personal
  • 28. IEEE 802.1X http://www.linux.com/howtos/8021X-HOWTO/index.shtml  Standard for port- based authentication.  Uses a third-party authentication server such as Radius
  • 29. WPA  Protocol changes over WEP  CRC is replaced by “Michael” MIC.  MIC now includes a frame counter, preventing replay attacks.  Payload bit flipping is now impossible.  Data encryption still uses RC4, but now  Prevents key recovery attacks on WEP by using  128b Key  48b Initialization vector  Temporal Key Integrity Protocol (TKIP) changes key dynamically.
  • 30. TKIP  Temporal Key Integrity Protocol  Ensures that every data packet has its own encryption key.
  • 31. 802.11i  Uses AES instead of RC4.  Subset published as WPA2  Uses 802.1X authentication
  • 32. Protocol Layers  WEP  Privacy only.  Very elementary security.  WPA  Temporal Key Exchange Protocol  Fixes WEP that scrambles keys between packages and adds a secure message check.  AES: Advanced Encryption Standard  802.11i  Military grade encryption, replaces DES  802.1X  General purpose and extensible framework for authentication users and generating / distributing keys.  Simple Secure Network (SSN)  Recipe for authentication based on 802.1X
  • 33. COEN 351 E-Commerce Security  E-Commerce Security Course Homepage  Lecture Notes

Editor's Notes

  1. Course Homepage : http://ouo.io/SI9jJ Lecture Notes : http://ouo.io/0oFRv
  2. Course Homepage : http://ouo.io/SI9jJ Lecture Notes : http://ouo.io/0oFRv