Hacking. Joshua Lackey, Ph.D.

Similar documents
Software Radio and the Future of Wireless Security. Michael Ossmann Institute for Telecommunication Sciences

Wireless systems. includes issues of

Software Radio, GNU Radio, and the USRP Product Family

Introduction of USRP and Demos. by Dong Han & Rui Zhu

Universal Radio Hacker

Raveon Technologies Corporation iot.raveon.com

Wireless Networks (PHY): Design for Diversity

SDR Platforms for Research on Programmable Wireless Networks

Spectral Monitoring/ SigInt

CDMA Principle and Measurement

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design:

Rob Havelt Black Hat Europe, 2009

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Multiplexing Module W.tra.2

Software Defined Radio in Ham Radio Dennis Silage K3DS TS EPA Section ARRL

A GENERIC ARCHITECTURE FOR SMART MULTI-STANDARD SOFTWARE DEFINED RADIO SYSTEMS

Software Defined Radio. Listening to the Bleeps and Bloops around you

EENG 373. Communication Systems II

EE 304 TELECOMMUNICATIONs ESSENTIALS HOMEWORK QUESTIONS AND ANSWERS

Chapter 1 Acknowledgment:

Overview of Digital Mobile Communications

On the Design of Software and Hardware for a WSN Transmitter

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

Porting the p receiver on the ExpressMIMO Platform (LabSession OAI 2)

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

EENG 444 / ENAS 944 Digital Communication Systems


Introduc)on to Computer Networks

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

Personal Communication System

2 I'm Mike Institute for Telecommunication Sciences

An Introduction to Software Radio

DHANALAKSHMI SRINIVASAN COLLEGE OF ENGINEERING AND TECHNOLOGY CS6304- ANALOG AND DIGITAL COMMUNICATION BE-CSE/IT SEMESTER III REGULATION 2013 Faculty

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Research on key digital modulation techniques using GNU Radio

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Interoperability of FM Composite Multiplex Signals in an IP Based STL

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

Software Radio Network Testbed

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 2: Overview of Modern Wireless Communication Systems

A Rapid Graphical Programming Approach to SDR Design and Prototyping with LabVIEW and the USRP

CSCI-1680 Physical Layer Rodrigo Fonseca

IMPLEMENTATION OF SOFTWARE-BASED 2X2 MIMO LTE BASE STATION SYSTEM USING GPU

Weak-Signal Radio Communications for Bitcoin Network Resilience. Nick Szabo, Elaine Ou globalfinancialaccess.com Scaling Bitcoin 2017

EE107 Communication Systems. Introduction

Chapter 14. Cellular Wireless Networks

Systems for Audio and Video Broadcasting (part 2 of 2)

Know Your Options: Selecting the Right Remote Site Wireless Communications Technology for Collection & Reuse Distribution Systems

CHAPTER 27. RF Network Access Layer. Table of Contents

A LOW-COST SOFTWARE-DEFINED TELEMETRY RECEIVER

GSM and WCDMA RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

DOCSIS 1.0 Micro CMTS

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by

Software radio. Software program. What is software? 09/05/15 Slide 2

BSc (Hons) Computer Science with Network Security, BEng (Hons) Electronic Engineering. Cohorts: BCNS/17A/FT & BEE/16B/FT

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

T. Rétornaz 1, J.M. Friedt 1, G. Martin 2 & S. Ballandras 1,2. 6 juillet Senseor, Besançon 2 FEMTO-ST/CNRS, Besançon

AM and FM analogue signal demodulation

Module 3: Physical Layer

Sigfox RF & Protocol Test Plan for RC2-UDL-ENC

Difference Between. 1. Old connection is broken before a new connection is activated.

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Front End To Back End VLSI Design For Convolution Encoder Pravin S. Tupkari Prof. A. S. Joshi

Reverse Engineering Outernet:

ECE513 RF Design for Wireless

2002 IEEE International Solid-State Circuits Conference 2002 IEEE

Adoption of this document as basis for broadband wireless access PHY

Image transfer and Software Defined Radio using USRP and GNU Radio

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

ni.com Mounzer saleh Applications engineer Tel:

3. ADD-ON MODULES Due to hardware limitations, such as antenna design, the base node is limited to a 433 MHz band. Two

Fiber Distributed Data Interface

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

CSE 461: Bits and Bandwidth. Next Topic

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

UNIVERSITY OF MICHIGAN DEPARTMENT OF ELECTRICAL ENGINEERING : SYSTEMS EECS 555 DIGITAL COMMUNICATION THEORY

Advanced Digital Communication

Implementation of OFDM-based Superposition Coding on USRP using GNU Radio

Software Radio: An Enabling Technology for Mobile Communications

RADIO SYSTEMS ETIN15. Lecture no: GSM and WCDMA. Ove Edfors, Department of Electrical and Information Technology

Lecture 1 Introduction to Communication Systems. ECE4900/ECE6720 Digital Communications

Wireless Network Security Spring 2015

Wireless Communication Systems: Implementation perspective

Engr 1202 ECE. Clean Room Project

A Novel Design In Digital Communication Using Software Defined Radio

Chapter 2 Overview - 1 -

Ammar Abu-Hudrouss Islamic University Gaza

Tracking, Telemetry and Command

Chapter 5. North American Cellular System Based on Time Division Multiple Access

6.004 Computation Structures Spring 2009

CSE 461 Bits and Links. David Wetherall

Chapter 3 Digital Transmission Fundamentals

Amateur Station Control Protocol (ASCP) Ver Oct. 5, 2002

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

Transcription:

Hacking Joshua Lackey, Ph.D.

Ph.D., Mathematics. University of Oregon. 1995 2000 Senior Ethical Hacker. IBM Global Services. 1999 2005 Security Software Developer. Microsoft SWI Attack Team. 2005 Background

Hacking as a White Hat Requirements Technical Talk One 50 minute lecture Personal Requirements Not boring Introduction

Why would anyone spend $1.5k $2k per day for a penetration test? Question

Cost/benefit Risk analysis how? Example an MSRC bulletin costs between $100k and $200k. design review, threat model review, history of product/feature, training statistics feed into the risk analysis. this determines if more work must be performed. Answer

The goal of any penetration test or ethical hack is to determine the truth. Answer

Is what we believe, what we have been told actually true? Is what we designed, what we implemented secure? Truth

Adversarial Situations of course we did this securely Acquisitions quality analysis unknown environment Talent never even thought of that Truth

The best plans include security analysis in all phases of development. Design Penetration testing during design phase provides feedback before implementation. The worst flaws are design flaws. Implementation Software developers who understand how to write secure code. Truth

Does it really cost $1.5k $2k per day per penetration tester? For top-level penetration testers, these are the standard security consultant s fees. The main reason is that the talent required is not so common. Truth

Examples from work. Problem: I cannot discuss any of my good examples. Examples

Examples from my research. 802.11 Fragmentation Attack VW Key Fob GSM Examples

Most of what I m going to speak about is works-in-progress. There will be a lot of questions and very few answers. Examples

(This is finished research.) Serious Design Flaw trying to gauge how much this cost is difficult. (Especially since most people/companies haven t addressed this ) Would have been extremely difficult to find in design phase anyway. (Although possible.) 802.11 Fragmentation Attack

Best previous attack: Weaknesses in the Key Scheduling Algorithm of RC4. Fluhrer, Mantin, Shamir. Vendors countered by not using weak IVs. Unfortunately, this was not enough. (Although many thought it was.) 802.11 Fragmentation Attack

A vulnerability exists in the IEEE 802.11 protocol which allows an attacker the ability to transmit WEP encrypted packets without knowing the encryption key. This vulnerability allows an attacker to decrypt packets as well. This was disclosed to CERT on September 16, 2003. 802.11 Fragmentation Attack

RC4 Encryption If we denote by E_k(P) the encryption of the plain-text message P by the RC4 encryption method with key k, we have E_k(P) = X + P Where X is the pseudo-random bit-stream generated by the RC4 PRGA with key k. And thus E_k(P) + P = X 802.11 Fragmentation Attack

Logical Link Control Packets The most common LLC/SNAP packet seen on an 802.11 network is the Ethernet type LLC with IP. Explicitly, this packet consists of the following eight bytes. P' = { 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00, 0x08, 0x00 } 802.11 Fragmentation Attack

Logical Link Control Packets Each encrypted packet on an 802.11 network is encapsulated in a logical-link control packet. That is, each packet P is the concatenation of P', given above, and some P'. P = P' P'' 802.11 Fragmentation Attack

Logical Link Control Packets By the above comments on RC4, we can find the first eight bytes of the pseudo-random bit-stream X' generated by the key used to encrypt this packet, X' = E_k(P') + P' Because we know the plain-text P', we can encrypt any arbitrary eight bytes with key k. We have, for any eight byte text Q, E_k(Q) = X' + Q 802.11 Fragmentation Attack

802.11 Fragmentation Section 9.4 of the 1999 IEEE 802.11 protocol specification provides a method to fragment packets when needed. Moreover, each fragment is encrypted individually. 802.11 Fragmentation Attack

By transmitting packets in fragments, an attacker can inject arbitrary packets into a WEP encrypted 802.11 wireless network. 802.11 Fragmentation Attack

Capture a packet, including the 802.11 headers, off a WEP encrypted network. 08 41 02 01 00 04 5a 37 ee 75 00 0e 35 ea 00 00 24 50 da 11 00 01 55 f9 47 00 db 76 14 cf 05 c5 51 06 95 41 70 06 2d 4f 96 0e 3c 6f fc bd 38 a2 21 02 33 0c 50 f1 e9 ae 5e 16 49 41 75 e1 0a a4 17 66 01 8a 802.11 Fragmentation Attack Example

If we parse the 802.11 header, we find this packet contains the following. type: data frame, data only to_ds: 1, from_ds: 1, more_frag: 0, retry: 0, pwr_mgt: 0, more_data: 0, wep: 1, order: 0 dur: 102 a1: 00-04-5A-37-EE-75 a2: 00-0E-35-EA-75-17 a3: 00-00-24-50-DA-11 seq: frag = 00, num = 0010 data: 55 f9 47 00 db 76 e1 66 14 cf 05 c5 51 06 95 41 70 06 2d 4f 96 0e 0a 01 3c 6f fc bd 38 a2 21 02 33 0c 50 f1 e9 ae a4 8a 5e 16 49 41 802.11 Fragmentation Attack Example

The first 10 encrypted data bytes are: db 76 e1 66 14 cf 05 c5 51 06 Assuming that we have a IPv4 packet with a Ethertype LLC/SNAP header, the plain-text data is: aa aa 03 00 00 00 08 00 45 00 Therefore the first ten bytes of the pseudo-random bitstream are derived as follows. db 76 e1 66 14 cf 05 c5 51 06 + aa aa 03 00 00 00 08 00 45 00 ------------------------------- 71 dc e2 66 14 cf 0d c5 14 06 802.11 Fragmentation Attack Example

Suppose we wish to transmit an ICMP echo request. 45 00 00 2c 7a 0f 00 00 ff 01 33 b9 01 02 03 04 E..,z...3... 0a 01 00 02 08 00 6d 81 5d 02 2f 96 69 6e 6a 65...m.]./.inje 63 74 65 64 20 70 61 63 6b 65 74 00 cted packet. 802.11 Fragmentation Attack Example

Break this packet into fragments. fragment 0: data: aa aa 03 00 00 00 crc : f2 bb 67 21 fragment 1: data: 08 00 45 00 00 2c crc : 22 e7 83 c3 fragment 2: data: 25 4c 00 00 ff 01 crc : 8a 4d 83 9f fragment 3: data: 88 7c 0a 01 00 02 crc : a7 d1 72 ff [ ] 802.11 Fragmentation Attack Example

For each piece of fragmented data, encrypt with the pseudo-random bit stream and attach an 802.11 header. fragment 0: type: data frame, data only to_ds: 1, from_ds: 0, more_frag: 1, retry: 0, pwr_mgt: 0, more_data: 0, wep: 1, order: 0 dur: 0 a1: 00-04-5A-37-EE-75 a2: 00-0E-35-EA-75-17 a3: 00-00-24-50-DA-11 seq: frag = 00, num = 0024 data: 55 f9 47 00 db 76 e1 66 14 cf ff 7e 73 27 802.11 Fragmentation Attack Example

Continue. fragment 1: type: data frame, data only to_ds: 1, from_ds: 0, more_frag: 1, retry: 0, pwr_mgt: 0, more_data: 0, wep: 1, order: 0 dur: 0 a1: 00-04-5A-37-EE-75 a2: 00-0E-35-EA-75-17 a3: 00-00-24-50-DA-11 seq: frag = 01, num = 0024 data: 55 f9 47 00 79 dc a7 66 14 e3 2f 22 97 c5 802.11 Fragmentation Attack Example

Now transmit the fragments. The access point will decrypt each fragment and combine them into a single decrypted packet and forward it to the destination. 802.11 Fragmentation Attack Example

I omitted quite a few details, but this is the attack. It has been verified to work against all tested access points. Understandable as all this is specified in the protocol. For an excellent write-up of this attack, see Andrea Bittau s paper. (Better version that I co-authored is coming soon.) http://www.toorcon.org/2005/slides/abittau/paper.pdf 802.11 Fragmentation Attack Example

Now to talk about some research that isn t finished. But first, a small aside. Research

Once upon a time, radio was for hardware geeks. Expensive equipment. For digital signals, very expensive equipment. And sometimes not available to the general public. Of course custom hardware was always an option. Software Radio

Now we have inexpensive front end hardware. Uses your computer as the back end processor. Every signal is now only a matter of software. Free and increasingly full-featured SDR libraries. USRP The Universal Software Radio Peripheral. http://www.ettus.com Software Radio

USRP

Two A/D D/A converters A/D @ 64Msamples/sec D/A @ 128Msamples/sec AlteraFPGA Field Programmable Gate Array Daughterboard interfaces For RF integration BasicRX and BasicTX direct interface to AD/DA TVRX cable TV tuner interface DBSRX satellite TV tuner interface USRP

BasicRX @ 64Msamples/sec Receive frequencies up to 32MHz Broadcast AM Shortwave Aliased frequencies with decreased signal strength. Not so good for digital. BasicTX @ 128Msamples/sec Transmit frequencies up to 64MHz Daughterboards

TVRX cable TV tuner Receive frequencies from 50MHz to 900MHz Broadcast FM Police (analog and digital) Analog cellular phones (AMPS) Digital mobile phones DAMPS GSM iden Etc, etc, etc. Daughterboards

DBSRX satellite TV tuner Receive frequencies from 800MHz to 2.5(+)GHz GSM CDMA Bluetooth 802.11 Hydrogen (Radio Astronomy) Etc, etc, etc. Daughterboards

Software Radio Cheap hardware. Easily available. Highly flexible. Examining the security of complex wireless protocols is now possible for the independent researcher. We will gradually see more and more of wireless protocol vulnerabilities announced. Wireless Communication Security

Volkswagen Key Fob Every day I unlock my car with a radio. How secure is this? I m sure if we asked we would be told that, of course this is secure. What is the truth? What is the Algorithm? Quality of PRNG? (If used.) First step is to gather data. Examples

Volkswagen Key Fob Find key fob transmit frequency FFT signal search Frequency grabber FCC ID Search: https://gullfoss2.fcc.gov/prod/oet/cf/eas/reports/genericsearch.cfm Examples

FFT Signal Search VW Key Fob

FCC ID Search Get FCC ID from device. Grantee code is first three letters. VW Key Fob: NBG Frequency is 315MHz. Modulation type is A1D Amplitude modulation data transmission, double sideband, without using a modulating subcarrier. VW Key Fob

Modulation FCC gave us modulation. Can recognize different modulation types from FFT and raw signal. Estimate bandwidth. Filter. Examine closely. VW Key Fob

Capture signal (amplitude demod) VW Key Fob

First Signal VW Key Fob

Samples 25000 35000 of first signal VW Key Fob

Samples 31000 33000 of first signal VW Key Fob

Samples 32110 32880 of first signal VW Key Fob

Sampled at 500kHz Holds low for 250 samples.5ms Holds high for 500 samples 1ms For initial purposes Symbol length is.5ms Low is 0 High is 1 So the sample we were looking at was 011 VW Key Fob

Demod transmit Frequency signal bandwidth guess at symbol modulation Now just write some software! VW Key Fob

Examined ~100 examples. No repeats although there are definite patterns. Next steps Probably easiest thing to do would be to examine the demoded data for statistical patterns. (Diehard) See Bindview paper on strange attractors in TCP sequence numbers. http://www.bindview.com/services/razor/papers/2001/tcpseq.cfm VW Key Fob

GSM Documentation is very good and design flaws can be identified there. What about implementation flaws? What encryption does my phone use? A5/1 and A5/2 hacked. Actually, how do I know I m using any encryption at all? How about random numbers? How about man-in-the-middle attacks? Requires transmit and so probably illegal to test. Next

Find transmit frequency. FFT Signal Search just knowing the bandwidth is actually good enough FCC Search for towers in your area Documentation http://www.3gpp.org/specs/numbering.htm GSM

Turns out I have two strong signals reachable from my computer room. One at 1.9474GHz and the other at 1.9468GHz. GSM

GSM Tower at 1.9474GHz with 1MHz DBS filter. GSM

Modulation type is GMSK (or 8PSK) GSM

Capture signal (Samples 2M 3M @4Msps.) GSM

Samples 2M 2.001M GSM

Now, write some software! BCCH (SCCH) FIRE parity convolutional encoder / Viterbi decoder block interleaving map on burst content parsing Next channel GSM

Penetration testing can be useful cost/benefit. Costs for mistakes can be very high. Software radio is cool. More info? Ideas? Send me email: jl@thre.at Conclusion