<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/author/brad/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Wi-Fi Security &#8211; The Rise and Fall of WPS</title>
		<link>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/</link>
		<comments>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/#comments</comments>
		<pubDate>Fri, 18 Jan 2013 18:45:03 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3082</guid>
		<description><![CDATA[Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even homes. There are many Wi-Fi product vendors and service providers, providing different products with different services and features. The main reason behind [...]]]></description>
				<content:encoded><![CDATA[<p>Wireless local-area networks which are also referred to as WLANs or Wi-Fi are prevalent these days. They are so popular that they can be found installed in offices, colleges, hotels, cafes, and even homes. There are many Wi-Fi product vendors and service providers, providing different products with different services and features. The main reason behind them being so popular is the convenience, mobility and ease of implementation they provide compared to the wired network. The end user can easily access the network without the hassle of managing the wires.</p>
<p>Wireless networks are basically based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 set of standards for WLANs. Following is the list of the IEEE 802.11 network protocol standards.</p>
<h2>Protocols</h2>
<p><center><img class="alignnone size-full wp-image-3086" alt="figure-1" src="http://www.netstumbler.com/wp-content/uploads/figure-1.png" width="650" height="338" /></center></p>
<p style="text-align: center;">802.11 network standards are shown in Figure 1.<br />
<strong style="line-height: 28px;">Figure 1. 802.11 Network Standards (source: http://www.wikipedia.org)</strong></p>
<p>Some years back, wireless networks were only a niche technology used for very specific applications. But nowadays they are everywhere and every now and then we find a new Wi-Fi access point through our smart phones, tablets or laptops – most of which are not even secure.</p>
<p>Most of us have used these access points at some point in time to access the Internet without realizing how much (In)security they provide.</p>
<p>An insecure Wi-Fi network poses a threat not only to the owner but to every user that accesses it. The first line of defense for a Wi-Fi network is encryption, which encrypts the data transmitted between the Wi-Fi enabled device (smart phone, tablet, laptop etc.) and the wireless router. The Wireless Protected Access (WPA) protocol and more recent WPA2 have replaced the older and less-secure practice of Wireless Encryption Protocol (WEP). It is better to go with WPA2 as WEP is relatively easy to crack. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks by providing encryption mechanisms. But common users know little about wireless security and are scared by the available options to set up these methods.</p>
<p>Because of this unawareness and implementation issues with these protocols, in 2007 Wi-Fi Alliance came up with Wi-Fi Protected Setup (WPS) which allowed home users to easily add new devices to an already existing Wi-Fi network without entering long passphrases.</p>
<p><span id="more-3082"></span></p>
<p>Wi-Fi Protected Setup (WPS), originally known as Wi-Fi Simple Config, is a computing standard that attempts to allow easy establishment of a secure wireless home network. Almost all major Wi-Fi product vendors (Cisco/Linksys, Netgear, D-Link, Belkin, Buffalo, Technicolor, etc.) have WPS-certified devices. WPS is activated by default on almost all the WPS supporting devices. The main purpose of the standard is on providing usability along with security.</p>
<h2>Usage Methods</h2>
<p>WPS provides four usage modes for adding a new device to an existing network, which are explained below. But first some terminology that will used in the explanation:</p>
<p>Terminology:</p>
<p><strong>Enrollee</strong>: A new device that needs to be added to the network and does not have settings for the wireless network.</p>
<p><strong>Registrar</strong>: One which provides wireless settings to the enrollee.</p>
<p><strong>Access Point (AP)</strong>: One which provides normal wireless network hosting and acts as middleware to pass messages between the enrollee and the registrar.</p>
<p>The four modes provided by WPS can be classified into two groups: In-band and Out-of-band.</p>
<p>This classification is made based upon the channel utilized for the information transfer.</p>
<p><strong>In-Band modes</strong>:</p>
<p>Currently only these two modes are covered by WPS certification.</p>
<p><strong>Push-Button-Connect (PBC)</strong>:</p>
<p>The user merely has to push a button, either an actual or virtual one, on both the Access Point (or a registrar of the network) and the new wireless client device (enrollee). Support of this mode is mandatory for Access Points but optional for connecting devices. Figure 2 shows a Windows 7 machine as an enrollee. PBC on the AP will only be active until authentication has succeeded or timed-out after two minutes (or whatever amount of time the vendor has specified). This option is called wps_pbc in wpa_cli (text-based frontend) which interacts with wpa_supplicant; wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA and WPA2.</p>
<p><img class="aligncenter size-full wp-image-3087" alt="figure-2" src="http://www.netstumbler.com/wp-content/uploads/figure-2.png" width="516" height="275" /></p>
<p align="center"><strong>Figure 2. Activated virtual push button (Windows 7: Enrollee)</strong><b><br />
</b><em>Source: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf</em></p>
<p><strong>PIN Mode</strong>:</p>
<p>In this method a Personal Identification Number (PIN) has to be read from either a label or the display unit on the new wireless device. Figure 3 shows a WPS PIN on the label of a D-Link router. This PIN must then be inputted at the representant of the network (usually AP). Alternately, a PIN on the Access Point may be entered into the new device. This can also be explained on the basis of registrar, as following.</p>
<p><strong>Internal Registrar</strong></p>
<p>The user enters the PIN of the Wi-Fi adapter into the web interface of the AP. This option is called wps_pin in wpa_cli.</p>
<p><strong>External Registrar</strong></p>
<p>The user enters the PIN of the AP into a form on the client device (e.g. computer).</p>
<p>This option is called wps_reg in wpa_cli.</p>
<p>The PIN Method is a mandatory standard method; every Wi-Fi Protected Setup (WPS) certified product needs to support it.</p>
<p><img class="aligncenter size-full wp-image-3088" alt="figure-3" src="http://www.netstumbler.com/wp-content/uploads/figure-3.png" width="455" height="432" /></p>
<p align="center"><strong>Figure 3.WPS PIN on D-Link router</strong><b><br />
</b><em>Source: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf</em></p>
<p><strong>Out-of-Band modes</strong>:</p>
<p>These two modes are not covered by WPS certification.</p>
<p><strong>Near-Field-Communication (NFC) method</strong>:</p>
<p>In this method the user merely has to bring the new client adjacent to the Access Point to permit a near field communication among the two devices. The NFC method offers strong defense against adding an unintended device to the network. Support of this mode is optional and is not widely deployed.</p>
<p><strong>USB method</strong>:</p>
<p>In this method the user uses a USB drive to transfer data between the new client device and the Access Point of the network. Support of this mode is optional, but denounced.</p>
<h2>Protocol</h2>
<p>Wi-Fi Protected Setup doesn’t enhance security features to devices. It simply makes the existing security features easy to enable and configure. One of the key elements of the WPS protocols is Extensible Authentication Protocol (EAP). EAP is an authentication framework often used in wireless networks and Point-to-Point connections. It provides for the transport and usage of keying material and parameters generated by EAP methods.</p>
<p>The WPS protocol consists as a sequence of EAP message exchanges that are initiated by a user action and relies on an exchange of descriptive information that should precede that user’s action. This descriptive information is transmitted through a new Information Element (i.e., an information component which when combined with other information provides the required information product) that is added to the beacon (periodically send management frame by AP), probe response and optionally to the probe request and association request/response messages.</p>
<p>IEs will hold the possible and the currently installed, configuration methods of the device other than purely informative type-length-values (TLV).</p>
<p>A human trigger is required to initiate the actual session of the protocol after the identification of the device’s capabilities on both the ends. The session consists of 8 messages followed by a message to indicate the protocol is completed (in case of a successful session). The exact stream of messages may change when configuring various kinds of devices (AP or STA).</p>
<p>Until very recently this protocol was used to provide the users with a feature of easy implementation of security on their Wi-Fi networks, but a recently discovered flaw has again put the wireless networks, and hence the users, at risk.</p>
<h2>Security Issue</h2>
<p>In December 2011 a freelance information security researcher <strong>Stefan Viehböck</strong> reported a design and implementation flaw in WPS that makes it vulnerable to a very basic hacking technique: brute-force attacks, feasible to perform against WPS-enabled Wireless networks. It can be simply understood as an attacker trying thousands of combinations in rapid sequence until he/she happens on the correct 8-digit PIN that allows authentication to the device. A successful attack on WPS allows unauthorized user to gain access to the network. The research paper of Viehböck can be found at http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf. This vulnerability was also independently uncovered by <strong>Craig Heffner</strong><b> </b>of Tactical Network Solutions, and involves how the router responds when incorrect PINs are inputted. When a PIN is entered, the router implementing WPS indicates whether the first or second halves of the PIN are correct or not.</p>
<p>&nbsp;</p>
<p>The vulnerability revolves around the acknowledgement messages transmitted between the registrar and enrollee during the validation process of a PIN. The PIN, which is printed on the side label of each WPS-enabled Wi-Fi router, is an 8 digit number. As the last digit is a checksum of the previous digits,<sup><br />
</sup>there are seven unknown digits in each PIN, yielding a total of 10<sup>7</sup> = 10,000,000 possible combinations. The first and second halves of the PIN are separately validated and reported by the registrar when an enrollee tries to gain access through the PIN.</p>
<p>&nbsp;</p>
<p>Now the maximum number of guesses required for PIN recovery is 11,000 (10<sup>4</sup>=10,000 from the first half + 10<sup>3</sup>=1,000 from the second half). This is a drastic reduction of the orders of degreea from the number of PINs that would have to be tested in the absence of the design flaw (i.e. 10<sup>7</sup>=100,000,000). The result of this flaw is the presence of a practical attack which can be finished within hours. The difficulty of exploiting this flaw is that it is dependent on the implementation of WPS by the vendor, as Wi-Fi router manufacturers could guard against this attacks by slowing down or disabling the WPS feature after some failed PIN validation efforts.</p>
<p>Two tools have been developed as proof of concept to demonstrate that the attack is practical. Tactical Network Solutions, the Maryland based firm that released the first tool ‘Reaver’, states that they are aware of the vulnerability since early 2011. Tactical Network Solutions decided to release the tool after the vulnerability was made public. It is also selling a commercial version called ‘Reaver Pro’ with some more features. Reaver is hosted on Google Code at http://code.google.com/p/reaver-wps/. Its authors say that it can recover a router’s plain-text WPA or WPA2 password in 4 to 10 hours, depending on the access point.</p>
<p>The second tool is a PoC brute force tool implemented in Python and is a bit faster than Reaver, but supports less wireless adapters, as stated on the author’s website (http://sviehb.wordpress.com/). This tool can be found at http://dl.dropbox.com/u/22108808/wpscrack.zip.</p>
<p><strong style="line-height: 28px;">Reaver</strong></p>
<p>Reaver, developed by Tactical Network Solutions, runs on Linux. It aims the external registrar functionality mandated by the Wi-Fi Protected Setup requirement. It executes a brute force attack against an access point’s Wi-Fi Protected Setup (WPS) pin number. Once the WPS pin is found, an attacker can recover the WPA PSK and alternately reconfigure the AP’s wireless settings which could lead towards an insecure network. Although Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is recovered. Reaver requires the libpcap (packet capture and transmission) and libsqlite3 (database) libraries and can be built and installed by running the command:</p>
<p><code> 1 $ ./configure<br />
2 $ make<br />
3 # make install<br />
</code></p>
<p><code>To remove everything installed/created by Reaver, the following command can be used:<br />
1 # make distclean<br />
</code></p>
<p><code>Once installed the tool can simply be started using the command:<br />
1 # ./reaver<br />
</code></p>
<p><code>The ‘–help’ argument can be used to show all the arguments available within the tool. Figure 4 shows the help list of the Reaver.</code></p>
<p><img class="aligncenter size-full wp-image-3089" alt="figure-4" src="http://www.netstumbler.com/wp-content/uploads/figure-4.png" width="975" height="447" /></p>
<p align="center"><strong>Figure 4. Help list of Reaver </strong></p>
<p align="center"><strong>(Source:</strong> http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>The only requirement it has is a wireless card capable of raw packet injection. To start the process the wireless card must be put on monitor mode. This can be easily done using the airmon-ng tool from the wireless security testing aircrack-ng tool suite as shown below.<br />
<code> 1 # airmon-ng start wlan0</code></p>
<p>The only essential arguments to Reaver are the interface name and the BSSID of the target AP, an example of which is shown below.<br />
<code>1 # reaver -i mon0 -b 00:01:02:03:04:05</code></p>
<p>Sometimes Reaver just tries the same pin over and over again. This might be because WPS is not enabled on the AP. Run the walsh tool (included in the Reaver-1.3 release) to scan for WPS-enabled APs and make sure the target AP is listed.</p>
<p>For extra information output, the verbose option may be provided using the argument ‘–v’. Providing the verbose option twice (-vv) will increase verbosity and display each pin number as it is attempted as shown in Figure 5.</p>
<p><img class="aligncenter size-full wp-image-3090" alt="figure-5" src="http://www.netstumbler.com/wp-content/uploads/figure-5.png" width="650" height="240" /></p>
<p align="center"><strong>Figure 5. Reaver in action </strong></p>
<p align="center"><strong>(Source:</strong> http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>To speed up the attack the delay between pin attempts can be disabled by adding ‘–d 0? on the command line (default delay: 1 second).</p>
<p><code>1 # reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0</code></p>
<p>Another option that can speed up an attack is ‘–dh-small’. This option tells Reaver to use small Diffie-Hellman secret numbers in order to shrink the computational load on the target AP. In case the attacker does not want to reveal his/her MAC address, Reaver also supports MAC spoofing with the ‘–mac’ option, but it must be ensured that the MAC address of your wireless card’s physical interface (wlan0) must be changed – not the monitor mode interface (usually mon0) – otherwise the attack won’t work<strong style="line-height: 28px;">.</strong><b style="line-height: 28px;"> </b>Reaver keeps on brute forcing the PINs until a successful attempt. It has been stated that some models/vendors/ISPs come pre-configured with a default pin. Some common pins are 12345670, 00005678, 01230000, etc. Reaver attempts known default pins first as a better heuristic. Figure 6 shows a successfully cracked WPS PIN in 32,286 seconds.</p>
<p><img class="aligncenter size-full wp-image-3091" alt="figure-6" src="http://www.netstumbler.com/wp-content/uploads/figure-6.png" width="975" height="113" /></p>
<p align="center"><strong>Figure 6. Successful Recovery </strong></p>
<p align="center"><strong>(Source:</strong>http://www.hack4fun.eu/2012/01/reaver-wps-wpscrack/)</p>
<p>Due to interference or low signal strength Reaver sometimes can’t associate with the AP. It might also be a driver issue.</p>
<p>Below is a list of wireless drivers tested by Reaver:</p>
<p><strong>Supported:</strong></p>
<p>The following wireless drivers have been tested or reported to work successfully with Reaver:</p>
<ul>
<li>ath9k</li>
<li>rtl8187</li>
<li>carl19170</li>
<li>ipw2000</li>
<li>rt2800pci</li>
<li>rt73usb</li>
</ul>
<p><strong>Partially Supported:</strong></p>
<p>The following wireless drivers have had mixed success, and may or may not work depending on your wireless card:</p>
<ul>
<li>ath5k</li>
<li>iwlagn</li>
<li>rtl2800usb</li>
<li>b43</li>
</ul>
<p>Not Supported:</p>
<p>The following wireless drivers/cards have been tested or reported to not work properly with Reaver:</p>
<ul>
<ul>
<li>iwl4965</li>
<li>RT3070L</li>
<li>Netgear WG111v3</li>
</ul>
</ul>
<p>Technically more than one instance of Reaver can be run against an AP, but this approach is flawed as it will only result in a double resource load on AP. Reaver advanced options (using ‘–a’ attribute) can be utilized to speed up the attack.<br />
<strong>Mitigation</strong><br />
End users can disable WPS to prevent an attack, but because of the unawareness most people do not turn it off. Some access points don’t even provide an option to disable WPS.</p>
<p>Vendors can mitigate the flaw by introducing sufficiently long lock down periods (after unsuccessful attempts) to make the attack impractical to implement. This will require a new firmware release. Vendors also need to intensively test the protocols before implementing them on their devices, so that such flaws don’t come up in the future.</p>
<h2>Conclusion</h2>
<p>Today we are all surrounded by many Wi-Fi networks and have used them at some point in time without realizing the issues of the security. The issues discussed in this article are not the only issues related to wireless security, but a recent and major one affecting the privacy of the end users.</p>
<p>As we already know, almost all major router/AP vendors have WPS-certified devices and WPS–PIN (External Registrar) is mandatory for certification, which makes a lot of devices vulnerable to such an attack.</p>
<p>Having a sufficiently long lock-down period (vendor mitigation method) is most likely not a requirement for WPS certification for the device. However it should be a requirement in the new specifications. The vendors need to release new firmware to eliminate the issue. The main argument this issue presents before us is that such other flaws might be already present in other devices/protocols and misused by malicious intruders, hence the only safeguard we need to take is awareness among end users. Also the certifying authorities and the vendors need to thoroughly test the devices/protocols before implementation so that security features ultimately don’t lead towards insecurity.</p>
<p><i>Sudhanshu Chauhan is a security researcher for InfoSec Institute. </i><a href="http://www.infosecinstitute.com"><i>InfoSec Institute</i></a><i> is a security certification company that has trained over 15,000 people including popular CEH and </i><a href="http://www.intenseschool.com/boot_camp/cisco/ccna"><i>CCNA certification courses</i></a><i>.</i></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2013/01/18/wi-fi-security-the-rise-and-fall-of-wps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is Marius Milner the unnamed google engineer?</title>
		<link>http://www.netstumbler.com/2012/05/07/is-marius-milner-the-unnamed-google-engineer/</link>
		<comments>http://www.netstumbler.com/2012/05/07/is-marius-milner-the-unnamed-google-engineer/#comments</comments>
		<pubDate>Mon, 07 May 2012 16:45:57 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Wardriving]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3073</guid>
		<description><![CDATA[Although sited in a number of articles about Marius Milner being the alleged Google engineer who was behind the WiFi mapping.   http://www.crn.com.au http://blog.seattlepi.com http://www.bloomberg.com FCC report on Google Street View Wi-Fi data collection We at Netstumbler.com have no comment at this time.]]></description>
				<content:encoded><![CDATA[<p>Although sited in a number of articles about Marius Milner being the alleged Google engineer who was behind the WiFi mapping.   </p>
<p><a href="http://www.crn.com.au/News/299072,netstumbler-creator-behind-google-wi-fi-snoop.aspx" rel="nofollow">http://www.crn.com.au</a></p>
<p><a href="http://blog.seattlepi.com/techblog/2012/05/01/report-google%E2%80%99s-wi-fi-sniffing-street-view-code-came-from-netstumbler%E2%80%99s-creator/" rel="nofollow">http://blog.seattlepi.com</a></p>
<p><a href="http://www.bloomberg.com/news/2012-05-04/google-s-wargaming-engineer-doe-at-privacy-probe-center.html" rel="nofollow">http://www.bloomberg.com</a></p>
<p><a style="margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block; text-decoration: underline;" title="View FCC report on Google Street View Wi-Fi data collection on Scribd" href="http://www.scribd.com/doc/91952307">FCC report on Google Street View Wi-Fi data collection</a><iframe id="doc_31829" src="http://www.scribd.com/embeds/91952307/content?start_page=1&amp;view_mode=list" frameborder="0" scrolling="no" width="100%" height="600" data-auto-height="true" data-aspect-ratio=""></iframe></p>
<p>We at Netstumbler.com have no comment at this time.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2012/05/07/is-marius-milner-the-unnamed-google-engineer/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>So you want to be a Security Consultant?</title>
		<link>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/</link>
		<comments>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/#comments</comments>
		<pubDate>Wed, 21 Dec 2011 20:23:35 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3050</guid>
		<description><![CDATA[This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security. So, the first and most important thing to learn in my opinion is TCP/IP. [...]]]></description>
				<content:encoded><![CDATA[<p>This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security.</p>
<p>So, the <strong>first and most important thing to learn</strong> in my opinion is <a href="http://en.wikipedia.org/wiki/TCP/IP_model">TCP/IP</a>. You need to know it as well as you do the alphabet. The majority of people I meet in the University world and out in industry do not have a detailed and thorough knowledge of TCP/IP. For a security consultant it is best that you can look at the packets and know exactly what is taking place at the lowest level the wire. Elite hackers know TCP/IP as well as they can write their name. To be able to secure the environment and the enterprise it is imperative you know it like they do.</p>
<p>Take wireless for example, many people will start playing with <a href="http://www.wireshark.org">Wireshark</a> to observe the traffic over the wireless card, as most of you can attest to when you first use Wireshark with a wireless card you start a capture, and you see NOTHING, because you are at the application layer, and do not have a good understanding of the lower layers, and also do not understand that you need to be in monitor mode to capture traffic for the most part, and you are connected to the network, and cannot sniff the wireless traffic, so as you read the alert message that tells you to check the selection for promiscuous mode, and then you deselect it, and what do you see?  You see the 802.3 Ethernet traffic and not the 802.11 traffic you were expecting. Taking it one step further you need an understanding of the PHY layer before you start looking at a tools that analyze it for you.<br />
<span id="more-3050"></span><br />
The <strong>second most important thing is to learn</strong> Linux and Unix. Also, do not stop at Linux, download one of the Unix virtual machines and play with it until you get proficient at it.</p>
<p>A note on<strong> certifications</strong>, <em>they are good for getting you an interview, but once you get that interview you have to convince the people there that you know what you are doing.</em> There is <strong>no certification that can replace hands-on experience and knowledge</strong>, you can get that on your own by using virtual machines and building and running your own test labs. <em>The concern over certifications is most are based on rote memorization, it is the same problem we have in academic circles (more on that in a moment). </em></p>
<p>The problem with this is when you study and cram for a certification exam you memorize something take a test, and then you get certified, but what does this really mean? In my view it means you studied and took a test, and  be honest, some of these classes cram all of the information into your brain in 4-5 days, and if the class does not provide a study guide, or something similar to practice the types of questions you  may encounter you would not see 90% and above exam success rates touted by so many sites. Now, we shall discuss academic thinking, most of the “academics” without industry experience do not understand what I have been talking about either. I was on a <em>team that developed a Master of Science in Information Security</em>, and I was the only non-academic on the team, the entire group was made up of all PhDs but me, and as we discussed the curriculum I focused on teaching the students protocol analysis &#8230;  that is packets! Well this shocked pretty much all of the team, but I argued my point in many of the meetings, and finally swayed enough support where we had packet and protocol analysis as part of the curriculum</p>
<p>The <strong>most important thing I look for when hiring someone</strong> when I was running the Network Operations Center (NOC) is <strong>desire and initiative to learn</strong>. I would interview people with a list of certification as long as their arm, and when I asked them practical questions, they could not answer them, so they did not get the job. This is because I had junior personnel who could answer the questions, so how could I give someone a position over one of them at about 5 times the amount of pay they were getting. I could not justify it, and never did waiver on that. If  a person has desire that is the most important thing.  I had a guy come in fresh out of bootcamp that did not even know what UNIX was, and in 6 months he became my UNIX expert.</p>
<p>Another thing that helps is <strong>understanding programming</strong>, you do not have to be proficient at it, but being able to look at code and at least understand the fundamental concepts of it is very important in this field.</p>
<p><strong>Finally, it is all about research</strong>, I learned to do research in Graduate school, I had a Professor Frank Coyle that specializes in using JAVA for real time systems, and he was instrumental in teaching me how to do research, and that is the intent of these short research topics, the more practice you get the better you get to be at it. Today with the amount of online information you can  research  in a few hours with the Internet. When I was in graduate school, I spent weeks doing research at libraries, take advantage of this opportunity we have today. Recommend you dedicate one hour a night to reading something, a whitepaper etc. <em>There is a saying in the consultant field that as long as you can read the manual and understand it faster than the client you will always get the contract. That is why research is so important.</em></p>
<p>As I like to tell my clients, up until 2006 my certification count was 0, and now it is at 20, so it is not about getting a certification, it is what you do before and after you get that cert.</p>
<p><strong>- Kevin</strong></p>
<p>Kevin Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an adviser to numerous government entities within the US and UK.</p>
<p>He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the<strong> author of the Center for Advanced Security and Training (CAST) Advanced Network Defense</strong> course. He is <strong>technical editor of the Learning Tree Course Ethical Hacking and Countermeasures</strong> and Computer Forensics. He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a <strong>contributing author</strong> to the <strong>Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period</strong>. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.</p>
<p>You can find more information about Kevin at <a href="http://www.elitesecurityandforensics.com">www.elitesecurityandforensics.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Offensive Mobile Forensics</title>
		<link>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/</link>
		<comments>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/#comments</comments>
		<pubDate>Mon, 12 Dec 2011 16:32:26 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wi-Fi]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3028</guid>
		<description><![CDATA[Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices – smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in your environment? What is your plan for handling mobility in the Enterprise? But the biggest question of all is – What does [...]]]></description>
				<content:encoded><![CDATA[<p>Christmas is around the corner. Some of the top gifts are going to be shiny new mobile devices – smartphones, tablets, hacked Kindle Fires, Playbooks, and others. Is Exchange ActiveSync turned on in your environment? What is your plan for handling mobility in the Enterprise? But the biggest question of all is – What does a lost or stolen mobile device mean to your organization in terms of risk? What about when the CEO loses her device? Can you quantify your risk today?</p>
<p>The data leakage disclosed in this post has been gathered from a technique the author refers to as Offensive Mobile Forensics.  The term forensics is usually associated with incident response and management.  In other words, an activity performed after something bad has happened.  In contrast, offensive forensics is the act of preemptively performing a forensic analysis of systems or applications as a function of security testing, or for the purpose of quantifying risk.  An interesting side-effect of applying this technique to mobile device analysis is that it enables one to truly understand the risk of an attacker stealing or finding a lost device.  For example, if your analysis turns up native or third-party applications storing user credentials in cleartext – the author has seen everything from Facebook and Twitter to enterprise users’ Exchange ActiveSync credentials stored in the clear – depending on the accounts and data available, that could be a serious issue.<br />
<span id="more-3028"></span><br />
This technique depends on the ability to jailbreak (iOS) or root (Android) the target device, which provides root access to the underlying file system. If the reader is unfamiliar with these terms, some great resources to learn about jailbreaking and rooting are <a href="http://www.redmondpie.com/">Redmond Pie</a> (iOS) and <a href="http://www.xda-developers.com/">XDA-Developers</a> (Android). The author typically utilizes <a href="http://blog.iphone-dev.org/">Redsn0w</a> for iOS and <a href="http://forum.xda-developers.com/showthread.php?t=803682">SuperOneClick</a> for Android, performing virtually all Android analysis on Samsung devices.</p>
<p><strong>iOS</strong></p>
<p>After jailbreaking is complete, only one other tool is necessary, OpenSSH, used to pull data from the device to a host computer for analysis over WiFi.  However, as is always the case with information technology, there’s more than one way to accomplish your objective.  So, experiment with other tools, and tweak and tune your own methodology.</p>
<p>Although outside the scope of this blog post, readers interested in learning about some of the other tools used for this analysis technique can check out the <a href="http://hakin9.org/hacking-data-1111/">iOS Insecurities</a> article in November’s issue of Hackin9 Magazine. The article is a greatly expanded version of what’s here, and also includes a table listing physical locations on iOS devices that contain interesting information for analysis.</p>
<p>There are many different locations containing interesting data on iOS devices.  Data often resides in SQLite databases, the chosen format for local storage on mobile devices.  The next best place to find sensitive information is in plist, or property list files – these are the primary storage medium for configuration settings in iOS, and they are also a fantastic source of sensitive information.  User credentials are often stored here, instead of inside the KeyChain where they should be.  Rounding out the top three data sources are binary or binary-encoded files, such as the device’s keyboard cache and pasteboard.  Although storage locations commonly change with the release of new iOS firmware, it is fairly simple to poke around the general area and find what you’re looking for.</p>
<p>The most severe threat to mobile devices and applications is loss or theft of the device.  As the old saying goes, “if an attacker has physical access, it is game over.”  It only takes a few days of analyzing applications on a device to discover that the vast majority of mobile application developers fail to consider the threat of physical access to their data.  Simply put, they are stuck in the mindset of web application or client/server developers, where virtually all threats affect applications remotely.  Add some terrible design and implementation decisions related to native apps and services from Apple themselves, and you have a device that can pose a significant risk to enterprises and consumers in the event of loss or theft.  The following examples are provided in no particular order.</p>
<p><strong>Keyboard Cache (dynamic-text.dat)</strong></p>
<p>In an effort to learn how users type, iOS devices utilize a feature called AutoCorrection to populate a local keyboard cache on the device.  The problem is this feature records everything a user types that is not entered into a SECURE text field, which masks displayed data.  The author fondly refers to this feature as “Apple’s native keylogging facility”.  Data typed into text fields for virtually any application can remain in the cache for more than a year if it is not reset periodically by the user:</p>
<p>Settings &gt; General &gt; Reset &gt; Reset Keyboard Dictionary</p>
<p>Developers can also disable this feature programmatically by using the AutoCorrection = FALSE directive in desired UITextFields, although studies conducted with applications disabling this feature have shown users unanimously disapprove of it.</p>
<p>The file itself is a binary file, so passing it to the utility ‘strings’ is all that is required to generate newline-terminated output suitable for analysis.  Figure 1 displays the result of running ‘strings’ against the file, and Table 1 provides examples of near-complete conversations recorded by AutoCorrection.</p>
<div id="attachment_3035" class="wp-caption alignleft" style="width: 242px"><img class="size-medium wp-image-3035" title="KeyBoardCache" src="http://www.netstumbler.com/wp-content/uploads/KeyBoardCache-232x300.png" alt="" width="232" height="300" /><p class="wp-caption-text">Figure 1: Keyboard cache output to stdout in terminal</p></div>
<p>The keyboard cache is a well-known weakness in the iOS system, and there are many more interesting system-related locations to explore as an exercise for the reader.</p>
<div id="attachment_3036" class="wp-caption alignleft" style="width: 738px"><img class="size-full wp-image-3036" title="keyboard-cache" src="http://www.netstumbler.com/wp-content/uploads/keyboard-cache.jpg" alt="" width="728" height="179" /><p class="wp-caption-text">Table 1: Keyboard cache entries - read column top-down</p></div>
<p><strong>Application Data Leakage</strong></p>
<p>Third-party applications represent the greatest threat of data leakage on iOS devices.  This is usually the result of lazy or poorly-informed, or trained, developers storing user credentials or other sensitive information in clear text.  This threat can be mitigated by developers in several ways including storing user credentials in the KeyChain, encrypting sensitive information in plist files with the <a href="http://developer.apple.com/library/mac/">Common Crypto</a> library, or encrypting sensitive information in <a href="http://sqlcipher.net/ios-tutorial/">SQLcipher</a> SQLite databases. Figure 2 shows one example of a mobile application improperly storing credentials in a plist file.  Unfortunately, this particular application utilizes various Internet APIs for authentication including Evernote, Google Docs, Dropbox, and others, which in the event of loss or theft, could result in the compromise of each account.</p>
<div id="attachment_3037" class="wp-caption alignleft" style="width: 675px"><a href="http://www.netstumbler.com/wp-content/uploads/app-data-leakage-creds.png"><img class="size-full wp-image-3037" title="app-data-leakage-creds" src="http://www.netstumbler.com/wp-content/uploads/app-data-leakage-creds.png" alt="" width="665" height="369" /></a><p class="wp-caption-text">Figure 2: Credentials disclosed in an application&#39;s configuration PLIST</p></div>
<p><a href="http://www.netstumbler.com/wp-content/uploads/WiFi_creds_annotated.png"><img class="size-full wp-image-3046" title="WiFi_creds_annotated" src="http://www.netstumbler.com/wp-content/uploads/WiFi_creds_annotated.png" alt="" width="334" height="551" /></a></p>
<p><strong>Android</strong></p>
<p>Although there are many similarities between iOS and Android, there are a few notable differences that should be discussed. First, Android does not use property list files (“plist”) for storing configuration data, which is common on iOS devices. Android uses XML files instead of plists. Also, analysts will find many more SQLite databases on an Android device. In fact, configuration information is sometimes stored in SQLite database in lieu of utilizing XML files. Similarly to the configuration files for iOS, the XML files storing preferences for Android applications commonly include user credentials and other sensitive information. Finally, there is a very rich diagnostic and debugging environment in the Android platform, and unfortunately this output is also a common source of data leakage.</p>
<p>A huge difference between iOS devices and Android devices is the presence of the Android Debug Bridge (“ADB”) for the latter. Using the ADB, one can push or pull files to the device, review diagnostic information, and even gain access to a remote shell. The ADB Shell is the primary method of accessing the device&#8217;s file system for the purposes of pulling data to a host computer for analysis, or performing analysis on the device itself. More information on this, and other, differences can be found in the <a href="http://hakin9.org/hakin9-mobile-111-1/">Android Insecurities</a> article in January’s issue of Hakin9 Magazine.</p>
<div id="attachment_3046" class="wp-caption alignleft" style="width: 839px"></dt>
<dd class="wp-caption-dd">Annotated WiFi Credentials</dd>
</dl>
</div>
<p><strong>Email</strong></p>
<p>The Android system, like iOS, stores email in a SQLite database. Unlike iOS however, which stores email credentials in the KeyChain, user credentials on an Android system are stored in cleartext in the email database. This may seem like a trivial occurrence of data leakage, but in addition to personal email accounts such as Gmail, Exchange ActiveSync (“EAS”) credentials are also stored there. As if credentials weren&#8217;t bad enough, the database also stores messages in the clear, along with email addresses of contacts that have sent the user mail. This could be particularly devastating for corporate enterprises utilizing EAS, in the absence of a proper mobile device management (“MDM”) solution.</p>
<p>EAS and personal email account credentials can be discovered in a couple of different ways.  Figure 3 shows analysis of the EmailProvider.db SQLite file in Base, a GUI SQLite client. An even easier way to find user information is by simply running the ‘strings’ utility against the database file, as seen in Figure 4.</p>
<div class="mceTemp">
<dl id="attachment_3038" class="wp-caption alignleft" style="width: 839px;">
<dt class="wp-caption-dt"><img class="size-full wp-image-3038" title="EAS_GMAIL_Creds_2.3.4_Annotated" src="http://www.netstumbler.com/wp-content/uploads/EAS_GMAIL_Creds_2.3.4_Annotated.png" alt="" width="829" height="276" /><p class="wp-caption-text">Figure 3: Email credentials disclosure</p></div>
<p>&nbsp;</p>
<p><strong>WiFi</strong></p>
<p>The email situation is bad, but equally shocking is the method in which the Android system stores WiFi configuration information. Navigating to the <strong>/data/misc/wifi</strong> directory yields a configuration file called wpa_supplicant.conf on a Samsung Captivate that stores configuration information for every WiFi network the device has connected to – in cleartext. Assuming the data is disclosed to an attacker, an organization’s only defense is the use of multifactor authentication for their wireless networks, i.e., if corporate enterprise is using a combination of username and password exclusively, this could be a serious issue. The configuration file stores SSID, key management type, and the pre-shared key for the network.</p>
<div id="attachment_3039" class="wp-caption alignleft" style="width: 651px"><img class="size-full wp-image-3039" title="Strings_EASGMAIL_EmailProviderDB" src="http://www.netstumbler.com/wp-content/uploads/Strings_EASGMAIL_EmailProviderDB.png" alt="" width="641" height="172" /><p class="wp-caption-text">Figure 4: Email credentials disclosure</p></div>
<p>&nbsp;</p>
<p><strong>Conclusion</strong></p>
<p>Now, obviously various mitigating controls exist for protecting a user’s data on a mobile device, most notably the hardware-based encryption and <a href="http://developer.apple.com/library/ios/documentation/Miscellaneous/Conceptual/iPhoneOSTechOverview/iPhoneOSTechOverview.pdf">Data Protection</a> on the iPhone 4 and above, and encryption Android devices with Gingerbread. Passcodes lock devices, and in the case of Data Protection, enable a secondary layer of software-based encryption. That said, a recent study indicated over 50% of users don’t use a passcode at all on their devices, and another 20% utilize a 4-character combination that can be easily guessed in the usual 10 tries allotted – 1234, 4321, 9876, and so on. Add to this the ability to deploy OpenSSH as part of the jailbreaking process for iOS devices, the most prevalent choice for the Enterprise, or simply crack the passcode, and loss or theft is illuminated as a serious threat to data security. In the current ecosystem, with physical access to the device, it’s game over.</p>
<p><strong>Joey Peloquin</strong></p>
<p>Joey Peloquin is the director of mobile security at <a href="http://www.fishnetsecurity.com/">FishNet Security</a>, where he’s responsible for MDM technology review, mobile security research, testing methodologies, and business development. He’s spent the last twelve of twenty years in IT specializing in Information Security. His experience ranges from risk assessment to intrusion analysis and incident response, network and application penetration testing, and mobile forensics.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2011/12/12/offensive-mobile-forensics/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
