SlideShare ist ein Scribd-Unternehmen logo
1 von 76
Downloaden Sie, um offline zu lesen
Offline bruteforce attack on WiFi Protected Setup 
Dominique Bongard 
Founder 
0xcite, Switzerland 
@reversity
IntroductiontoWPS 
WPS PIN ExternalRegistrarProtocol 
Online Bruteforceattackon WPS PIN 
Offline Bruteforceattackon WPS PIN 
Vendorreponses 
Bonus
Wi-FiProtectedSetup (WPS) orWi-FiSimple Configuration(WSC) 
„Aspecificationforeasy, securesetupandintroductionofdevicesintoWPA2-enabled 802.11 networks" 
OffersseveralmethodsforIn-Band orOut-of-Band devicesetup 
Severelybrokenprotocol! 
The technicalspecificationcanbepurchasedonline for$99 
Someoldversionscanbefoundfloatingon thenet
USB Flash Drive (Deprecated) 
Ethernet (Deprecated) 
StaticPIN on devicelabel 
Display 
NFC Token 
Push Button 
Keypad
ToregisterwithWPS youdon‘tneedtoknowthePIN andpress theWPS button 
YouneedtoknowthePIN ORpress theWPS button
Enrollee: A deviceseekingtojoina WLAN domain 
Registrar: An entitywiththeauthoritytoissueWLAN credentials 
ExternalRegistrar: A registrarthatisseparate fromtheAP 
AP: An infrastructure-mode 802.11 Access Point 
HeadlessDevice : A devicewithouta screenordisplay
An Enrolleecanbea stationoran AP 
A Registrarcanbea station(externalregistrar) oran AP 
A Registrardoesn‘tneedtobein theWiFinetwork 
A WiFinetworkcanhavemorethanoneWPS Registrar
In themostcommoncase, theRegistrarisa stationoutside theWiFinetworkandtheEnrolleeistheAP, not theotherwayaround.
WPS PIN External Registrar Protocol
The recommended length for a manually entered device password is an 8-digit numeric PIN. This length does not provide a large amount of entropy for strong mutual authentication, but the design of the Registration Protocol protects against dictionary attacks on PINs if a fresh PIN or a rekeying key is used each time the Registration Protocol is run. 
If the Registrar runs the Protocol multiple times using the same PIN an attacker will be able to discover the PIN through brute force. To address this vulnerability, if a PIN authentication error occurs, the Registrar SHALL warn the user and SHALL NOT automatically reuse the PIN. 
The [sticker] PIN contains approximately 23 bits of entropy… It is susceptible to active attack.
PSK1PSK2
E ->R 
M1 
N1 ||Description ||PKE 
N1isa 128-bit randomnoncegeneratedbytheEnrollee 
PKEistheDH publickeyoftheEnrollee
Upon receptionofM1 theRegistrargeneratesPKR andN2 
The RegistrarcanthencomputetheDHKey: 
DHKey= SHA-256 (zeropad(gABmodp, 192)) 
AndcalculatetheKey Derivation Key : 
KDK = HMAC-SHA-256DHKey (N1 || EnrolleeMAC|| N2) 
FinallyAuthKey, KeyWrapKey, andEMSK arederived: 
AuthKey|| KeyWrapKey|| EMSK = 
kdf(KDK, “Wi-FiEasy andSecure Key Derivation”, 640)
AuthKey: used to authenticate the Registration Protocol messages (256 bits) 
KeyWrapKey: used to encrypt secret noncesand ConfigData(128 bits) 
EMSK : Extended Master Session Key that is used to derive additional keys (256 bits)
R ->E 
M2 
N1 || N2 ||Desc. ||PKR || Auth 
N2isa 128-bit randomnoncegeneratedbytheRegistrar 
PKRistheDH publickeyoftheRegistrar 
Auth= HMACAuthKey(M1 || M2)
E ->R 
M3 
E-Hash1 || E-Hash2 
E-Hash1 = HMACAuthKey(E-S1 || PSK1 || PKE || PKR) 
E-Hash2 = HMACAuthKey(E-S2 || PSK2 || PKE || PKR) 
PSK1ismadeofthefirst4 digitsofthePIN 
PSK2ismadeofthelast 4 digitsofthePIN 
E-S1 andE-S2 aretwo128 bitrandomnonces
R ->E 
M4 
R-Hash1 || R-Hash2 || EKwk(R-S1) 
R-Hash1 = HMACAuthKey(R-S1 || PSK1 || PKE || PKR) 
R-Hash2 = HMACAuthKey(R-S2 || PSK2 || PKE || PKR) 
R-S1 andR-S2 aretwo128 bitrandomnonces
The Enrollee decrypts R-S1 
The Enrollee verifies : 
HMACAuthKey(R-S1 || PSK1 || PKE || PKR) = R-Hash1 
?
E ->R 
M5 
Ekwk(E-S1) 
The Enrolleeopensitsfirstcommitment
The Registrar decrypts E-S1 
The Registrar verifies : 
HMACAuthKey(E-S1 || PSK1 || PKE || PKR) = E-Hash1 
?
R ->E 
M6 
EKwk(R-S2) 
The registraropensitssecondcommitment 
HMACAuthKey(R-S2 || PSK2 || PKE || PKR) = E-Hash2 ?
E ->R 
M7 
Ekwk(E-S2|| Credentials) 
The Enrolleeopensitssecondcommitmentandalso sendsthenetworkcredentials
WPS AP as Registrar attack
WhyistheAP theRegistrarresp.theStation theEnrolleeandnot theotherwayaround? 
The WiFiAlliance probablyfoundout thattheprotocolwouldotherwisebetotallyinsecurein thescenariowithHeadlessdevices
E ->R 
M1 
N1 ||Description ||PKE 
N1isa 128-bit randomnoncegeneratedbytheEnrollee 
PKEistheDH publickeyoftheEnrollee
R ->E 
M2 
N1 || N2 ||Desc. ||PKR || Auth 
N2isa 128-bit randomnoncegeneratedbytheRegistrar 
PKRistheDH publickeyoftheRegistrar 
Auth= HMACAuthKey(M1 || M2)
E ->R 
M3 
E-Hash1 || E-Hash2 
E-Hash1 = Random 
E-Hash2 = Random
R ->E 
M4 
R-Hash1 || R-Hash2 || EKwk(R-S1) 
The EnrolleecandecryptR-S1 andthenbruteforcePSK1 withR-Hash1 
The EnrolleethenrestartstheprotocolknowingPSK1
E ->R 
M5 
Ekwk(E-S1) 
In thesecondrunoftheprotocol, theEnrolleecansend valid valuessinceitknowsPSK1
R ->E 
M6 
EKwk(R-S2) 
The EnrolleecandecryptR-S2 andthenbruteforcePSK2 withR-Hash2 
The Enrolleethenrestartstheprotocolonelast time knowingbothPSK1 andPSK2
WPS online bruteforceattack
Looks OK aslongasthereisonlyonetryper PIN 
ProofofpossessionallowsdetectionofrogueAPs andstations 
The DH keyexchangeprotectsagainsteavesdropping
Attackpublishedin 2011 byStefan Viehböck 
The ideaistobruteforcePSK1 andthenPSK2 
Takes atmost11‘000 trialsforstickerPIN 
Atmost20‘000 trialsforuserselectedPIN 
FindsthePIN in a fewhours(dependson AP) 
Most AP implementednosecurityagainstBF 
Implementedin toolslikeReaverandBully
Changes in the specification 
2.0.2 Public release version 
-Change Headless Devices section to mandate implementation of strong mitigation against a brute force attack on the AP that uses a static PIN. 
Some devices have a WPS lockout delay 
This only slows down the attack a bit 
Other lock WPS until the next reboot
AP reboot scripts (mdk3, ReVdK3) 
EAPOL-Start flood attack 
DeauthDDoS
The initialusecaseseemstoberandomPIN on displaywithonetry 
The specificationcontainscontradictorystatementsaboutPIN reuse 
The protocollookssecureenoughifPINs arenot reused 
Conclusion: 
HeadlessdeviceswithstaticPINs wereprobablya last minuteadditiontothespecification
WPS offline bruteforceattack
E ->R 
M1 
N1 ||Description ||PKE 
N1isa 128-bit randomnoncegeneratedbytheEnrollee 
PKEistheDH publickeyoftheEnrollee
E ->R 
M3 
E-Hash1 || E-Hash2 
E-Hash1 = HMACAuthKey(E-S1 || PSK1 || PKE || PKR) 
E-Hash2 = HMACAuthKey(E-S2 || PSK2 || PKE || PKR) 
PSK1ismadeofthefirst4 digitsofthePIN 
PSK2ismadeofthelast 4 digitsofthePIN
Ifwecanfind E-S1 andE-S2, wecanthebruteforcePSK1 andPSK2 offline!
Usuallywithpseudo-randomgenerators(PRNG) 
OfteninsecurePRNG 
Noorlowentropy 
Small state(32 bits) 
Can thePRNG stateberecovered?
reg_proto_create_m1(RegData*regInfo, BufferObj*msg) 
{ 
uint32 ret = WPS_SUCCESS; 
uint8 message; 
DevInfo*enrollee = regInfo->enrollee; 
/* First generate/gather all the required data. */ 
message = WPS_ID_MESSAGE_M1; 
/* Enrollee nonce */ 
/* 
* Hacking, do not generate new random enrollee nonce 
* in case of we have prebuild enrollee nonce. 
*/ 
if (regInfo->e_lastMsgSent== MNONE) { 
RAND_bytes(regInfo->enrolleeNonce, SIZE_128_BITS); 
} 
/* It should not generate new key pair if we have prebuild enrollee nonce */ 
if (!enrollee->DHSecret) { 
ret = reg_proto_generate_dhkeypair(&enrollee->DHSecret); 
if (ret != WPS_SUCCESS) { 
return ret; 
} 
} 
...
#if (defined(__ECOS) || defined(TARGETOS_nucleus) || defined(TARGETOS_symbian)) 
void generic_random(uint8 * random, intlen) 
{ 
inttlen= len; 
while (tlen--) { 
*random = (uint8)rand(); 
*random++; 
} 
return; 
} 
#endif
intrand_r( unsigned int*seed ){ 
unsigned ints=*seed; 
unsigned inturet; 
s = (s * 1103515245) + 12345; // permutateseed 
uret= s & 0xffe00000;// Only use top 11 bits 
s = (s * 1103515245) + 12345; // permutateseed 
uret+= (s & 0xfffc0000) >> 11;// Only use top 14 bits 
s = (s * 1103515245) + 12345; // permutateseed 
uret+= (s & 0xfe000000) >> (11+14);// Only use top 7 bits 
retval= (int)(uret& RAND_MAX); 
*seed= s; 
return retval; 
}
Linear CongruentialGenerator 
32 bitsstate 
Noexternalentropy 
E-S1 andE-S2 generatedrightafter N1 
Optimization: 7 bitsoftheseedcanbededucedfromthelast outputbyte
Do theWPS protocoluptomessageM3 
GettheNoncefromM1 
BruteforcethestateofthePRNG 
ComputeE-S1 andE-S2 fromthestate 
BruteforcePSK1 / PSK2 fromE-Hash1 / E-Hash2 
Do thefullWPS protocoltogetthecredentials
32 bitLinear Feedback ShiftRegister (LFSR) 
Polynomial= 0x80000057 
Trivial torecovertheLFSR statefromthenonce
E-S1 andE-S2 arenevergenerated 
E-S1 = E-S2 = 0x0
SomeAP havethesame stateateachboot 
Makea listofcommonstatesafter reboot 
AttacktheAP rightafter boot 
As shown, therearemanywaystoforcea reboot
Looks okay 
Uses/dev/random 
Usedin AtherosSDK 
But youneverknow 
SeveralpapersattacktheentropyofthelinuxPRNG in embeddedsystems
Marvell 
Realtek 
Intel 
Qualcomm 
...
It‘scomplicated 
Manyoftheimplementations arethereferencecodeforthechipset 
OnlytheGUI isreskinned 
Thereforemanybrandsareaffected 
Manyvendorsusedifferent chipset
Vendor responses
Triedtofind a securityincidentcontact 
Triedtocontactthemon Twitter 
Triedtocontactthemthroughtheirwebsite
Dominique Bongard discovered that Broadcom chips are affected. Their random number generators apparently are so easy to guess that an attacker can get your Wi-Fi access point to give up its PIN code in less than a second. 
----------------------------------- 
This is the first we have heard of this. We’ll connect with your security team. 
Karen
Thanks for checking. This is not a chip issue. The issue you have identified can affect any Wi-Fi product. 
Vulnerabilities can depend on the Wi-Fi standard that is chosen for security. This may depend on the age of the product. 
Best regards, 
Jennifer B.| Senior Manager, Corporate Communications
We do use the Broadcom chipset in some of our offerings, and we're reaching out to Broadcom as we speak, to find out if any of the ones we use are affected by this issue. 
[...] Also, for your information -Cisco has a very limited number of wireless products with support for WPS. Most of them are Small and Medium business products, while others are sold to Service Providers (not to end users) to be used as cable modem CPEs. And some of those CPEs have wireless capabilities, and some support WPS. We'll investigate them all, make our results public by following our security policy.
Triedtocontactthemvia theirwebsite
Thanks, Dominique. This is very helpful. 
In the future, I encourage you to report any Wi-Fi-related vulnerabilities directly to us. Wi-Fi Alliance reviews all submitted reports of security vulnerabilities affecting Wi-Fi CERTIFIED programs. You can submit vulnerabilities to secure@wi-fi.orgor at https://www.wi-fi.org/secure . 
Thanks again. 
Regards, 
Kevin R. | Director of Program Marketing | Wi-Fi Alliance
WPS static pin generation attack
PIN values should be randomly generated, and they SHALL NOT be derivable from any information that can be obtained by an eavesdropper or active attacker. The device’s serial number and MAC address, for example, are easily eavesdropped by an attacker on the in-band channel.
Arrishttp://packetstormsecurity.com/files/123631/ARRIS-DG860A-WPS-PIN-Generator.html 
Belkin 
http://ednolo.alumnos.upv.es/?p=1295 
Other 
http://www.hackforums.net/printthread.php?tid=4146055 
… * 
Tenda,Sitecom, Linksys, FTE, Vodafone, ZTE, Zyxelhttp://www.crack-wifi.com/forum/topic-8793-wpspin- generateur-pin-wps-par-defaut-routeurs-huawei-belkin.html
Conclusion
DisableWPS now! 
Reverse engineers: Check otherAP forbadPRNG 
Cryptographers: Check ifgoodPRNG areokay

Weitere ähnliche Inhalte

Was ist angesagt?

Recursion tree method
Recursion tree methodRecursion tree method
Recursion tree methodRajendran
 
Random number generators
Random number generatorsRandom number generators
Random number generatorsBob Landstrom
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
あるキャッシュメモリの話
あるキャッシュメモリの話あるキャッシュメモリの話
あるキャッシュメモリの話nullnilaki
 
5.2 divide and conquer
5.2 divide and conquer5.2 divide and conquer
5.2 divide and conquerKrish_ver2
 
Basic concepts for python web development
Basic concepts for python web developmentBasic concepts for python web development
Basic concepts for python web developmentNexSoftsys
 
Introduction to toc and compiler
Introduction to toc and compilerIntroduction to toc and compiler
Introduction to toc and compilersavitamhaske
 
Introduction To WS-Policy
Introduction To WS-PolicyIntroduction To WS-Policy
Introduction To WS-PolicyHayati Guvence
 
Zero to Hero - Introduction to Python3
Zero to Hero - Introduction to Python3Zero to Hero - Introduction to Python3
Zero to Hero - Introduction to Python3Chariza Pladin
 
Vim scriptとJavaとHaskell
Vim scriptとJavaとHaskellVim scriptとJavaとHaskell
Vim scriptとJavaとHaskellaiya000
 
コンピュータシステムの理論と実装1
コンピュータシステムの理論と実装1コンピュータシステムの理論と実装1
コンピュータシステムの理論と実装1H T
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 

Was ist angesagt? (20)

Recursion tree method
Recursion tree methodRecursion tree method
Recursion tree method
 
Random number generators
Random number generatorsRandom number generators
Random number generators
 
Programming with LEX & YACC
Programming with LEX & YACCProgramming with LEX & YACC
Programming with LEX & YACC
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
あるキャッシュメモリの話
あるキャッシュメモリの話あるキャッシュメモリの話
あるキャッシュメモリの話
 
Vliw or epic
Vliw or epicVliw or epic
Vliw or epic
 
IP Security
IP SecurityIP Security
IP Security
 
NumPy.pptx
NumPy.pptxNumPy.pptx
NumPy.pptx
 
Unit vi (1)
Unit vi (1)Unit vi (1)
Unit vi (1)
 
5.2 divide and conquer
5.2 divide and conquer5.2 divide and conquer
5.2 divide and conquer
 
Basic concepts for python web development
Basic concepts for python web developmentBasic concepts for python web development
Basic concepts for python web development
 
Introduction to toc and compiler
Introduction to toc and compilerIntroduction to toc and compiler
Introduction to toc and compiler
 
Introduction To WS-Policy
Introduction To WS-PolicyIntroduction To WS-Policy
Introduction To WS-Policy
 
Pseudo Random Number
Pseudo Random NumberPseudo Random Number
Pseudo Random Number
 
Python Scipy Numpy
Python Scipy NumpyPython Scipy Numpy
Python Scipy Numpy
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
Zero to Hero - Introduction to Python3
Zero to Hero - Introduction to Python3Zero to Hero - Introduction to Python3
Zero to Hero - Introduction to Python3
 
Vim scriptとJavaとHaskell
Vim scriptとJavaとHaskellVim scriptとJavaとHaskell
Vim scriptとJavaとHaskell
 
コンピュータシステムの理論と実装1
コンピュータシステムの理論と実装1コンピュータシステムの理論と実装1
コンピュータシステムの理論と実装1
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 

Andere mochten auch

Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup0xcite
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFiMartin Keg
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheepantitree
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardwarevanhoefm
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless HackingDon Anto
 
Most Hilarious Moments of FIFA 2014
Most Hilarious Moments of FIFA 2014Most Hilarious Moments of FIFA 2014
Most Hilarious Moments of FIFA 2014ixigo.com
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overviewjohn wilbanks
 
Google analytics для тизерной рекламы
Google analytics для тизерной рекламыGoogle analytics для тизерной рекламы
Google analytics для тизерной рекламыОлег Подлуцкий
 
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLU
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLUSAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLU
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLUEason Chan
 
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.1st_HIGH-SCHOOL_KALAMPAKA_E.Q.
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.1gymkalamp
 
Gamification at SharePoint Saturday Belgium
Gamification at SharePoint Saturday BelgiumGamification at SharePoint Saturday Belgium
Gamification at SharePoint Saturday BelgiumJussi Mori
 
交點高雄vol.7 - 安蓉 - 傳說中的文化差異
交點高雄vol.7 - 安蓉 - 傳說中的文化差異交點高雄vol.7 - 安蓉 - 傳說中的文化差異
交點高雄vol.7 - 安蓉 - 傳說中的文化差異交點
 
Dh presentation helig 2014
Dh presentation helig 2014Dh presentation helig 2014
Dh presentation helig 2014HELIGLIASA
 
幽霊島の殺人ルールサマリー
幽霊島の殺人ルールサマリー幽霊島の殺人ルールサマリー
幽霊島の殺人ルールサマリーniconico_sho
 
Final pr uppehallstillstand
Final pr uppehallstillstand Final pr uppehallstillstand
Final pr uppehallstillstand LinkedIn Nordic
 

Andere mochten auch (20)

Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
 
Secure your public WiFi
Secure your public WiFiSecure your public WiFi
Secure your public WiFi
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheep
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Outubro jardim
Outubro jardimOutubro jardim
Outubro jardim
 
Most Hilarious Moments of FIFA 2014
Most Hilarious Moments of FIFA 2014Most Hilarious Moments of FIFA 2014
Most Hilarious Moments of FIFA 2014
 
Participant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit OverviewParticipant-Centered Consent Toolkit Overview
Participant-Centered Consent Toolkit Overview
 
Google analytics для тизерной рекламы
Google analytics для тизерной рекламыGoogle analytics для тизерной рекламы
Google analytics для тизерной рекламы
 
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLU
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLUSAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLU
SAFER AND MORE NATURAL WAY TO PREVENT COLD AND FLU
 
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.1st_HIGH-SCHOOL_KALAMPAKA_E.Q.
1st_HIGH-SCHOOL_KALAMPAKA_E.Q.
 
Gamification at SharePoint Saturday Belgium
Gamification at SharePoint Saturday BelgiumGamification at SharePoint Saturday Belgium
Gamification at SharePoint Saturday Belgium
 
交點高雄vol.7 - 安蓉 - 傳說中的文化差異
交點高雄vol.7 - 安蓉 - 傳說中的文化差異交點高雄vol.7 - 安蓉 - 傳說中的文化差異
交點高雄vol.7 - 安蓉 - 傳說中的文化差異
 
Dh presentation helig 2014
Dh presentation helig 2014Dh presentation helig 2014
Dh presentation helig 2014
 
Use of data
Use of dataUse of data
Use of data
 
幽霊島の殺人ルールサマリー
幽霊島の殺人ルールサマリー幽霊島の殺人ルールサマリー
幽霊島の殺人ルールサマリー
 
Final pr uppehallstillstand
Final pr uppehallstillstand Final pr uppehallstillstand
Final pr uppehallstillstand
 
The Science of Guru
The Science of GuruThe Science of Guru
The Science of Guru
 

Ähnlich wie Offline bruteforce attack on wi fi protected setup

Code Red Security
Code Red SecurityCode Red Security
Code Red SecurityAmr Ali
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupScientia Groups
 
Enhance Virtualization Stack with Intel CET and MPX
Enhance Virtualization Stack with Intel CET and MPXEnhance Virtualization Stack with Intel CET and MPX
Enhance Virtualization Stack with Intel CET and MPXPriyanka Aash
 
Báo cáo thực tập athena trần trọng thái
Báo cáo thực tập athena   trần trọng tháiBáo cáo thực tập athena   trần trọng thái
Báo cáo thực tập athena trần trọng tháitran thai
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)Security Date
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commandstmavroidis
 
Red Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack ArchitectureRed Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack ArchitectureDan Radez
 
Threaded-Execution and CPS Provide Smooth Switching Between Execution Modes
Threaded-Execution and CPS Provide Smooth Switching Between Execution ModesThreaded-Execution and CPS Provide Smooth Switching Between Execution Modes
Threaded-Execution and CPS Provide Smooth Switching Between Execution ModesESUG
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitationbarcamp.my
 
Cpu高效编程技术
Cpu高效编程技术Cpu高效编程技术
Cpu高效编程技术Feng Yu
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Netwax Lab
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS NetProtocol Xpert
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Kelson Silva
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environmentscooby_doo
 

Ähnlich wie Offline bruteforce attack on wi fi protected setup (20)

Code Red Security
Code Red SecurityCode Red Security
Code Red Security
 
IPSec VPN
IPSec VPNIPSec VPN
IPSec VPN
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
 
Enhance Virtualization Stack with Intel CET and MPX
Enhance Virtualization Stack with Intel CET and MPXEnhance Virtualization Stack with Intel CET and MPX
Enhance Virtualization Stack with Intel CET and MPX
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
 
Báo cáo thực tập athena trần trọng thái
Báo cáo thực tập athena   trần trọng tháiBáo cáo thực tập athena   trần trọng thái
Báo cáo thực tập athena trần trọng thái
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 
Red Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack ArchitectureRed Hat Forum Tokyo - OpenStack Architecture
Red Hat Forum Tokyo - OpenStack Architecture
 
Aircrack
AircrackAircrack
Aircrack
 
Threaded-Execution and CPS Provide Smooth Switching Between Execution Modes
Threaded-Execution and CPS Provide Smooth Switching Between Execution ModesThreaded-Execution and CPS Provide Smooth Switching Between Execution Modes
Threaded-Execution and CPS Provide Smooth Switching Between Execution Modes
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
Cpu高效编程技术
Cpu高效编程技术Cpu高效编程技术
Cpu高效编程技术
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Netmiko library
Netmiko libraryNetmiko library
Netmiko library
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
 

Mehr von Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itCyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptCyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 

Mehr von Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Offline bruteforce attack on wi fi protected setup

  • 1. Offline bruteforce attack on WiFi Protected Setup Dominique Bongard Founder 0xcite, Switzerland @reversity
  • 2. IntroductiontoWPS WPS PIN ExternalRegistrarProtocol Online Bruteforceattackon WPS PIN Offline Bruteforceattackon WPS PIN Vendorreponses Bonus
  • 3. Wi-FiProtectedSetup (WPS) orWi-FiSimple Configuration(WSC) „Aspecificationforeasy, securesetupandintroductionofdevicesintoWPA2-enabled 802.11 networks" OffersseveralmethodsforIn-Band orOut-of-Band devicesetup Severelybrokenprotocol! The technicalspecificationcanbepurchasedonline for$99 Someoldversionscanbefoundfloatingon thenet
  • 4.
  • 5.
  • 6. USB Flash Drive (Deprecated) Ethernet (Deprecated) StaticPIN on devicelabel Display NFC Token Push Button Keypad
  • 7. ToregisterwithWPS youdon‘tneedtoknowthePIN andpress theWPS button YouneedtoknowthePIN ORpress theWPS button
  • 8. Enrollee: A deviceseekingtojoina WLAN domain Registrar: An entitywiththeauthoritytoissueWLAN credentials ExternalRegistrar: A registrarthatisseparate fromtheAP AP: An infrastructure-mode 802.11 Access Point HeadlessDevice : A devicewithouta screenordisplay
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. An Enrolleecanbea stationoran AP A Registrarcanbea station(externalregistrar) oran AP A Registrardoesn‘tneedtobein theWiFinetwork A WiFinetworkcanhavemorethanoneWPS Registrar
  • 14. In themostcommoncase, theRegistrarisa stationoutside theWiFinetworkandtheEnrolleeistheAP, not theotherwayaround.
  • 15. WPS PIN External Registrar Protocol
  • 16.
  • 17.
  • 18. The recommended length for a manually entered device password is an 8-digit numeric PIN. This length does not provide a large amount of entropy for strong mutual authentication, but the design of the Registration Protocol protects against dictionary attacks on PINs if a fresh PIN or a rekeying key is used each time the Registration Protocol is run. If the Registrar runs the Protocol multiple times using the same PIN an attacker will be able to discover the PIN through brute force. To address this vulnerability, if a PIN authentication error occurs, the Registrar SHALL warn the user and SHALL NOT automatically reuse the PIN. The [sticker] PIN contains approximately 23 bits of entropy… It is susceptible to active attack.
  • 19.
  • 20.
  • 22. E ->R M1 N1 ||Description ||PKE N1isa 128-bit randomnoncegeneratedbytheEnrollee PKEistheDH publickeyoftheEnrollee
  • 23. Upon receptionofM1 theRegistrargeneratesPKR andN2 The RegistrarcanthencomputetheDHKey: DHKey= SHA-256 (zeropad(gABmodp, 192)) AndcalculatetheKey Derivation Key : KDK = HMAC-SHA-256DHKey (N1 || EnrolleeMAC|| N2) FinallyAuthKey, KeyWrapKey, andEMSK arederived: AuthKey|| KeyWrapKey|| EMSK = kdf(KDK, “Wi-FiEasy andSecure Key Derivation”, 640)
  • 24. AuthKey: used to authenticate the Registration Protocol messages (256 bits) KeyWrapKey: used to encrypt secret noncesand ConfigData(128 bits) EMSK : Extended Master Session Key that is used to derive additional keys (256 bits)
  • 25. R ->E M2 N1 || N2 ||Desc. ||PKR || Auth N2isa 128-bit randomnoncegeneratedbytheRegistrar PKRistheDH publickeyoftheRegistrar Auth= HMACAuthKey(M1 || M2)
  • 26. E ->R M3 E-Hash1 || E-Hash2 E-Hash1 = HMACAuthKey(E-S1 || PSK1 || PKE || PKR) E-Hash2 = HMACAuthKey(E-S2 || PSK2 || PKE || PKR) PSK1ismadeofthefirst4 digitsofthePIN PSK2ismadeofthelast 4 digitsofthePIN E-S1 andE-S2 aretwo128 bitrandomnonces
  • 27. R ->E M4 R-Hash1 || R-Hash2 || EKwk(R-S1) R-Hash1 = HMACAuthKey(R-S1 || PSK1 || PKE || PKR) R-Hash2 = HMACAuthKey(R-S2 || PSK2 || PKE || PKR) R-S1 andR-S2 aretwo128 bitrandomnonces
  • 28. The Enrollee decrypts R-S1 The Enrollee verifies : HMACAuthKey(R-S1 || PSK1 || PKE || PKR) = R-Hash1 ?
  • 29. E ->R M5 Ekwk(E-S1) The Enrolleeopensitsfirstcommitment
  • 30. The Registrar decrypts E-S1 The Registrar verifies : HMACAuthKey(E-S1 || PSK1 || PKE || PKR) = E-Hash1 ?
  • 31. R ->E M6 EKwk(R-S2) The registraropensitssecondcommitment HMACAuthKey(R-S2 || PSK2 || PKE || PKR) = E-Hash2 ?
  • 32. E ->R M7 Ekwk(E-S2|| Credentials) The Enrolleeopensitssecondcommitmentandalso sendsthenetworkcredentials
  • 33. WPS AP as Registrar attack
  • 34. WhyistheAP theRegistrarresp.theStation theEnrolleeandnot theotherwayaround? The WiFiAlliance probablyfoundout thattheprotocolwouldotherwisebetotallyinsecurein thescenariowithHeadlessdevices
  • 35. E ->R M1 N1 ||Description ||PKE N1isa 128-bit randomnoncegeneratedbytheEnrollee PKEistheDH publickeyoftheEnrollee
  • 36. R ->E M2 N1 || N2 ||Desc. ||PKR || Auth N2isa 128-bit randomnoncegeneratedbytheRegistrar PKRistheDH publickeyoftheRegistrar Auth= HMACAuthKey(M1 || M2)
  • 37. E ->R M3 E-Hash1 || E-Hash2 E-Hash1 = Random E-Hash2 = Random
  • 38. R ->E M4 R-Hash1 || R-Hash2 || EKwk(R-S1) The EnrolleecandecryptR-S1 andthenbruteforcePSK1 withR-Hash1 The EnrolleethenrestartstheprotocolknowingPSK1
  • 39. E ->R M5 Ekwk(E-S1) In thesecondrunoftheprotocol, theEnrolleecansend valid valuessinceitknowsPSK1
  • 40. R ->E M6 EKwk(R-S2) The EnrolleecandecryptR-S2 andthenbruteforcePSK2 withR-Hash2 The Enrolleethenrestartstheprotocolonelast time knowingbothPSK1 andPSK2
  • 42. Looks OK aslongasthereisonlyonetryper PIN ProofofpossessionallowsdetectionofrogueAPs andstations The DH keyexchangeprotectsagainsteavesdropping
  • 43.
  • 44. Attackpublishedin 2011 byStefan Viehböck The ideaistobruteforcePSK1 andthenPSK2 Takes atmost11‘000 trialsforstickerPIN Atmost20‘000 trialsforuserselectedPIN FindsthePIN in a fewhours(dependson AP) Most AP implementednosecurityagainstBF Implementedin toolslikeReaverandBully
  • 45. Changes in the specification 2.0.2 Public release version -Change Headless Devices section to mandate implementation of strong mitigation against a brute force attack on the AP that uses a static PIN. Some devices have a WPS lockout delay This only slows down the attack a bit Other lock WPS until the next reboot
  • 46.
  • 47. AP reboot scripts (mdk3, ReVdK3) EAPOL-Start flood attack DeauthDDoS
  • 48. The initialusecaseseemstoberandomPIN on displaywithonetry The specificationcontainscontradictorystatementsaboutPIN reuse The protocollookssecureenoughifPINs arenot reused Conclusion: HeadlessdeviceswithstaticPINs wereprobablya last minuteadditiontothespecification
  • 50. E ->R M1 N1 ||Description ||PKE N1isa 128-bit randomnoncegeneratedbytheEnrollee PKEistheDH publickeyoftheEnrollee
  • 51. E ->R M3 E-Hash1 || E-Hash2 E-Hash1 = HMACAuthKey(E-S1 || PSK1 || PKE || PKR) E-Hash2 = HMACAuthKey(E-S2 || PSK2 || PKE || PKR) PSK1ismadeofthefirst4 digitsofthePIN PSK2ismadeofthelast 4 digitsofthePIN
  • 52. Ifwecanfind E-S1 andE-S2, wecanthebruteforcePSK1 andPSK2 offline!
  • 53. Usuallywithpseudo-randomgenerators(PRNG) OfteninsecurePRNG Noorlowentropy Small state(32 bits) Can thePRNG stateberecovered?
  • 54. reg_proto_create_m1(RegData*regInfo, BufferObj*msg) { uint32 ret = WPS_SUCCESS; uint8 message; DevInfo*enrollee = regInfo->enrollee; /* First generate/gather all the required data. */ message = WPS_ID_MESSAGE_M1; /* Enrollee nonce */ /* * Hacking, do not generate new random enrollee nonce * in case of we have prebuild enrollee nonce. */ if (regInfo->e_lastMsgSent== MNONE) { RAND_bytes(regInfo->enrolleeNonce, SIZE_128_BITS); } /* It should not generate new key pair if we have prebuild enrollee nonce */ if (!enrollee->DHSecret) { ret = reg_proto_generate_dhkeypair(&enrollee->DHSecret); if (ret != WPS_SUCCESS) { return ret; } } ...
  • 55. #if (defined(__ECOS) || defined(TARGETOS_nucleus) || defined(TARGETOS_symbian)) void generic_random(uint8 * random, intlen) { inttlen= len; while (tlen--) { *random = (uint8)rand(); *random++; } return; } #endif
  • 56. intrand_r( unsigned int*seed ){ unsigned ints=*seed; unsigned inturet; s = (s * 1103515245) + 12345; // permutateseed uret= s & 0xffe00000;// Only use top 11 bits s = (s * 1103515245) + 12345; // permutateseed uret+= (s & 0xfffc0000) >> 11;// Only use top 14 bits s = (s * 1103515245) + 12345; // permutateseed uret+= (s & 0xfe000000) >> (11+14);// Only use top 7 bits retval= (int)(uret& RAND_MAX); *seed= s; return retval; }
  • 57. Linear CongruentialGenerator 32 bitsstate Noexternalentropy E-S1 andE-S2 generatedrightafter N1 Optimization: 7 bitsoftheseedcanbededucedfromthelast outputbyte
  • 58. Do theWPS protocoluptomessageM3 GettheNoncefromM1 BruteforcethestateofthePRNG ComputeE-S1 andE-S2 fromthestate BruteforcePSK1 / PSK2 fromE-Hash1 / E-Hash2 Do thefullWPS protocoltogetthecredentials
  • 59. 32 bitLinear Feedback ShiftRegister (LFSR) Polynomial= 0x80000057 Trivial torecovertheLFSR statefromthenonce
  • 60. E-S1 andE-S2 arenevergenerated E-S1 = E-S2 = 0x0
  • 61. SomeAP havethesame stateateachboot Makea listofcommonstatesafter reboot AttacktheAP rightafter boot As shown, therearemanywaystoforcea reboot
  • 62. Looks okay Uses/dev/random Usedin AtherosSDK But youneverknow SeveralpapersattacktheentropyofthelinuxPRNG in embeddedsystems
  • 63. Marvell Realtek Intel Qualcomm ...
  • 64. It‘scomplicated Manyoftheimplementations arethereferencecodeforthechipset OnlytheGUI isreskinned Thereforemanybrandsareaffected Manyvendorsusedifferent chipset
  • 66. Triedtofind a securityincidentcontact Triedtocontactthemon Twitter Triedtocontactthemthroughtheirwebsite
  • 67. Dominique Bongard discovered that Broadcom chips are affected. Their random number generators apparently are so easy to guess that an attacker can get your Wi-Fi access point to give up its PIN code in less than a second. ----------------------------------- This is the first we have heard of this. We’ll connect with your security team. Karen
  • 68. Thanks for checking. This is not a chip issue. The issue you have identified can affect any Wi-Fi product. Vulnerabilities can depend on the Wi-Fi standard that is chosen for security. This may depend on the age of the product. Best regards, Jennifer B.| Senior Manager, Corporate Communications
  • 69. We do use the Broadcom chipset in some of our offerings, and we're reaching out to Broadcom as we speak, to find out if any of the ones we use are affected by this issue. [...] Also, for your information -Cisco has a very limited number of wireless products with support for WPS. Most of them are Small and Medium business products, while others are sold to Service Providers (not to end users) to be used as cable modem CPEs. And some of those CPEs have wireless capabilities, and some support WPS. We'll investigate them all, make our results public by following our security policy.
  • 71. Thanks, Dominique. This is very helpful. In the future, I encourage you to report any Wi-Fi-related vulnerabilities directly to us. Wi-Fi Alliance reviews all submitted reports of security vulnerabilities affecting Wi-Fi CERTIFIED programs. You can submit vulnerabilities to secure@wi-fi.orgor at https://www.wi-fi.org/secure . Thanks again. Regards, Kevin R. | Director of Program Marketing | Wi-Fi Alliance
  • 72. WPS static pin generation attack
  • 73. PIN values should be randomly generated, and they SHALL NOT be derivable from any information that can be obtained by an eavesdropper or active attacker. The device’s serial number and MAC address, for example, are easily eavesdropped by an attacker on the in-band channel.
  • 74. Arrishttp://packetstormsecurity.com/files/123631/ARRIS-DG860A-WPS-PIN-Generator.html Belkin http://ednolo.alumnos.upv.es/?p=1295 Other http://www.hackforums.net/printthread.php?tid=4146055 … * Tenda,Sitecom, Linksys, FTE, Vodafone, ZTE, Zyxelhttp://www.crack-wifi.com/forum/topic-8793-wpspin- generateur-pin-wps-par-defaut-routeurs-huawei-belkin.html
  • 76. DisableWPS now! Reverse engineers: Check otherAP forbadPRNG Cryptographers: Check ifgoodPRNG areokay