The Caffe latte attack - WEP defeater!
The flaws that make WEP vulnerable were documented back in 2001, prompting
development of dozens of cracking tools. Until recently, those attacks focused
on traffic captured from active networks, requiring proximity to the targeted
business. But lately, focus has shifted to off-site clients that are not
connected to any network. By exploiting driver flaws, exposed
fileshares, and user mistakes, one can easily and invisibly attack Wi-Fi
laptops and phones in public venues like airplanes, hotels, and cafes.
This year, insidious new tools like Caffe Latte and Wep0ff have learned how to crack
the keys stored on those off-site clients, expanding the reach of WEP crackers
far beyond office walls. Now, no matter where employees go, they just might
unwittingly "spill the beans" on your corporate WEP key.
Most client-side attacks take advantage of two
fundamental vulnerabilities:
Wi-Fi clients actively probe for all networks they have
associated with in the past. When any AP is found with a known network name (SSID), clients automatically associate
to it.
This common-but-promiscuous behavior is the culprit
behind well-known evil twin or honeypot attacks we have written about before
In fact, those older attacks provide the launch pad for
new client-side WEP crackers, creating the perfect conditions in which to grab
any corporate WEP keys cached by those clients.
All WEP crackers use statistical analysis to guess the
key used to encrypt captured traffic. Given enough encrypted traffic, WEP
crackers can always derive the key. A WEP-cracking attack therefore starts with
locating a source of encrypted packets. It turns out that phished Wi-Fi clients
are an awfully convenient and plentiful source.
Specifically, all TCP/IP devices send a least a few
packets whenever they connect to a WLAN.
A station using a static IP immediately broadcasts a few
gratuitous ARP packets to the entire WLAN.
Each ARP packet carries the sender's MAC address and IP address so that other
stations will know how to route traffic.
A station using a dynamic IP also sends ARP, after first
requesting an IP address from a DHCP server. If no server is found, the station assigns
itself an Automatic Private IP Address from the 169.254.0.0/16 subnet and then sends
gratuitous ARP.
If a client associates to an AP that uses WEP, it may or
may not be required to authenticate itself before associating, using a shared
WEP key. However, the AP is never required to prove that it, in fact, possesses
the WEP key. This means that a phony AP (aka evil twin) can be configured with the SSID of a corporate WLAN
and any key to lure clients. After a client associates to the
phony AP, it will send a few ARP packets—encrypted with the corporate WEP key.
A handful of encrypted ARP packets won't be enough to
crack the corporate WEP key. So something must cause the client to repeatedly
send encrypted ARP packets. One approach is to disconnect or deauthenticate the
client, over and over again, but that would take a long time.
Upon connecting, the client
transmitted several correctly encrypted gratuitous ARP requests.
An attacker can flip a few bits in
one of those captured packets, changing that gratuitous ARP into an ARP
request, addressed to the client.
By sending that forged ARP request
repeatedly, the client can be stimulated into replying with thousands of
correctly-encrypted ARP replies.
This attack works because not only
is WEP vulnerable to statistical analysis, but it does nothing to
cryptographically protect packet integrity. In other words, recipients have no
way to detect when a valid packet has been captured and replayed, as-is or with
modification.
Every WEP-encrypted packet carries
a Cyclic Redundancy Check (CRC) that is used to spot
transmission errors. But, it has long been known that a sender could change
both the data payload and the CRC to create a valid packet. Caffe Latte uses
this bit-flipping technique to modify the Sender MAC and Sender IP Address
contained in a gratuitous ARP header, turning that captured packet into an
encrypted ARP request, addressed to the victim client.
Because the victim cannot tell
that those forged ARP requests are bogus, it replies with a WEP-encrypted ARP
response, as defined by the ARP protocol. Over and over and over again.
1. Monitor hotspot WLAN traffic to
identify potential corporate SSIDs.
2. Start capturing all traffic
generated by target clients.
3. Use phony AP with corporate
SSID and any WEP key to lure target client.
4. Extract gratuitous ARP Request
from capture file.
5. Send ARP Request to
Caffe-Latte, generating bit-flipped ARP Request flood.
6. Run Aircrack-NG (or your
favorite WEP cracker) on corporate SSID and capture file.
7. After analyzing roughly 55-60K
ARP Responses, crack 128-bit WEP key.
so individual users should take
the following precautions to avoid falling victim to Caffe Latte:
1. Narrow the window of opportunity
by disabling Wi-Fi adapters when not in use. Many laptops and other devices now
have a physical on/off switch for Wi-Fi. Use it.
2. Reconfigure your client to
avoid reconnecting automatically to Preferred Networks. That way, you won't be
tricked into connecting to any AP without your consent, and you will realize
that a corporate SSID showing up in a public hotspot is not legitimate. (This
is particularly important for iPhone users and other with devices that lack an
on/off switch for Wi-Fi.)
3. If manual connection management
is too inconvenient, then run a host-resident Wireless IPS. A host WIPS like those described can profile SSIDs and APs
used in specific situations. For example, a "Work" profile could let
you connect to your corporate SSID at the office, while switching to a
"Hotspot" profile could make sure that you ignore that corporate SSID
outside the office.
4. Install the Wireless Client
Update for 32-bit versions of Microsoft Windows XP with Service Pack 2 (KB 917021). This update stops clients from probing for Preferred
Networks that broadcast their SSIDs when the configuration option "Connect
even if the network is not broadcasting" is disabled.
Ultimately, the most effective way
to neutralize Caffe Latte is to stop using WEP altogether.
Comments
Post a Comment