SlideShare a Scribd company logo
Vivek Ramachandran MD Sohail Ahmad www.airtightnetworks.net Caffé Latte with a  Free Topping of  Cracked WEP Retrieving WEP Keys From Road-Warriors
Cracks in WEP -- Historic Evolution 2001 - The insecurity of 802.11, Mobicom, July 2001  N. Borisov, I. Goldberg and D. Wagner. 2001 - Weaknesses in the key scheduling algorithm of RC4. S. Fluhrer, I. Mantin, A. Shamir. Aug 2001. 2002 - Using the Fluhrer, Mantin, and Shamir Attack to Break WEP A. Stubblefield, J. Ioannidis, A. Rubin. 2004 – KoreK, improves on the above technique and reduces the complexity of WEP cracking. We now require only around 500,000 packets to break the WEP key. 2005 – Adreas Klein introduces more correlations between the RC4 key stream and the key. 2007 – PTW extend Andreas technique to further simplify WEP Cracking. Now with just around 60,000 – 90,000 packets it is possible to break the WEP key. IEEE WG admitted that WEP cannot hold any water. Recommended users to upgrade to WPA, WPA2
WEP Attacks – exposure area WEP Attacks Distance from Authorized Network (Miles)  1 10 100 1000 On the Moon FMS, Korek PTW No Mutual Authentication Message  Modification Message  Injection Using known methods, exposure is limited to RF range of WEP enabled network  Can your keys be cracked when roaming clients are miles away from the operational network?
Observation #1 Can we somehow have an isolated Client generate WEP encrypted data packets using the authorized network’s key?  Default Default Windows caches the WEP key of networks in its PNL To crack WEP all we need is encrypted data packets 80K for PTW attack 500K for KoreK attack It does not matter if these packets come from the AP or the Client
Observation #2 Can you force a  WEP client connect to a honey pot without having knowledge of the key? Probe Request “Default” Probe Response Authentication Request Authentication Success Association Request Association Response Data Data
Caffé Latte – Attack timelines Every spoofed Association gives us encrypted data packets (either DHCP or ARP)  Send a De-auth, process repeats, keep collecting the trace Timelines for cracking the WEP key for various network configurations assuming 500k packets is as follows: 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network Configuration
Can we speed it up? DAYS HOURS MINUTES
Problem Formulation A solution is complete  Only if : Solve for all network configurations  Key cracking should be done by the time a user finishes sipping a cup of coffee 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network Configuration
Caffé latte – Shared + DHCP Challenge Enc. Challenge + 128 bytes Keystream Probe Request “Default” Probe Response Authentication Request Challenge Encrypted Challenge Authentication Success
Caffé latte – Shared + DHCP (2) We now have: 128 bytes of keystream Client IP is somewhere between 169.254.0.0 – 169.254.255.255 Can we find the Client IP? 169.254.x.y Connection Established Assoc Request Assoc Response DHCP  DHCP DHCP Gratuitous ARP Gratuitous ARP Gratuitous ARP
Caffé latte – Shared + DHCP (3) Brute force the Client IP 169.254.0.0 – 169.254.255.255 is ~65,000 space ARP Request on wireless is 40 bytes (LLC + ARP +ICV) We have a 128 byte key stream from the previous step  169.254.246.161 Connection Established ARP Request for 169.254.0.1 ARP Request for 169.254.0.2 ARP Request for 169.254.0.3 ARP Request for 169.254.246.161 ARP Response from 169.254.246.161
 
Caffé latte – Shared + DHCP (4) Once the Client IP is known Send a flood of ARP Requests Client will reply back with ARP Responses Start trace collection and run the PTW attack   169.254.246.161 Connection Established ARP Request for 169.254.246.161 ARP Response from 169.254.246.161 ARP Request for 169.254.246.161 ARP Response from 169.254.246.161
 
Caffé latte – Shared + DHCP (5) Once we have around 80,000 ARP Response packets:        
Caffé Latte for Shared Auth + DHCP - Analysis Client IP Discovery phase: 3-4 minutes (send 2 packets for each IP) ARP Request/Response Flood: 4-5 minutes (to get around 80,000 packets) Key cracking with Aircrack-ng: ~1 minute Can this technique be used for the other configurations as well? Is there a more general solution to the problem ? Lets look at the Open + Static IP case 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP ~ 10 mins Shared + DHCP Approximate Cracking time Network Configuration
Caffé latte – Open + Static IP 5.5.5.5 Lets say Client IP is 5.5.5.5 After Association, the Client sends Gratuitous ARP for 5.5.5.5 Can we use this ARP packet somehow? Probe Request “Default” Probe Response Authentication Request Authentication Success Assoc Request Assoc Response Gratuitous ARP from 5.5.5.5 Gratuitous ARP from 5.5.5.5 Gratuitous ARP from 5.5.5.5
Using flaws in WEP – Message Modification and Message Replay First mention in “Intercepting Mobile Communication: The Insecurity of 802.11” – Nikita, Ian and David, UC Berkley It’s possible to flip bits in a WEP encrypted packet and adjust the ICV to make the packet valid This packet can now be replayed back into the air and will be accepted by WEP devices Using this technique we can convert a Gratuitous ARP request into an ARP request destined for the Client coming from a different IP address
Applying Bit Flipping to an Encrypted ARP packet + + + 5.5.5.250 WEP ICV ARP Header LLC Header WEP Params MAC Header Target MAC Target IP Sender IP Sender MAC Opcode Protocol Size Hardware Size Protocol Type Hardware Type AA AA AA AA AA AA 05 05 05 05 05 05 05 05 FF 00 00 00 00 00 FF 00 00 00 00 00 00 00 55 AA AA AA AA AA FA 05 05 05 05 05 05 05
Caffé latte – Open + Static IP (2) We send this bit flipped ARP packet to the Client We don’t really care what the bit flipped IP was   Collect the ARP responses and fire up Aircrack-ng   5.5.5.5 Connection Established ARP Request for 5.5.5.5 from 5.5.5.250 ARP Response from 5.5.5.5 to 5.5.5.250 ARP Request for 5.5.5.5 from 5.5.5.250 ARP Response from 5.5.5.5 to 5.5.5.250
 
Caffé latte – Open + Static IP (3) Once we have around 60,000 ARP Response packets:        
Caffé Latte for Open + Static IP - Analysis Capturing an ARP packet and bit flipping it: ~1 msec   ARP Request/Response Flood: 4-5 minutes (to get around 80,000 packets) Key cracking with Aircrack-ng: ~1 minute Bit Flipping works for all the cases   ~ 6 minutes Open + Static IP ~ 6 minutes Open + DHCP ~ 6 minutes Shared + Static IP ~ 6 minutes Shared + DHCP Approximate Cracking time Network Configuration
Implications of Caffé Latte Risk is higher than previously perceived: WEP keys can now be cracked remotely, putting your enterprise at risk WEP Honey-pots are now possible  Few hours before our talk we came to know that a tool WEPOff had taken a stab at attacking isolated clients using a different technique (fragmentation) and only for a limited set of network configurations (DHCP). Also due to the nature of the fragmentation attack, it has to send 9 times the number of packets. http://www.darknet.org.uk/2007/01/wep0ff-wireless-wep-key-cracker-tool/
Advisory Yet another reason to upgrade to WPA/WPA2 Road warriors need to be careful even more now: Exercise caution when using public hotspots Upgrade your wireless drivers regularly Switch off wireless when not in use  … … Too many best practices to remember!  Use a freely available wireless security agent on your laptop If you are using legacy WEP, do not build your enterprise defenses assuming the WEP key cannot be broken
Questions?   [email_address]   Md.Ahmad@airtightnetworks.net  Airtight Networks    www.AirTightNetworks.net   Acknowledgements: Amit Vartak (amit.vartak@airtightnetworks.net)

More Related Content

PPTX
Windows Server 2019.pptx
PDF
Attacking Oracle with the Metasploit Framework
PDF
Tomcat and apache httpd training
PPTX
voip gateway
PDF
Introduction To WS-Policy
PPT
OOUG: Oracle transaction locking
PPTX
Network Virtualization
PDF
Integration Solution Patterns
Windows Server 2019.pptx
Attacking Oracle with the Metasploit Framework
Tomcat and apache httpd training
voip gateway
Introduction To WS-Policy
OOUG: Oracle transaction locking
Network Virtualization
Integration Solution Patterns

What's hot (20)

PPTX
Caching
PDF
Advanced SQL injection to operating system full control (whitepaper)
PPTX
CouchDB
PDF
Single sign on using SAML
PPTX
Oracle Database Security
PPTX
Automating Your Clone in E-Business Suite R12.2
PPTX
Cloud computing security issues and challenges
PPT
Dataguard presentation
PDF
Oracle RAC 12c Practical Performance Management and Tuning OOW13 [CON8825]
PPTX
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
PDF
Neat tricks to bypass CSRF-protection
PDF
Installing and configuring a dhcp on windows server 2016 step by step
PDF
Rman 12c new_features
PPT
UKOUG, Oracle Transaction Locks
ODP
Caching Strategies
PDF
Web vulnerabilities
PDF
https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...
PPTX
Cloud platforms - Cloud Computing
PDF
DOAG - Oracle Database Locking Mechanism Demystified
PDF
DCiM Evaluation Checklist
Caching
Advanced SQL injection to operating system full control (whitepaper)
CouchDB
Single sign on using SAML
Oracle Database Security
Automating Your Clone in E-Business Suite R12.2
Cloud computing security issues and challenges
Dataguard presentation
Oracle RAC 12c Practical Performance Management and Tuning OOW13 [CON8825]
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
Neat tricks to bypass CSRF-protection
Installing and configuring a dhcp on windows server 2016 step by step
Rman 12c new_features
UKOUG, Oracle Transaction Locks
Caching Strategies
Web vulnerabilities
https://docs.google.com/presentation/d/1DcL4zK6i3HZRDD4xTGX1VpSOwyu2xBeWLT6a_...
Cloud platforms - Cloud Computing
DOAG - Oracle Database Locking Mechanism Demystified
DCiM Evaluation Checklist
Ad

Viewers also liked (20)

PPTX
Preventing jamming attack by combining cryptography
PPSX
CyberLab CCEH Session - 18 Cryptography
PPT
Caffe Latte Attack Presented In Toorcon
PPT
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
PPT
AJAL JAMMING
PPTX
Security Attack Analysis for Finding and Stopping Network Attacks
PPTX
WiFi Pineapple - Alex R
PPTX
Wireless signal jamming
PPTX
Presentation on Jamming
PDF
Wi-Fi Hotspot Attacks
PDF
How JESS3 Saved Christmas!
PPTX
Buffer overflow attacks
PPTX
honey pots introduction and its types
PPT
Honeypot
PPTX
Honeypot
PPT
All about Honeypots & Honeynets
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PPTX
Mobile jammer
Preventing jamming attack by combining cryptography
CyberLab CCEH Session - 18 Cryptography
Caffe Latte Attack Presented In Toorcon
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
AJAL JAMMING
Security Attack Analysis for Finding and Stopping Network Attacks
WiFi Pineapple - Alex R
Wireless signal jamming
Presentation on Jamming
Wi-Fi Hotspot Attacks
How JESS3 Saved Christmas!
Buffer overflow attacks
honey pots introduction and its types
Honeypot
Honeypot
All about Honeypots & Honeynets
OWASP Top 10 Proactive Control 2016 (C5-C10)
Mobile jammer
Ad

Similar to Caffe Latte Attack (20)

PPT
Cafe Latte
PDF
Cracking Wep And Wpa Wireless Networks
PDF
Fundamentals of network hacking
PDF
How to Hack WiFi on Windows
PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
PDF
WiFi Pentesting with aircrack-ng.pdf
PDF
Aircrack
PDF
Wi-fi Hacking
PDF
International Conference On Electrical and Electronics Engineering
PDF
Cracking WEP Secured Wireless Networks
PPTX
Wifi cracking
PPT
Wireless security837
PPTX
Wireless Security null seminar
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wireless hacking
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
PPTX
DevLink - WiFu: You think your wireless is secure?
PDF
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
PDF
Wireless Network Security Software Wireless Network Security Software
Cafe Latte
Cracking Wep And Wpa Wireless Networks
Fundamentals of network hacking
How to Hack WiFi on Windows
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
WiFi Pentesting with aircrack-ng.pdf
Aircrack
Wi-fi Hacking
International Conference On Electrical and Electronics Engineering
Cracking WEP Secured Wireless Networks
Wifi cracking
Wireless security837
Wireless Security null seminar
Wi-Fi security – WEP, WPA and WPA2
Wireless hacking
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008
DevLink - WiFu: You think your wireless is secure?
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
Wireless Network Security Software Wireless Network Security Software

More from AirTight Networks (20)

PPTX
Is 11ac Right for Your Network?
PDF
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
PDF
Wi-Fi Offload Summit - Monetise Thyself
PDF
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
PDF
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
PDF
AirTight Networks Evolution - Cloud & MSP
PDF
AirTight Networks WIPS at Wireless Field Day 6 WFD6
PDF
AirTight social wifi solution brief
PDF
Considerations for a secure enterprise wlan data connectors 2013
PPT
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
PDF
Survey on the Impact of BYOD on Enterprise Security
PDF
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
PDF
Non WiFi interference combat guide 1
PDF
WPA2 Hole196 Vulnerability FAQs
PDF
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
PDF
Conquering the Minefield of Soft Rogue APs in the Enterprise
PPT
Windows 7 - A New Wireless Risk to the Enterprise
PDF
802.11w Tutorial
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPT
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Is 11ac Right for Your Network?
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Wi-Fi Offload Summit - Monetise Thyself
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
AirTight Networks Evolution - Cloud & MSP
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight social wifi solution brief
Considerations for a secure enterprise wlan data connectors 2013
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Survey on the Impact of BYOD on Enterprise Security
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
Non WiFi interference combat guide 1
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
Conquering the Minefield of Soft Rogue APs in the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
802.11w Tutorial
Understanding WiFi Security Vulnerabilities and Solutions
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Tartificialntelligence_presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Getting Started with Data Integration: FME Form 101
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
1. Introduction to Computer Programming.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative analysis of optical character recognition models for extracting...
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Tartificialntelligence_presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
Getting Started with Data Integration: FME Form 101
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative study of natural language inference in Swahili using monolingua...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Mushroom cultivation and it's methods.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Caffe Latte Attack

  • 1. Vivek Ramachandran MD Sohail Ahmad www.airtightnetworks.net Caffé Latte with a Free Topping of Cracked WEP Retrieving WEP Keys From Road-Warriors
  • 2. Cracks in WEP -- Historic Evolution 2001 - The insecurity of 802.11, Mobicom, July 2001 N. Borisov, I. Goldberg and D. Wagner. 2001 - Weaknesses in the key scheduling algorithm of RC4. S. Fluhrer, I. Mantin, A. Shamir. Aug 2001. 2002 - Using the Fluhrer, Mantin, and Shamir Attack to Break WEP A. Stubblefield, J. Ioannidis, A. Rubin. 2004 – KoreK, improves on the above technique and reduces the complexity of WEP cracking. We now require only around 500,000 packets to break the WEP key. 2005 – Adreas Klein introduces more correlations between the RC4 key stream and the key. 2007 – PTW extend Andreas technique to further simplify WEP Cracking. Now with just around 60,000 – 90,000 packets it is possible to break the WEP key. IEEE WG admitted that WEP cannot hold any water. Recommended users to upgrade to WPA, WPA2
  • 3. WEP Attacks – exposure area WEP Attacks Distance from Authorized Network (Miles) 1 10 100 1000 On the Moon FMS, Korek PTW No Mutual Authentication Message Modification Message Injection Using known methods, exposure is limited to RF range of WEP enabled network Can your keys be cracked when roaming clients are miles away from the operational network?
  • 4. Observation #1 Can we somehow have an isolated Client generate WEP encrypted data packets using the authorized network’s key? Default Default Windows caches the WEP key of networks in its PNL To crack WEP all we need is encrypted data packets 80K for PTW attack 500K for KoreK attack It does not matter if these packets come from the AP or the Client
  • 5. Observation #2 Can you force a WEP client connect to a honey pot without having knowledge of the key? Probe Request “Default” Probe Response Authentication Request Authentication Success Association Request Association Response Data Data
  • 6. Caffé Latte – Attack timelines Every spoofed Association gives us encrypted data packets (either DHCP or ARP) Send a De-auth, process repeats, keep collecting the trace Timelines for cracking the WEP key for various network configurations assuming 500k packets is as follows: 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network Configuration
  • 7. Can we speed it up? DAYS HOURS MINUTES
  • 8. Problem Formulation A solution is complete Only if : Solve for all network configurations Key cracking should be done by the time a user finishes sipping a cup of coffee 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP 3 days Shared + DHCP Approximate Cracking time Network Configuration
  • 9. Caffé latte – Shared + DHCP Challenge Enc. Challenge + 128 bytes Keystream Probe Request “Default” Probe Response Authentication Request Challenge Encrypted Challenge Authentication Success
  • 10. Caffé latte – Shared + DHCP (2) We now have: 128 bytes of keystream Client IP is somewhere between 169.254.0.0 – 169.254.255.255 Can we find the Client IP? 169.254.x.y Connection Established Assoc Request Assoc Response DHCP DHCP DHCP Gratuitous ARP Gratuitous ARP Gratuitous ARP
  • 11. Caffé latte – Shared + DHCP (3) Brute force the Client IP 169.254.0.0 – 169.254.255.255 is ~65,000 space ARP Request on wireless is 40 bytes (LLC + ARP +ICV) We have a 128 byte key stream from the previous step 169.254.246.161 Connection Established ARP Request for 169.254.0.1 ARP Request for 169.254.0.2 ARP Request for 169.254.0.3 ARP Request for 169.254.246.161 ARP Response from 169.254.246.161
  • 12.  
  • 13. Caffé latte – Shared + DHCP (4) Once the Client IP is known Send a flood of ARP Requests Client will reply back with ARP Responses Start trace collection and run the PTW attack  169.254.246.161 Connection Established ARP Request for 169.254.246.161 ARP Response from 169.254.246.161 ARP Request for 169.254.246.161 ARP Response from 169.254.246.161
  • 14.  
  • 15. Caffé latte – Shared + DHCP (5) Once we have around 80,000 ARP Response packets:   
  • 16. Caffé Latte for Shared Auth + DHCP - Analysis Client IP Discovery phase: 3-4 minutes (send 2 packets for each IP) ARP Request/Response Flood: 4-5 minutes (to get around 80,000 packets) Key cracking with Aircrack-ng: ~1 minute Can this technique be used for the other configurations as well? Is there a more general solution to the problem ? Lets look at the Open + Static IP case 2 days Open + Static IP 6 days Open + DHCP 1.5 days Shared + Static IP ~ 10 mins Shared + DHCP Approximate Cracking time Network Configuration
  • 17. Caffé latte – Open + Static IP 5.5.5.5 Lets say Client IP is 5.5.5.5 After Association, the Client sends Gratuitous ARP for 5.5.5.5 Can we use this ARP packet somehow? Probe Request “Default” Probe Response Authentication Request Authentication Success Assoc Request Assoc Response Gratuitous ARP from 5.5.5.5 Gratuitous ARP from 5.5.5.5 Gratuitous ARP from 5.5.5.5
  • 18. Using flaws in WEP – Message Modification and Message Replay First mention in “Intercepting Mobile Communication: The Insecurity of 802.11” – Nikita, Ian and David, UC Berkley It’s possible to flip bits in a WEP encrypted packet and adjust the ICV to make the packet valid This packet can now be replayed back into the air and will be accepted by WEP devices Using this technique we can convert a Gratuitous ARP request into an ARP request destined for the Client coming from a different IP address
  • 19. Applying Bit Flipping to an Encrypted ARP packet + + + 5.5.5.250 WEP ICV ARP Header LLC Header WEP Params MAC Header Target MAC Target IP Sender IP Sender MAC Opcode Protocol Size Hardware Size Protocol Type Hardware Type AA AA AA AA AA AA 05 05 05 05 05 05 05 05 FF 00 00 00 00 00 FF 00 00 00 00 00 00 00 55 AA AA AA AA AA FA 05 05 05 05 05 05 05
  • 20. Caffé latte – Open + Static IP (2) We send this bit flipped ARP packet to the Client We don’t really care what the bit flipped IP was  Collect the ARP responses and fire up Aircrack-ng  5.5.5.5 Connection Established ARP Request for 5.5.5.5 from 5.5.5.250 ARP Response from 5.5.5.5 to 5.5.5.250 ARP Request for 5.5.5.5 from 5.5.5.250 ARP Response from 5.5.5.5 to 5.5.5.250
  • 21.  
  • 22. Caffé latte – Open + Static IP (3) Once we have around 60,000 ARP Response packets:   
  • 23. Caffé Latte for Open + Static IP - Analysis Capturing an ARP packet and bit flipping it: ~1 msec  ARP Request/Response Flood: 4-5 minutes (to get around 80,000 packets) Key cracking with Aircrack-ng: ~1 minute Bit Flipping works for all the cases ~ 6 minutes Open + Static IP ~ 6 minutes Open + DHCP ~ 6 minutes Shared + Static IP ~ 6 minutes Shared + DHCP Approximate Cracking time Network Configuration
  • 24. Implications of Caffé Latte Risk is higher than previously perceived: WEP keys can now be cracked remotely, putting your enterprise at risk WEP Honey-pots are now possible Few hours before our talk we came to know that a tool WEPOff had taken a stab at attacking isolated clients using a different technique (fragmentation) and only for a limited set of network configurations (DHCP). Also due to the nature of the fragmentation attack, it has to send 9 times the number of packets. http://www.darknet.org.uk/2007/01/wep0ff-wireless-wep-key-cracker-tool/
  • 25. Advisory Yet another reason to upgrade to WPA/WPA2 Road warriors need to be careful even more now: Exercise caution when using public hotspots Upgrade your wireless drivers regularly Switch off wireless when not in use … … Too many best practices to remember! Use a freely available wireless security agent on your laptop If you are using legacy WEP, do not build your enterprise defenses assuming the WEP key cannot be broken
  • 26. Questions? [email_address] [email protected] Airtight Networks www.AirTightNetworks.net Acknowledgements: Amit Vartak ([email protected])

Editor's Notes