"Hole196": MD Sohail Ahmad
"Hole196": MD Sohail Ahmad
"Hole196": MD Sohail Ahmad
WPA 2
“Hole196”
Md Sohail Ahmad
AirTight Networks
www.airtightnetworks.com
NOT about:
Unauthorized user gaining access to WPA2 secured
network, or
About:
An insider attack, which can be carried out by a
malicious user present inside the network
Traffic encrypted Traffic encrypted
with the private with the private
key of Client1 key of Client2
WiFi Client 1 WiFi Client 2
(Malicious Insider)
Honeypot style of attack will
not work!
Existing wired IDS/IPS can
est
equ ) catch ARP spoofing attack!
P R ay
A R tew
a
fed e G
poo th
S am
(I
WiFi Client 1 WiFi Client 2
(Malicious Insider)
Traffic encrypted Traffic encrypted
with the private with the private
key of Client1 key of Client2
WiFi Client 1 WiFi Client 2
(Malicious Insider)
While PTK is used to protect unicast data
frames , GTK is used to protect group
2
addressed data frames e.g. broadcast ARP WPA
request frames.
Traffic encrypted Traffic encrypted
with PTK1 with PTK2
Private Key Private Key
PTK1 PTK2
WiFi Client 1 WiFi Client 2
Your Group key is GTK1
Newly
associated client
Three connected clients
ARP Req
Legitimate clients
can not detect data
forgery
Broadcast frame
Encrypted with GTK
Malicious insider can
inject forged group
addressed data traffic
Wired LAN
Victim’s data encrypted Victim’s data encrypted
with Attacker’s PTK with Victim’s PTK
3 2
1
I am the Gateway 1 Attacker injects fake ARP Request packet
(Encrypted with GTK) to poison client’s cache for gateway.
Attacker Victim
2 Victim sends all traffic encrypted with its PTK
to the AP, with Attacker as the destination
(gateway)
3 AP forwards Victim’s data to the Attacker
encrypting it in the Attacker’s PTK. So
Attacker can decrypt Victim’s private data.
© AirTight Networks. All rights reserved.
Man-in-the-middle (MITM) Attack
Wired LAN
Attacker forwards victim data to
actual Gateway to provide a
transparent service to the victim
4
Victim
I am the Gateway
(Encrypted with GTK)
Attacker Victim
Victim
th e y
m a
I a te w
Ga
I am the Gateway
Encrypted with GTK
Malicious insider Victim Malicious insider Victim
Spoofed ARP Request frames are sent on Spoofed ARP Request frames are not
the wire and wireless medium by an AP. The sent to AP and never go on wire; hence
attack can be detected by wired IDS/IPS. cannot be detected by wired IDS/IPS
SYN Frame
Replay Attack Detection in WPA2 Expecting
1. All clients learn the PN associated with a GTK PN >700
at the time of association
PN=701
2. AP sends a group addressed data frame to all
clients with a new PN
3. If new PN > locally cached PN, then packet is Access Point Legitimate client
decrypted and after successful decryption,
cached PN is updated with new PN
A malicious user can advance the locally cached PN (replay counter) in all
peer clients by forging a group addressed data frames with a very large PN
PN = 780 PN = 780
Legitimate
Malicious client
client
GTK encryp
ted broadca Client updates PN.
data frame st
PN = 9999 New PN = 9999
PN = 781
X Client checks PN. New
PN = 782 PN (781) < local PN
X (9999)
PN = 783
Packets are dropped
X
……. until PN reaches 9999
wpa_supplicant (0.7.0)
Supplicant software is used to pass updated GTK and PN to be by madwifi
driver
Madwifi (0.9.4)
Software is modified to create spoofed group addressed data frames
with sender as AP address
Ettercap
Delegated/DNSSpoof
SSLSniff
SSLSTRIP
Malicious Victim
… Insider
Disadvantages:
a. Impact on network throughput
b. Requires AP software upgrade (Not going to happen overnight !)
Limitations:
1. Client software is available only for limited
operating systems and hardware platforms
2. Not enterprise grade; Impractical to manually install
on large number of endpoints
© AirTight Networks. All rights reserved.
Can we rely on WLAN infrastructure ?
A’s packet is not
s A
forwarded to B
s i X
hi
, T
B
llo
He
Client A Client B
Similar to WEP Cracking, Skyjacking
and WPA‐TKIP, Hole 196 exploit is
carried out entirely over the air
All WPA2 networks are exposed with the “Hole 196” vulnerability; Inter
user privacy is broken in WPA2
The real fix requires enhancement in the WPA2 protocol. In long term,
standard can fix the problem but in short term AP vendors should provide
a patch (proprietary solution)
Thank You
Md Sohail Ahmad
md.ahmad@airtightnetworks.com
www.airtightnetworks.com
blog.airtightnetworks.com