Vulnerabilidad en WPA2 ( Hole 196 )

Para los que quieran usar el wifi del vecino que se relajen que todavia no se puede romper la clave WPA2 salvo por ataque por diccionario, cosa casi imposible salvo que la clave sea una palabra chorra que se encuentre en un fichero de diccionario en texto plano o en un fichero hash precomputado.

WPA2 vulnerability found
'Hole 196' means malicious insiders could spoof WI-Fi packets, compromise WLAN


WPA2 vulnerability found
'Hole 196' means malicious insiders could spoof WI-Fi packets, compromise WLAN

Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network and compromise other authorized devices using open source software, according to AirTight.

The researcher who discovered Hole 196, Md Sohail Ahmad, AirTight technology manager, intends to demonstrate it at two conferences taking place in Las Vegas next week: Black Hat Arsenal and DEF CON 18.

The Advanced Encryption Standard (AES) derivative on which WPA2 is based has not been cracked and no brute force is required to exploit the vulnerability, Ahmad says. Rather, a stipulation in the standard that allows all clients to receive broadcast traffic from an access point (AP) using a common shared key creates the vulnerability when an authorized user uses the common key in reverse and sends spoofed packets encrypted using the shared group key.

Ahmad explains it this way:

WPA2 uses two types of keys: 1) Pairwise Transient Key (PTK), which is unique to each client, for protecting unicast traffic; and 2) Group Temporal Key (GTK) to protect broadcast data sent to multiple clients in a network. PTKs can detect address spoofing and data forgery. "GTKs do not have this property," according to page 196 of the IEEE 802.11 standard.

These six words comprise the loophole, Ahmad says.

Because a client has the GTK protocol for receiving broadcast traffic, the user of that client device could exploit GTK to create its own broadcast packet. From there, clients will respond to the sending MAC address with their own private key information.

Ahmad says it took about 10 lines of code in open source MadWiFi driver software, freely available on the Internet, and an off-the-shelf client card for him to spoof the MAC address of the AP, pretending to be the gateway for sending out traffic. Clients who receive the message see the client as the gateway and "respond with PTKs", which are private and which the insider can decrypt, Ahmad explains.

From there, "the malicious insider could drop traffic, drop a [denial-of-service] attack, or snoop," Ahmad says.

The ability to exploit the vulnerability is limited to authorized users, AirTight says. Still, year-after-year security studies show that insider security breaches continue to be the biggest source of loss to businesses, whether from disgruntled employees or spies who steal and sell confidential data.


Fuente : http://www.networkworld.com/newsletters/wireless/2010/072610wireless1.html

Van a hacer una desmostracion de la vulnerabilidad en el DEFCON18 y en Black Hat Arsenal este mes.

http://blackhat.com/html/bh-us-10/bh-us-10-specialevents_arsenal.html

https://www.defcon.org/html/defcon-18/dc-18-index.html

Edito : el maquina que ha descubierto el fallo es Md Sohail Ahmad

Mas info en español : http://walhez.com/2010/07/encuentran-vulnerabilidad-en-wpa2-protocolo-de-seguridad-wi-fi/

[bye]
si no me equivoco esta vulnerabilidad permite inyectar trafico cosa que no se podía hacer ahora no?
si no me equivoco esta vulnerabilidad permite inyectar trafico cosa que no se podía hacer ahora no?


inyectar trafico si se puede hacer en wpa2 pero no sirve para nada al menos a la hora de sacar la clave, en wep si es util.

[bye]
2 respuestas