ch5 PDF
ch5 PDF
ch5 PDF
ALNAZIF NOHAMMED
[email protected]
Topics
Wireless devices have exploded in popularity during the past decade. Common
types of wireless devices and networks include:
• AM/FM radios
• Cordless phones
• Cell phones
• Bluetooth headsets
• Infrared devices, such as TV remotes Wireless doorbells
• Wi-Fi (802.11) LAN networking over RF
• WiMAX (802.16) last-mile broadband2
We will focus our attention on 802.11 Wi-Fi networks specifically. because this
type of Wi-Fi networks are extremely common both in the enterprise and at
home.
1-The IEEE Layer 2 Protocol Series
1- Frame Types
The 802.11 protocol suite defines different types of frames. For forensic
investigators, different types of frames contain different types of evidence, as we
will see. There are three types of 802.11 frames:
• Management Frames—Govern communications between stations, except flow
control.
• Control Frames—Support flow control over a variably available medium (such as
RF).
• Data Frames—Encapsulate the Layer 3+ data that moves between stations
actively engaged in communication on a wireless network.
Forensics value
Wireless access points are typically involved in forensic investigations for one of
a few reasons:
• Wireless access points may contain locally stored logs of connection attempts
authentication successes and failures and other local WAP activity.
• WAP logs can help you track the physical movements of a wireless client
throughout
a building or campus.
• The WAP configuration may provide insight regarding how an attacker gained
access
to the network.
• The WAP configuration may have been modified by an unauthorized party as
part of
an attack.
• The WAP itself may be compromised.
B-Types of Wireless Access Points
There are a wide variety of wireless access points available, General classes of
WAPs include enterprise and consumer devices.
.1 Enterprise
Enterprise facilities typically span a much wider geographic range than home
offices or small businesses.
2- Consumer
Small businesses and home users often deploy consumer-class WAPs in their home
and office environments. These devices are inexpensive and easy to configure for
simple use.
C-WAP Evidence
Spectrum Analysis
Wireless Passive Evidence Acquisition
Analyzing 802.11 Efficiently
A- Spectrum Analysis
There are, literally, an infinite number of frequencies over which data can be
transmitted through the air. Sometimes the most challenging part of an
investigator’s job is simply identifying the wireless traffic in the first place. For
Wi-Fi traffic, the IEEE utilizes three frequency ranges:
• 2.4 GHz (802.11b/g/n)19
• 3.6 GHz (802.11y)20
• 5 GHz (802.11a/h/j/n)21
Each of these frequency ranges is divided into distinct channels, which are
smaller frequency Bands. Although the IEEE has set globally recognized frequency
boundaries for 802.11 protocols,
individual countries typically allow only a subset of these frequency ranges
B-Wireless Passive Evidence Acquisition
In order to capture wireless traffic, investigators need an 802.11 wireless card
capable of running in Monitor mode. Many wireless cards do not support this
capability. Furthermore, in order to ensure totally passive monitoring, it is
preferable to use a special-purpose WiFi monitoring card that can be configured
to operate completely passively.
C-Analyzing 802.11 Efficiently
In order to analyze efficiently we can use tcpdump and tshark
We can use Wireshark to sort out the endianness problem and for large packet
captures in particular, tcpdump and tshark tend to be more efficient and
scalable.
6.4 Common Attacks
Sniffing 224
Rogue Wireless Access Points 225
Evil Twin 227
WEP Cracking
A-Sniffing
Eavesdropping on wireless traffic is extremely common, in part because it is so
easy to doFrom script kiddies in coffee shops to professional surveillance teams,
wireless traffic monitoring is, frankly, popular
B-Rogue Wireless Access Points.
anyone can purchase a cheap WAP and plug it into the company network. Often,
employees do this simply for the sake of convenience, not realizing that it opens
the company to attack.
Criminals also deliberately plant wireless access points that allow them to bypass
the pesky firewall and remotely access the network later on
C-Evil Twin
The “Evil Twin” attack is when an attacker sets up a WAP with the same SSID as
one that is used in the local environment, usually in order to conduct a man-in-
the-middle attack on 802.11 client’s traffic.
D-WEP Cracking
WEP is designed to encrypt the payload of data frames on a wireless network
using a shared key. The key, once selected, is distributed to all stations as a “pre-
shared key” (PSK).
The PSK itself is never exposed on the network, and so it is expected to be
shared in some out-of-band way between the stations that need it.
Each station encrypts the payload of all data frames with the PSK and a randomly
selected initialization vector (IV) so that the encryption key changes for every
frame. The problem with using an IV in a reversible, symmetric encryption
algorithm, such as RC4, is that stations have to supply the IV in plain text. Each
6.5 Locating Wireless Devices
We talked about the types of evidence that you can gather from
wireless access points, and touched on wireless traffic capture and analysis. We
reviewed
common attacks on wireless networks that investigators should be familiar with
so that you
can recognize them in the field. Finally, we discussed one of the most common
hurdles facing
wireless network forensic investigators.