Difference between revisions of "WPA Attack"

From ivc wiki
Jump to navigationJump to search
 
(119 intermediate revisions by the same user not shown)
Line 1: Line 1:
WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.
<!--
NAME - ENC - KEY -                                    CHANNEL SIGN - BSSID -            IP -            ISP
SMC              Open  *                              6        00:13:F7:1C:62:D6  192.168.2.102  TDC 2.11/1.89mbit webadmin pwd:smcadmin
NETGEAR          Open  *                              6        00:1B:2F:5D:41:40  192.168.1.2    Telenor/ingen inet 1.0/0.4mbit webadmin pwd:admin/password
Remen            WEP  64:75:73:74:33 / dust3          11  -65  00:02:61:28:8C:C0  192.168.1.6    Tele2 3/0.8mbit
privatCD1839    WEP  26:D8:FB:D7:C0                  6    -69  00:90:D0:EB:DD:5D  10.0.0.6        Telenor 0.65/0.4  webadmin
dlink            WEP  72:6B:69:6E:6E / tkinn          3        00:24:01:34:0E:23  192.168.0.196  Digital Canal
SMC              WEP  45:45:45:45:45 / EEEEE          6    20  00:13:F7:01:BC:D2  192.168.2.109  Telenor 2.46/0.67  webadmin pwd:smcadmin
Ligg unna        WEP  92:01:41:05:00                  6    18  00:15:E9:F2:D6:9C 
UnniB            WEP  45:67:88:76:54 / Eg.vT          6    18  00:19:5B:5B:35:9B 
privat2A69B0    WEP  20:F7:4B:97:A0                  6    11  00:1D:68:76:EB:8A
Lorentsen        WEP  09:87:65:43:21                  6    19  00:17:9A:F3:73:81
 
#!/bin/sh
pyrit -f passwords.txt import_passwords
 
lines=`cat essid_list.txt|wc -l`
for (( i = 0; i <= 5; i++ ))
do
essid=`tail -$i essid_list.txt|head -1`
echo "Run $i -> $essid, processing..."
pyrit -f "$essid.cow" -e "$essid" batch
echo "Done, exported to $essid.cow!"
done
 
#!/bin/sh
cd /root/pyrit
cows=`ls --sort=time *.cow`'
 
for file in $cows
do
echo -e "Compressing $file..."
tar zcvf compressed/$file.tgz $file
rm -f $file
done
 
-->
WPA is the precursor to WEP to fill a need for a secure replacement after the fully disclosed and flawed WEP encryption.
 
* [[WEP Cracking]]
* [[Pyrit setup]]


== Background ==
== Background ==
Most wireless networks operating today use WPA and a Pre-Shared Key (PSK) between parties, i.e. a common password between the Access Point and Client Station, for protection. While the 802.11i standard, of which WPA is implemented on, is still intact the authentication is prone to a offline brute-force attack.
=== 4-Way handshake ===
When a client want to connect to a access point, the following simplified stages will take place:
# Client will take the Password and ESSID of the network to compute a ''Pairwise Master Key'' and send a request to the AP asking to connect
# AP will responds with a random ''ANonce'' number
# Client create a random ''SNonce'' number, take the ''Pairwise Master Key'', ''ANonce'', ''SNonce'', and ''AP and client MAC address'' to compute a ''Pairwise Transient Key''
# Client will sign the ''SNonce'' number using the ''Pairwise Transient Key'' and send it unencrypted to the AP
# AP receives the signed ''SNonce'', and compute the ''Pairwise Master Key'' from its Password and ESSID. Use the ''Pairwise Master Key'', ''ANounce'', ''SNounce'', and ''AP and client MAC address'' to compute a ''Pairwise Transient Key''
# By signing the ''SNonce'' message with the new ''Pairwise Transient Key'', the AP can match the ''Integrity Code'' of the ''SNonce'' message sent from the client.
# If it's the same, the AP can then assume the client used the same ''Pairwise Master Key'' (Password+ESSID) to generate the ''Pairwise Transient Key'', subsequently used to sign the message
# AP sends an acknowledgment to the client signed with the ''Pairwise Transient Key'' and includes information for further communication


For an excellent explaination, see [http://www.aircrack-ng.org/doku.php?id=airolib-ng the Airolib-ng manual].
For an excellent explanation, see [http://www.aircrack-ng.org/doku.php?id=airolib-ng the Airolib-ng manual].


* [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access]
* [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access]
* [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page]
* [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page]
=== Key generation ===
The PMK is generated using the following relatively processor intensive function, pseudo code:
* '''PMK = PBKDF2(passphrase, ssid, ssidLength, 4096, 256)'''
Where the PBKDF2 method is from PKCS #5 v2.0: Password-based Cryptography Standard. This means that the concatenated string of the
passphrase, SSID, and the SSIDlength is hashed 4096 times to generate a value of 256 bits. The lengths of the passphrase and the SSID have little impact on the speed of this operation [http://www.icsalabs.com/icsa/docs/html/communities/WLAN/wp_PSKStudy.pdf].
And the other PTK hash is generated using this less processor intensive function, pseudo code:
* '''PTK = PRF-512(PMK, "Pairwise key expansion", Min(AP_Mac, Client_Mac) || Max(AP_Mac, Client_Mac) || Min(ANonce, SNonce) || Max(ANonce, SNonce))'''
The PTK is a keyed-HMAC function using the PMK on the two MAC addresses and the two nonces from the first two packets of the 4-Way Handshake. [http://www.icsalabs.com/icsa/docs/html/communities/WLAN/wp_PSKStudy.pdf].
* '''MIC =  HMAC_MD5(MIC Key, 16, 802.1x data)'''
A MIC value is calculated, using the MIC Key from the PTK and the EAPoL message.
Generating the PMK using the PBKDF2 function is slow and costly. It can be pre-computed for time-space-benefit. Both coWPAtty and Pyrit can create these hash-tables. Pyrit is especially fast as it's utilizing the GPGPU concept to speed up the process, see the [http://code.google.com/p/pyrit/ Pyrit project page] to see the difference.
'''Details:'''
* [http://www.icsalabs.com/icsa/docs/html/communities/WLAN/wp_PSKStudy.pdf PSK as the Key Establishment Method]
* [http://www.arcanesecurity.net/practical-security-articles/wpa-attack/view.html WPA Passive Dictionary Attack Overview]
* [http://antionline.com/showthread.php?t=263755 Wireless Security WPA discussion thread]
* [http://etutorials.org/Networking/802.11+security.+wi-fi+protected+access+and+802.11i/Part+II+The+Design+of+Wi-Fi+Security/Chapter+10.+WPA+and+RSN+Key+Hierarchy/Computing+the+Temporal+Keys/ Computing the Temporal Keys]
* [http://www.ciscopress.com/articles/article.asp?p=370636&seqNum=6 Cracking Wi-Fi Protected Access (WPA), Part 2, Page 6]
* [http://www.kimiushida.com/bitsandpieces/articles/the_many_paths_if_wi-fi_security/index.html The Many Paths of Wi-Fi Security]
=== Attack ===
An offline attack on the functions above are possible by disassociating any connected client(s), capturing a full 4-way handshake session when the client(s) re-connect, and then extrapolate the AP MAC, Client MAC, the ANonce and SNonce. The SSID is already known.
Present with the above information it's possible to brute-force the passphrase by computing the 4-way handshake as mentioned above (calculate the ''PMK'', ''PTK'', and subsequently sign the ''SNonce'' to get the ''Integrity Code'') with every possible passphrase+SSID combination. If the passphrase is correct the ''Integrity Code'' will match the captured ''Integrity Code''.
See the coWPAtty and Pyrit source code for examples on the handshake process.
=== Counter-measures ===
As it's explained above and clear, a long and alpha-numeric password will thwart this dictionary attack. Use a something like [http://www.kurtm.net/wpa-pskgen/ kurtm.net WPA-PSK generator] or preferably the [http://www.yubico.com/home/index/ Yubico USB key adapter] to generate a truly random password.


== Tools ==
== Tools ==
* '''[http://code.google.com/p/pyrit/ pyrit]''' [http://pyrit.wordpress.com/ blog] - [http://code.google.com/p/pyrit/wiki/ReferenceManual Reference manual] - [http://code.google.com/p/pyrit/wiki/ExtendPyrit Code details]
* '''[http://code.google.com/p/pyrit/ pyrit]''' - [http://pyrit.wordpress.com/ blog] - [http://code.google.com/p/pyrit/wiki/ReferenceManual Reference manual] - [http://code.google.com/p/pyrit/wiki/ExtendPyrit Code details]
** Like coWPatty and Airolib-ng
** Like coWPatty and Airolib-ng
** Pre-compute PMK keys
** Pre-compute PMK keys
** Import compressed (.gz) files
** Supports ''stdin'' (i.e. John the Ripper piping)
** Internal database over precomputed ESSID and PMK combinations
** Internal database over precomputed ESSID and PMK combinations
** Can export to *.cow (coWPAtty) and *.db (Airolib-ng)
** Export PMK to coWPAtty (*.cow ) and Airolib-ng (*.db) supported files
** GPGPU acceleration
** GPGPU acceleration
** Strip out 4-way handshake from capture file
** Strip out 4-way handshake from capture file


* '''[http://www.wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty Main page]''' - [http://www.willhackforsushi.com/Cowpatty.html coWPAtty project page] - [http://www.willhackforsushi.com/code/cowpatty/4.3/README Readme]
* '''[http://www.wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty]''' - [http://www.willhackforsushi.com/Cowpatty.html coWPAtty project page] - [http://www.willhackforsushi.com/code/cowpatty/4.3/README Readme]
** Like Pyrite and Airolib-ng
** Like Pyrite and Airolib-ng
** WPA-PSK attack on specific ESSID and captured 4-way handshake dump
** WPA-PSK attack on specific ESSID and captured 4-way handshake dump
Line 37: Line 127:
** 7 and 33 GB torrents
** 7 and 33 GB torrents
** [http://hak5.org/forums/index.php?showtopic=12708 Hak5 single tables downloads]
** [http://hak5.org/forums/index.php?showtopic=12708 Hak5 single tables downloads]
== Drivers ==
The Alfa AWUS036H adapter is a really good 500 mW USB device based on the '''RTL8187''' chipset, but the drivers are/were buggy. Currently, as of September 2009, it seems that the Compat Wireless rtl8187/mac80211 framework drivers are the most stable and reliable for general use and the old r8187/ieee80211 drivers are most suitable for the Aircrack-ng suite and frame injection [http://forum.aircrack-ng.org/index.php?topic=5755.0]. See the tutorial link below for details on how to switch between the drivers.
I can confirm that the latest rtl8187/mac80211 drivers are slow. Packet injection using same device in Backtrack 3 (BT3) was much faster than in Backtrack (BT4) pre-final. Unsure of the cause, but it seems that the latest drivers lack a speed patch used previously (see thread below). BT3 uses the r8187/ieee80211_rtl stack while BT4 uses the main kernel rtl8187/mac80211 stack with some patches already applied (the BT4 Beta, not Pre-final, had [http://www.remote-exploit.org/news.html some rtl8187/mac80211 speed improvements] applied).
<!--
Summary for rtl8187/mac80211 driver:
apt-get install linux-headers-$(uname -r) build-essential make patch gettext gcc python-psyco autoconf subversion tcl8.5 libssl-dev libnl1 libnl-dev
cd /usr/src/linux-source-$(uname -r)
sudo make menuconfig
sudo make
sudo make modules
sudo rmmod rtl8187
sudo rmmod mac80211
echo "blacklist rtl8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist r8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist rt2870sta" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist mac80211" | sudo tee -a /etc/modprobe.d/blacklist
sudo mkdir /usr/src/drivers
cd /usr/src/drivers
sudo wget http://download.aircrack-ng.org/drivers/compat-wireless-aircrack-alfa036h-050nh.tar.bz2
sudo tar jxvf compat-wireless-aircrack-alfa036h-050nh.tar.bz2
cd compat-wireless-aircrack-alfa036h-050nh
sudo make
sudo make install
sudo make unload
-->
Summary to install the BT4 r8187/ieee80211 (r8187-drivers) driver package:
aptitude search r8187
-- and look for the kernel version the driver was compiled for, and install it:
aptitude install linux-image-2.6.30.5 linux-source-2.6.30.5
dpkg --force-overwrite -i /var/cache/apt/archives/linux-image-2.6.30.5_2.6.30.5-10.00.Custom_i386.deb # if it reports firmware files already exists
 
reboot # to load new kernel
sudo rmmod rtl8187
sudo rmmod mac80211
echo "blacklist rtl8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist r8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist rt2870sta" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist mac80211" | sudo tee -a /etc/modprobe.d/blacklist
aptitude install r8187-drivers
modprobe r8187
* [http://forum.aircrack-ng.org/index.php?topic=5755.0 TUTORIAL: Installing drivers RTL8187, r8187, RT2800usb on UBUNTU]
* [http://forum.aircrack-ng.org/index.php?PHPSESSID=10a2515874b7caa7dba018114a6d23ec&action=printpage;topic=5003.0 tl8187 injection speed patches on linux-2.6.29]
* [http://forums.remote-exploit.org/newbie-area/25639-mac80211-ieee80211.html Mac80211 to ieee80211]


== Word lists ==
== Word lists ==
=== List of word lists ===
These are compiled word lists and readily available.
These are compiled word lists and readily available.


=== List of word lists ===
* '''[http://www.renderlab.net/projects/WPA-tables/ Church of Wifi wordlists]''' - passwords2 (2.1 MB) and 9-final-wordlist (11 MB)
* '''[http://www.renderlab.net/projects/WPA-tables/ Church of Wifi wordlists]''' - passwords2 (2.1 MB) and 9-final-wordlist (11 MB)
* '''[http://www.outpost9.com/files/WordLists.html Outpost9.com]''' ([http://www.outpost9.com/files/wordlists/dic-0294.zip direct]) - dic-0294 (8.04 MB) ([http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html reference])
* '''[http://www.outpost9.com/files/WordLists.html Outpost9.com]''' ([http://www.outpost9.com/files/wordlists/dic-0294.zip direct]) - dic-0294 (8.04 MB) ([http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html reference])
* '''[http://www.openwall.com/wordlists/ Openwall wordlists]''' - Multiple languages, small fee
* '''[http://www.openwall.com/wordlists/ Openwall wordlists]''' - Multiple languages, small fee [http://ftp.se.kde.org/pub/security/tools/net/Openwall/wordlists/]
* '''[http://www.theargon.com/achilles/wordlists/ The Argon various wordlists]''' - There are WPA versions of these lists, see Xploitz below
* '''[http://www.theargon.com/achilles/wordlists/ The Argon various wordlists]''' - There are WPA versions of these lists, see Xploitz below
* '''[http://forums.remote-exploit.org/general-discussion/11875-xploitz-2-master-password-collections.html Xploitz Master Password Collection]'''
* '''[http://forums.remote-exploit.org/general-discussion/11875-xploitz-2-master-password-collections.html Xploitz Master Password Collection]'''
Line 50: Line 192:


=== Generating word lists ===
=== Generating word lists ===
By following simple guidelines a good word-list can be generated. Consider the following:
By following simple guidelines a good word-list can be generated. Consider the following [http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa--wpa2?start=5]:


* Most people use easy to remember passwords, in this case it has to be 8 characters or over in length
* Most people use easy to remember passwords, in this case it has to be 8 characters or over in length
Line 59: Line 201:
* Forename and surname often used
* Forename and surname often used


[http://www.openwall.com/john/ John The Ripper] is a great utility to create all the permutations mentioned above. Piping is supported to avoid storing the new words. It has an extended [http://www.openwall.com/john/doc/RULES.shtml rules engine] to build the permutations.
[http://www.openwall.com/john/ John The Ripper] and Raptor 3 are great utilities to create all the permutations mentioned above. JTP can pipe the data to avoid having to save the new stream. JTR has an extended [http://www.openwall.com/john/doc/RULES.shtml rules engine] to build the permutations.


  john -wordfile:dictfile -rules -session:johnrestore.dat -stdout:63 | \
  john -wordfile:dictfile -rules -session:johnrestore.dat -stdout:63 | \
   cowpatty -r eap-test.dump -f - -s somethingclever [http://www.willhackforsushi.com/code/cowpatty/4.3/README]
   cowpatty -r eap-test.dump -f - -s somethingclever [http://www.willhackforsushi.com/code/cowpatty/4.3/README]
=== Tools ===
* [http://www.openwall.com/john/ John The Ripper]
* [http://www.governmentsecurity.org/forum/index.php?showtopic=23670 Raptor 3] ([http://hansatan.com/?d=raptorsetup Guide])
== GPU acceleration ==
[[Image:CPU_vs_GPU.png|thumb]]
CUDA (Compute Unified Device Architecture) is a parallel computing architecture developed by nVidia [http://en.wikipedia.org/wiki/CUDA]. Competitively, FireStream / Fire Processor is a stream processor developed by ATI Technologies. Both are based on the [http://en.wikipedia.org/wiki/ GPGPU] (General Purpose Graphics Processing Units) concept for heavy floating-point computations [http://en.wikipedia.org/wiki/AMD_FireStream]. Instead of having four or eight threads crunching on a parallelized task in the CPU, you could have 64, 320, or how many stream processors (Unified Shaders) tackling the same work in the GPU [http://www.tomshardware.com/reviews/amd-stream-gpgpu,2335.html].
Traditionally the GPU has been very limited, only accelerating part of the graphics pipeline. Utilizing the GPU to perform floating-point computations is an order of magnitudes faster than on a modern CPU. It possible to achieve over a teraflop of theoretical computing capacity using relatively inexpensive commodity hardware.
As a side-note, SLI can not be used, only individual processor units.
* [http://www.nvidia.com/object/cuda_learn_products.html List of CUDA enabled nVidia video cards]
* [http://en.wikipedia.org/wiki/AMD_FireStream#AMD_stream_processing_lineup List of AMD/ATI Stream processor line-up]
* [http://www.overclock.net/overclock-net-folding-home-team/370859-nitteos-f-h-gpu2-farm.html nitteo's gigant F@H GPU2 FARM]
* [http://www.manifold.net/doc/nvidia_cuda.htm Manifold nVidia CUDA review]
* [http://www.tomshardware.com/reviews/nvidia-cuda-gpu,1954.html Tom's Hardware: Look at Nvidia CUDA]
== Practical attak ==
=== Handy commands ===
Connect to OPEN network:
ifconfig wlan0 down
iwconfig wlan0 mode managed
iwconfig wlan0 essid SMC
dhclient wlan0 -d
Connect to WEP protected network:
ifconfig wlan0 down
iwconfig wlan0 mode managed
iwconfig wlan0 enc ''(40/104bit key)''
iwconfig wlan0 essid ''SMC''
dhclient wlan0 -d
== Performance measurements ==
=== SuperMicro Tesla GPU server ===
After a few queries I was fortunately enough to get access to a SuperMicro Dual Tesla C1060 GPU rack server. I could lend it for 10 days to perform benchmarking and general testing of the hardware. Special thanks to Geir over at [http://nextron.no/ Nextron] for the generosity!
[[Image:WPA_attack_supermicro_server_overview.jpg|250px]] [[Image:WPA_attack_supermicro_server_gpu_left.jpg|250px]] [[Image:WPA_attack_supermicro_server_gpu_right.jpg|250px]]
* [http://www.youtube.com/watch?v=BKnFp_nTK8E SuperMicro Tesla GPU Server running Pyrit] - Video tour of setup
Server configuration: SuperServer '''6016GT-TF-TM2''', 2x '''Tesla C1060''' cards, Xeon X5560 quad-core 2.8 GHz, 12 GB RAM, WD VelociRaptor 300 GB, 1000W PSU, and 16x screeching FANs. Perfect to build a cluster. The quality of this thing is outstanding, as is the price.
[[Image:WPA_attack_system_status.png|200px|right]]
root@bt:~/pyrit# hdparm -tT /dev/sda
/dev/sda:
  Timing cached reads:  15464 MB in  2.00 seconds = 7740.52 MB/sec
  Timing buffered disk reads:  368 MB in  3.01 seconds = 122.19 MB/sec
root@bt:/mnt/pyr/pyrit# ls -lh files/*cow|wc -l
1000
root@bt:/mnt/pyr/pyrit# du -hs files/
39G    files/
root@bt:/mnt/pyr/pyrit# cat passwords.txt|wc -l
996358
root@bt:/mnt/pyr/pyrit# cat essid_list.txt|wc -l
1000
root@bt:/mnt/pyr/pyrit# lspci|grep -i Tesla
02:00.0 3D controller: nVidia Corporation GT200 [Tesla C1060 / Tesla S1070] (rev a1)
03:00.0 3D controller: nVidia Corporation GT200 [Tesla C1060 / Tesla S1070] (rev a1)
root@bt:/mnt/pyr/pyrit# cat /proc/cpuinfo|grep Xeon
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU          X5560  @ 2.80GHz
root@bt:/mnt/pyr/pyrit# pyrit|grep Lukas
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
root@bt:/mnt/pyr/pyrit# uname -r
2.6.30.5
[[Image:WPA_attack_supermicro_peak_power_usage_meter.jpg|350px|right]]
Power usage, peak:
236V, 2.51A, 50Hz, (equals ~575-592Watt during load)
Now for the more interesting part. '''Pyrit''' was the first GPU accelerated WPA-PSK key generation utility. It supports both Nvidia CUDA and ATI Stream Processor cores, in addition to regular CPUs. The test below is a synthetic benchmark and a real batch run.
root@bt:~/pyrit# pyrit benchmark
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3
Running benchmark for at least 60 seconds...
#1: 'CUDA-Device #1 'Tesla C1060': 12146.7 PMKs/s (Occ. 95.2%; RTT 2.6)
#2: 'CUDA-Device #2 'Tesla C1060': 12155.2 PMKs/s (Occ. 95.8%; RTT 2.8)
#3: 'CPU-Core (SSE2)': 632.6 PMKs/s (Occ. 98.6%; RTT 3.0)
#4: 'CPU-Core (SSE2)': 637.1 PMKs/s (Occ. 94.1%; RTT 3.0)
#5: 'CPU-Core (SSE2)': 636.8 PMKs/s (Occ. 93.9%; RTT 3.0)
#6: 'CPU-Core (SSE2)': 637.3 PMKs/s (Occ. 98.2%; RTT 3.0)
#7: 'CPU-Core (SSE2)': 643.8 PMKs/s (Occ. 93.5%; RTT 3.0)
#8: 'CPU-Core (SSE2)': 642.0 PMKs/s (Occ. 93.1%; RTT 3.0)
Benchmark done. '''28131 PMKs/s''' total.
In regular batch mode the PMKs/second is a little lower.
root@bt:/mnt/pyr/pyrit# pyrit -f "default.cow" -e "default" batch
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3
The ESSID-blobspace seems to be empty; you should create an ESSID...
Working on ESSID 'default'
Computed 769976 PMKs so far; 25940 PMKs per second; 133785 passwords buffered.
Stopped reading workunits...
Computed 991934 PMKs so far; 26131 PMKs per second; 0 passwords buffered.ed...
All done. '''26229.04 PMKs/s''' total.
#1: 'CUDA-Device #1 'Tesla C1060': 11889.1 PMKs/s (Occ. 98.1%; RTT 2.3)
#2: 'CUDA-Device #2 'Tesla C1060': 11851.0 PMKs/s (Occ. 92.9%; RTT 2.2)
#3: 'CPU-Core (SSE2)': 624.1 PMKs/s (Occ. 92.9%; RTT 2.5)
#4: 'CPU-Core (SSE2)': 642.2 PMKs/s (Occ. 99.5%; RTT 2.5)
#5: 'CPU-Core (SSE2)': 632.6 PMKs/s (Occ. 92.8%; RTT 2.5)
#6: 'CPU-Core (SSE2)': 635.6 PMKs/s (Occ. 93.8%; RTT 2.5)
#7: 'CPU-Core (SSE2)': 607.0 PMKs/s (Occ. 94.7%; RTT 2.6)
#8: 'CPU-Core (SSE2)': 631.3 PMKs/s (Occ. 93.3%; RTT 2.5)
Batchprocessing done.
I decided to do an extended test run to see how it would compare to other other systems. More specifically the pre-computed '''[http://www.renderlab.net/projects/WPA-tables/ Church of Wifi]''' WPA-PSK tables. The team computed the set on using [http://wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty] on 15 card [http://en.wikipedia.org/wiki/Field-programmable_gate_array FPGA] setup. It was at that time completed in '''3 days''' and 9000 PMK/s. This was before the GPU accelerated clients were available.
For the test below I used the same 1 million word password list and 1000 ESSID access point names. The test was done in terminal without X Window running.
* [http://beta.ivancover.com/wifi/cow/9-final-wordlist.zip Church of Wifi 9-final-wordlist]
* [http://beta.ivancover.com/wifi/cow/SSID.zip Church of Wifi SSID-list]
[[Image:WPA_attack_churcofwifi_set_working.jpg|250px]] [[Image:WPA_attack_churcofwifi_set_overview.jpg|250px]] [[Image:WPA_attack_churcofwifi_set_complete.jpg|250px]]
The loop script completed after '''650 minutes''' (10 hours and 50 minutes)! Size of the resulting set was 39GB, exactly the size of the Church of Wifi set.
This is the script I used to run the test. To get the execution timing details, use ''time'' before the script, i.e. time ./start.sh. Also, make sure there aren't any DOS/Windows return characters, remove them using the ''dos2unix'' command.
#!/bin/bash
pyrit_prefs="/home/ivc/.pyrit"
echo -e "Cleaning .pyrit directory..."
rm -frI $pyrit_prefs/blobspace/
dos2unix passwords.txt
pyrit -i passwords.txt import_passwords
dos2unix essids.txt
lines=`cat essids.txt|wc -l`
for (( i = 1; i <= $lines; i++ ))
do
  essid=`tail -$i essids.txt|head -1`
  if [ -n "$essid" ]; then
  echo -e "Run #$i - ESSID: $essid - Now processing...\n"
  pyrit -o "$essid.cow" -e "$essid" batch
  echo -e "Done - Exported to $essid.cow. Cleaning essid blobspace...\n\n"
  rm -fr $pyrit_prefs/blobspace/essid/
  fi
done
Check the [[Pyrit setup|Pyrit setup guide]] for a installation reference.
* [http://forums.remote-exploit.org/general-discussion/27003-supermicro-gpu-server-results.html Forum thread over at Remote-Exploit]


== References ==
== References ==
* [http://www.i-hacked.com/content/view/285/42/ Cracking WPA FAST with video cards]
* [http://www.i-hacked.com/content/view/285/42/ Cracking WPA FAST with video cards] - [http://forums.remote-exploit.org/backtrack-4-howto/25483-how-crack-wpa-fast-graphic-cards-using-pyrit-cowpatty.html#post146484 Forum post]
* [http://forums.remote-exploit.org/ Remote-Exploit forums] - Great community and resource
* [http://forums.remote-exploit.org/ Remote-Exploit forums] - Great community and resource
* [http://forums.remote-exploit.org/wireless/7384-benefits-time-memory-trade-off-cowpatty.html  Benefits of Time-Memory Trade-Off in coWPAtty]
* [http://forums.remote-exploit.org/wireless/7384-benefits-time-memory-trade-off-cowpatty.html  Benefits of Time-Memory Trade-Off in coWPAtty]
* [http://synjunkie.blogspot.com/2008/01/creating-custom-password-lists.html Creating Custom Password Lists]
* [http://synjunkie.blogspot.com/2008/01/creating-custom-password-lists.html Creating custom password lists from webpages]
* [http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html pyrit CUDA nvidia Tutorial + Nvidia overclock instructions]
* [http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html pyrit CUDA nvidia Tutorial and Nvidia overclock instructions] - [http://www.offensive-security.com/documentation/backtrack-4-cuda-guide.pdf PDF version]
* [http://forums.remote-exploit.org/backtrack-4-howto/24213-bt4-pre-final-ati-guide.html BT4 (pre)final ATI guide]
* [http://forums.remote-exploit.org/backtrack-4-howto/24213-bt4-pre-final-ati-guide.html BT4 (pre)final ATI guide]
* [http://znuh.blogspot.com/2009/01/wpa-cracking-with-amd-stream-and-radeon.html WPA cracking with AMD Stream and a Radeon HD4870 by Znuh]
* [http://znuh.blogspot.com/2009/01/wpa-cracking-with-amd-stream-and-radeon.html WPA cracking with AMD Stream and a Radeon HD4870 by Znuh]
* [http://www.overclock.net/overclock-net-folding-home-team/370859-nitteos-f-h-gpu2-farm.html nitteo's gigant F@H GPU2 FARM]
* [http://www.ciscopress.com/articles/article.asp?p=370636 Cracking Wi-Fi Protected Access (WPA), Part 2] - excellent article

Latest revision as of 17:22, 16 January 2018

WPA is the precursor to WEP to fill a need for a secure replacement after the fully disclosed and flawed WEP encryption.

Background

Most wireless networks operating today use WPA and a Pre-Shared Key (PSK) between parties, i.e. a common password between the Access Point and Client Station, for protection. While the 802.11i standard, of which WPA is implemented on, is still intact the authentication is prone to a offline brute-force attack.

4-Way handshake

When a client want to connect to a access point, the following simplified stages will take place:

  1. Client will take the Password and ESSID of the network to compute a Pairwise Master Key and send a request to the AP asking to connect
  2. AP will responds with a random ANonce number
  3. Client create a random SNonce number, take the Pairwise Master Key, ANonce, SNonce, and AP and client MAC address to compute a Pairwise Transient Key
  4. Client will sign the SNonce number using the Pairwise Transient Key and send it unencrypted to the AP
  5. AP receives the signed SNonce, and compute the Pairwise Master Key from its Password and ESSID. Use the Pairwise Master Key, ANounce, SNounce, and AP and client MAC address to compute a Pairwise Transient Key
  6. By signing the SNonce message with the new Pairwise Transient Key, the AP can match the Integrity Code of the SNonce message sent from the client.
  7. If it's the same, the AP can then assume the client used the same Pairwise Master Key (Password+ESSID) to generate the Pairwise Transient Key, subsequently used to sign the message
  8. AP sends an acknowledgment to the client signed with the Pairwise Transient Key and includes information for further communication

For an excellent explanation, see the Airolib-ng manual.

Key generation

The PMK is generated using the following relatively processor intensive function, pseudo code:

  • PMK = PBKDF2(passphrase, ssid, ssidLength, 4096, 256)

Where the PBKDF2 method is from PKCS #5 v2.0: Password-based Cryptography Standard. This means that the concatenated string of the passphrase, SSID, and the SSIDlength is hashed 4096 times to generate a value of 256 bits. The lengths of the passphrase and the SSID have little impact on the speed of this operation [1].

And the other PTK hash is generated using this less processor intensive function, pseudo code:

  • PTK = PRF-512(PMK, "Pairwise key expansion", Min(AP_Mac, Client_Mac) || Max(AP_Mac, Client_Mac) || Min(ANonce, SNonce) || Max(ANonce, SNonce))

The PTK is a keyed-HMAC function using the PMK on the two MAC addresses and the two nonces from the first two packets of the 4-Way Handshake. [2].

  • MIC = HMAC_MD5(MIC Key, 16, 802.1x data)

A MIC value is calculated, using the MIC Key from the PTK and the EAPoL message.

Generating the PMK using the PBKDF2 function is slow and costly. It can be pre-computed for time-space-benefit. Both coWPAtty and Pyrit can create these hash-tables. Pyrit is especially fast as it's utilizing the GPGPU concept to speed up the process, see the Pyrit project page to see the difference.

Details:

Attack

An offline attack on the functions above are possible by disassociating any connected client(s), capturing a full 4-way handshake session when the client(s) re-connect, and then extrapolate the AP MAC, Client MAC, the ANonce and SNonce. The SSID is already known.

Present with the above information it's possible to brute-force the passphrase by computing the 4-way handshake as mentioned above (calculate the PMK, PTK, and subsequently sign the SNonce to get the Integrity Code) with every possible passphrase+SSID combination. If the passphrase is correct the Integrity Code will match the captured Integrity Code.

See the coWPAtty and Pyrit source code for examples on the handshake process.

Counter-measures

As it's explained above and clear, a long and alpha-numeric password will thwart this dictionary attack. Use a something like kurtm.net WPA-PSK generator or preferably the Yubico USB key adapter to generate a truly random password.

Tools

  • pyrit - blog - Reference manual - Code details
    • Like coWPatty and Airolib-ng
    • Pre-compute PMK keys
    • Import compressed (.gz) files
    • Supports stdin (i.e. John the Ripper piping)
    • Internal database over precomputed ESSID and PMK combinations
    • Export PMK to coWPAtty (*.cow ) and Airolib-ng (*.db) supported files
    • GPGPU acceleration
    • Strip out 4-way handshake from capture file
  • coWPAtty - coWPAtty project page - Readme
    • Like Pyrite and Airolib-ng
    • WPA-PSK attack on specific ESSID and captured 4-way handshake dump
    • Passthrough from Pyrite possible (GPGPU acceleration)
    • Pre-computed PMK tables supported
    • genpmk:
      • Generate "Pairwise Master Key" table for a specific ESSID, PMK tables
      • Table-file name should end with *.cow
  • Airolib-nb
    • Like coWPatty and Pyrit
    • Precompute TMK keys and attack WPA/WPA2 handshake captures
    • Internal SQLite3 database
    • Can export and import coWPAtty files

Extra:

Drivers

The Alfa AWUS036H adapter is a really good 500 mW USB device based on the RTL8187 chipset, but the drivers are/were buggy. Currently, as of September 2009, it seems that the Compat Wireless rtl8187/mac80211 framework drivers are the most stable and reliable for general use and the old r8187/ieee80211 drivers are most suitable for the Aircrack-ng suite and frame injection [3]. See the tutorial link below for details on how to switch between the drivers.

I can confirm that the latest rtl8187/mac80211 drivers are slow. Packet injection using same device in Backtrack 3 (BT3) was much faster than in Backtrack (BT4) pre-final. Unsure of the cause, but it seems that the latest drivers lack a speed patch used previously (see thread below). BT3 uses the r8187/ieee80211_rtl stack while BT4 uses the main kernel rtl8187/mac80211 stack with some patches already applied (the BT4 Beta, not Pre-final, had some rtl8187/mac80211 speed improvements applied).


Summary to install the BT4 r8187/ieee80211 (r8187-drivers) driver package:

aptitude search r8187
-- and look for the kernel version the driver was compiled for, and install it:
aptitude install linux-image-2.6.30.5 linux-source-2.6.30.5 
dpkg --force-overwrite -i /var/cache/apt/archives/linux-image-2.6.30.5_2.6.30.5-10.00.Custom_i386.deb # if it reports firmware files already exists
 
reboot # to load new kernel
sudo rmmod rtl8187
sudo rmmod mac80211
echo "blacklist rtl8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist r8187" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist rt2870sta" | sudo tee -a /etc/modprobe.d/blacklist
echo "blacklist mac80211" | sudo tee -a /etc/modprobe.d/blacklist

aptitude install r8187-drivers
modprobe r8187

Word lists

List of word lists

These are compiled word lists and readily available.

Generating word lists

By following simple guidelines a good word-list can be generated. Consider the following [5]:

  • Most people use easy to remember passwords, in this case it has to be 8 characters or over in length
  • Append 0-9 to the word, i.e. (word)1, (word)2, (word)3, ..
  • Sequence of numbers are often used, e.g. 123, 321, 999, ..
  • First letter is often upper-case
  • Short words (under 8 characters) are stringed in series of two, e.g. googlegoogle, hellohello, openopen, ..
  • Forename and surname often used

John The Ripper and Raptor 3 are great utilities to create all the permutations mentioned above. JTP can pipe the data to avoid having to save the new stream. JTR has an extended rules engine to build the permutations.

john -wordfile:dictfile -rules -session:johnrestore.dat -stdout:63 | \
  cowpatty -r eap-test.dump -f - -s somethingclever [6]

Tools

GPU acceleration

CPU vs GPU.png

CUDA (Compute Unified Device Architecture) is a parallel computing architecture developed by nVidia [7]. Competitively, FireStream / Fire Processor is a stream processor developed by ATI Technologies. Both are based on the GPGPU (General Purpose Graphics Processing Units) concept for heavy floating-point computations [8]. Instead of having four or eight threads crunching on a parallelized task in the CPU, you could have 64, 320, or how many stream processors (Unified Shaders) tackling the same work in the GPU [9].

Traditionally the GPU has been very limited, only accelerating part of the graphics pipeline. Utilizing the GPU to perform floating-point computations is an order of magnitudes faster than on a modern CPU. It possible to achieve over a teraflop of theoretical computing capacity using relatively inexpensive commodity hardware.

As a side-note, SLI can not be used, only individual processor units.

Practical attak

Handy commands

Connect to OPEN network:

ifconfig wlan0 down
iwconfig wlan0 mode managed
iwconfig wlan0 essid SMC
dhclient wlan0 -d

Connect to WEP protected network:

ifconfig wlan0 down
iwconfig wlan0 mode managed
iwconfig wlan0 enc (40/104bit key)
iwconfig wlan0 essid SMC
dhclient wlan0 -d

Performance measurements

SuperMicro Tesla GPU server

After a few queries I was fortunately enough to get access to a SuperMicro Dual Tesla C1060 GPU rack server. I could lend it for 10 days to perform benchmarking and general testing of the hardware. Special thanks to Geir over at Nextron for the generosity!

WPA attack supermicro server overview.jpg WPA attack supermicro server gpu left.jpg WPA attack supermicro server gpu right.jpg

Server configuration: SuperServer 6016GT-TF-TM2, 2x Tesla C1060 cards, Xeon X5560 quad-core 2.8 GHz, 12 GB RAM, WD VelociRaptor 300 GB, 1000W PSU, and 16x screeching FANs. Perfect to build a cluster. The quality of this thing is outstanding, as is the price.

WPA attack system status.png
root@bt:~/pyrit# hdparm -tT /dev/sda
/dev/sda:
 Timing cached reads:   15464 MB in  2.00 seconds = 7740.52 MB/sec
 Timing buffered disk reads:  368 MB in  3.01 seconds = 122.19 MB/sec
root@bt:/mnt/pyr/pyrit# ls -lh files/*cow|wc -l
1000
root@bt:/mnt/pyr/pyrit# du -hs files/
39G     files/
root@bt:/mnt/pyr/pyrit# cat passwords.txt|wc -l
996358
root@bt:/mnt/pyr/pyrit# cat essid_list.txt|wc -l
1000
root@bt:/mnt/pyr/pyrit# lspci|grep -i Tesla
02:00.0 3D controller: nVidia Corporation GT200 [Tesla C1060 / Tesla S1070] (rev a1)
03:00.0 3D controller: nVidia Corporation GT200 [Tesla C1060 / Tesla S1070] (rev a1)
root@bt:/mnt/pyr/pyrit# cat /proc/cpuinfo|grep Xeon
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
model name      : Intel(R) Xeon(R) CPU           X5560  @ 2.80GHz
root@bt:/mnt/pyr/pyrit# pyrit|grep Lukas
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
root@bt:/mnt/pyr/pyrit# uname -r
2.6.30.5
WPA attack supermicro peak power usage meter.jpg

Power usage, peak:

236V, 2.51A, 50Hz, (equals ~575-592Watt during load)

Now for the more interesting part. Pyrit was the first GPU accelerated WPA-PSK key generation utility. It supports both Nvidia CUDA and ATI Stream Processor cores, in addition to regular CPUs. The test below is a synthetic benchmark and a real batch run.

root@bt:~/pyrit# pyrit benchmark
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3

Running benchmark for at least 60 seconds...

#1: 'CUDA-Device #1 'Tesla C1060': 12146.7 PMKs/s (Occ. 95.2%; RTT 2.6)
#2: 'CUDA-Device #2 'Tesla C1060': 12155.2 PMKs/s (Occ. 95.8%; RTT 2.8)
#3: 'CPU-Core (SSE2)': 632.6 PMKs/s (Occ. 98.6%; RTT 3.0)
#4: 'CPU-Core (SSE2)': 637.1 PMKs/s (Occ. 94.1%; RTT 3.0)
#5: 'CPU-Core (SSE2)': 636.8 PMKs/s (Occ. 93.9%; RTT 3.0)
#6: 'CPU-Core (SSE2)': 637.3 PMKs/s (Occ. 98.2%; RTT 3.0)
#7: 'CPU-Core (SSE2)': 643.8 PMKs/s (Occ. 93.5%; RTT 3.0)
#8: 'CPU-Core (SSE2)': 642.0 PMKs/s (Occ. 93.1%; RTT 3.0)

Benchmark done. 28131 PMKs/s total.

In regular batch mode the PMKs/second is a little lower.

root@bt:/mnt/pyr/pyrit# pyrit -f "default.cow" -e "default" batch
Pyrit 0.2.3 (C) 2008, 2009 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3

The ESSID-blobspace seems to be empty; you should create an ESSID...

Working on ESSID 'default'
Computed 769976 PMKs so far; 25940 PMKs per second; 133785 passwords buffered.
Stopped reading workunits...
Computed 991934 PMKs so far; 26131 PMKs per second; 0 passwords buffered.ed...
All done. 26229.04 PMKs/s total.
#1: 'CUDA-Device #1 'Tesla C1060': 11889.1 PMKs/s (Occ. 98.1%; RTT 2.3)
#2: 'CUDA-Device #2 'Tesla C1060': 11851.0 PMKs/s (Occ. 92.9%; RTT 2.2)
#3: 'CPU-Core (SSE2)': 624.1 PMKs/s (Occ. 92.9%; RTT 2.5)
#4: 'CPU-Core (SSE2)': 642.2 PMKs/s (Occ. 99.5%; RTT 2.5)
#5: 'CPU-Core (SSE2)': 632.6 PMKs/s (Occ. 92.8%; RTT 2.5)
#6: 'CPU-Core (SSE2)': 635.6 PMKs/s (Occ. 93.8%; RTT 2.5)
#7: 'CPU-Core (SSE2)': 607.0 PMKs/s (Occ. 94.7%; RTT 2.6)
#8: 'CPU-Core (SSE2)': 631.3 PMKs/s (Occ. 93.3%; RTT 2.5)
Batchprocessing done.

I decided to do an extended test run to see how it would compare to other other systems. More specifically the pre-computed Church of Wifi WPA-PSK tables. The team computed the set on using coWPAtty on 15 card FPGA setup. It was at that time completed in 3 days and 9000 PMK/s. This was before the GPU accelerated clients were available.

For the test below I used the same 1 million word password list and 1000 ESSID access point names. The test was done in terminal without X Window running.

WPA attack churcofwifi set working.jpg WPA attack churcofwifi set overview.jpg WPA attack churcofwifi set complete.jpg

The loop script completed after 650 minutes (10 hours and 50 minutes)! Size of the resulting set was 39GB, exactly the size of the Church of Wifi set.

This is the script I used to run the test. To get the execution timing details, use time before the script, i.e. time ./start.sh. Also, make sure there aren't any DOS/Windows return characters, remove them using the dos2unix command.

#!/bin/bash
pyrit_prefs="/home/ivc/.pyrit"

echo -e "Cleaning .pyrit directory..."
rm -frI $pyrit_prefs/blobspace/

dos2unix passwords.txt
pyrit -i passwords.txt import_passwords

dos2unix essids.txt
lines=`cat essids.txt|wc -l`

for (( i = 1; i <= $lines; i++ ))
do
 essid=`tail -$i essids.txt|head -1`

 if [ -n "$essid" ]; then
  echo -e "Run #$i - ESSID: $essid - Now processing...\n"
  pyrit -o "$essid.cow" -e "$essid" batch

  echo -e "Done - Exported to $essid.cow. Cleaning essid blobspace...\n\n"
  rm -fr $pyrit_prefs/blobspace/essid/
 fi
done

Check the Pyrit setup guide for a installation reference.

References