19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

You undoubtedly have various Bluetoothenabled<br />

wireless devices, such as laptops and<br />

smartphones, running within your organization.<br />

Although vulnerabilities are not as prevalent as<br />

they are in 802.11-based Wi-Fi networks, they<br />

still exist (currently, over 60 Bluetooth-related<br />

weaknesses are listed at http://nvd.<br />

nist.gov), and quite a few hacking tools take<br />

advantage of them. You can even overcome the<br />

personal area network distance limitation of<br />

Bluetooth’s signal (typically just a few meters)<br />

and attack Bluetooth devices remotely by building<br />

and using a BlueSniper rifle. (See the following<br />

list for the website.) Various resources<br />

and tools for testing Bluetooth authentication/<br />

pairing and data transfer weaknesses include<br />

✓ Blooover (http://trifinite.org/<br />

trifinite_stuff_blooover.<br />

html)<br />

Don’t overlook Bluetooth<br />

Encrypted traffic<br />

Chapter 9: Wireless LANs<br />

✓ BlueScanner (http://sourceforge.<br />

net/projects/bluescanner)<br />

✓ Bluesnarfer (www.alighieri.org/<br />

tools/bluesnarfer.tar.gz)<br />

✓ BlueSniper rifle (www.tomsguide.<br />

com/us/how-to-bluesniperpt1,review-408.html)<br />

✓ Car Whisperer (http://trifinite.<br />

org/trifinite_stuff_car<br />

whisperer.html)<br />

✓ Detailed presentation on the various<br />

Bluetooth attacks (http://trifinite.<br />

org/Downloads/21c3_Bluetooth_<br />

Hacking.pdf)<br />

Wireless traffic can be captured directly out of the airwaves, making this<br />

communications medium susceptible to eavesdropping. Unless the traffic<br />

is encrypted, it’s sent and received in cleartext just as on a standard wired<br />

network. On top of that, the 802.11 encryption protocols, Wired Equivalent<br />

Privacy (WEP) and Wi-Fi Protected Access (WPA), have their own weakness<br />

that allows attackers to crack the encryption keys and decrypt the captured<br />

traffic. This vulnerability has really helped put WLANs on the map — so to<br />

speak.<br />

WEP, in a certain sense, actually lives up to its name: It provides privacy<br />

equivalent to that of a wired network, and then some. However, it wasn’t<br />

intended to be cracked so easily. WEP uses a fairly strong symmetric (sharedkey)<br />

encryption algorithm called RC4. Hackers can observe encrypted<br />

wireless traffic and recover the WEP key because of a flaw in how the RC4<br />

initialization vector (IV) is implemented in the protocol. This weakness is<br />

because the IV is only 24 bits long, which causes it to repeat every 16.7 million<br />

packets — even sooner in many cases, based on the number of wireless<br />

clients entering and leaving the network.<br />

165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!