01.11.2012 Views

Universit`a degli Studi di Verona Studio di meccanismi di attacco e ...

Universit`a degli Studi di Verona Studio di meccanismi di attacco e ...

Universit`a degli Studi di Verona Studio di meccanismi di attacco e ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INDICE<br />

2.3.3 Formato dei frame . . . . . . . . . . . . . . . . . . . . 86<br />

2.3.4 Servizi . . . . . . . . . . . . . . . . . . . . . . . . . . . 88<br />

3 Meccanismi crittografici 89<br />

3.1 La crittografia dei dati . . . . . . . . . . . . . . . . . . . . . . 90<br />

3.2 Wired Equivalent Privacy (WEP) . . . . . . . . . . . . . . . . 90<br />

3.2.1 Cyclic Redundancy Check (CRC-32) . . . . . . . . . . 92<br />

3.2.2 Rivest Chipher 4 (RC4) . . . . . . . . . . . . . . . . . 93<br />

3.3 Wireless Protected Access (WPA-WPA2) . . . . . . . . . . . 96<br />

3.3.1 Funzionamento . . . . . . . . . . . . . . . . . . . . . . 96<br />

3.3.2 WPA-WPA2: Crittografia e sicurezza dei dati . . . . . 97<br />

3.3.3 WPA2 (AES) . . . . . . . . . . . . . . . . . . . . . . . 105<br />

4 Meccanismi <strong>di</strong> autenticazione 117<br />

4.1 Lo standard 802.11i . . . . . . . . . . . . . . . . . . . . . . . 118<br />

4.2 Il Sistema <strong>di</strong> autenticazione 802.1X . . . . . . . . . . . . . . . 118<br />

4.3 Extensible Authentication Protocol (EAP) . . . . . . . . . . . 120<br />

4.3.1 EAP Message Digest 5 (EAP-MD5) . . . . . . . . . . 122<br />

4.3.2 EAP Transport Layer Security (EAP-TLS) . . . . . . 123<br />

4.3.3 EAP Tunneled Transport Layer Security (EAP-TTLS) 125<br />

4.3.4 Protected Extensible Authentication Protocol (PEAP) 126<br />

4.3.5 Microsoft c○ Challenge Handshake Authentication Protocol<br />

vers.2 (MS-CHAPv.2) . . . . . . . . . . . . . . . 126<br />

III Sicurezza delle reti Wireless 129<br />

5 Vulnerabilità e tipi <strong>di</strong> <strong>attacco</strong> 131<br />

5.1 WEP: Insicurezza totale . . . . . . . . . . . . . . . . . . . . . 131<br />

5.1.1 Attacco “IV deboli” . . . . . . . . . . . . . . . . . . . 131<br />

5.1.2 Attacco <strong>di</strong> Klein . . . . . . . . . . . . . . . . . . . . . 139<br />

5.1.3 Attacco “a frammentazione” . . . . . . . . . . . . . . 139<br />

5.1.4 Meto<strong>di</strong> alternativi <strong>di</strong> <strong>attacco</strong> . . . . . . . . . . . . . . 143<br />

5.2 WPA: Vulnerabilità nascoste . . . . . . . . . . . . . . . . . . 148<br />

5.2.1 Attacco combinato <strong>di</strong>zionario/forzabruta . . . . . . . 148<br />

5.2.2 Meto<strong>di</strong> alternativi <strong>di</strong> <strong>attacco</strong> . . . . . . . . . . . . . . 152<br />

6 Test <strong>di</strong> penetrazione effettuati 155<br />

6.1 Scelta del sistema operativo (OS) . . . . . . . . . . . . . . . . 155<br />

6.2 Scelta dell’hardware <strong>di</strong> rete . . . . . . . . . . . . . . . . . . . 156<br />

6.3 Scelta del software . . . . . . . . . . . . . . . . . . . . . . . . 156<br />

6.4 Gestione kernel e driver . . . . . . . . . . . . . . . . . . . . . 160<br />

6.5 Casi <strong>di</strong> stu<strong>di</strong>o . . . . . . . . . . . . . . . . . . . . . . . . . . . 161<br />

6.5.1 Pentesting a reti private . . . . . . . . . . . . . . . . . 162<br />

iii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!