Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017

Subscribers:
6,150
Published on ● Video Link: https://www.youtube.com/watch?v=Rdg9VH0rRX8



Duration: 47:09
54 views
0


Black Hat - Europe - 2017 Hacking conference
We introduce key reinstallation attacks. These attacks abuse features of a protocol to reinstall an already in-use key, thereby resettingnonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.All protected Wi-Fi networks use the 4-way handshake to generate fresh session keys. The design of this handshake was proven secure, and over its 14-year lifetime no weaknesses have been found in it. However, contrary to this history, we show that the 4-way handshake is vulnerable to key reinstallation attacks. In such an attack, the adversary tricks a victim into reinstalling an already in-use key. This is achieved by manipulating and replaying handshake messages. When the victim reinstalls the key, the associated incremental nonce and replay counter is reset to its initial value. Apart from breaking the 4-way handshake, we also show that our key reinstallation attack breaks the group key and Fast BSS Transition (FT) handshake. The impact of our attacks depend on both the handshake being targeted, and the data-confidentiality protocol in use. Simplified, against AES-CCMP, an adversary can replay and decrypt packets, but cannot forge packets. Still, this makes it possible to hijack TCP streams and inject malicious data into them. Against WPA-TKIP and GCMP, the impact is catastrophic: an adversary can replay, decrypt, and forge arbitrary packets. Rather surprisingly, GCMP is especially affected because it uses the same authentication key in both communication directions.Finally, we confirmed our findings in practice, and found that every Wi-Fi device is vulnerable to some variant of our attacks. Notably, our attack is exceptionally devastating against Android and Linux: it forces the client into using a predictable all-zero encryption key.
Presenters:
Mathy Vanhoef - Postdoctoral Researcher, imec-DistriNet, KU Leuven
Mathy Vanhoef is a postdoctoral researcher at KU Leuven, where he currently performs research on automatically discovering logical vulnerabilities in network protocol implementations. Previously he performed research on streamciphers, and discovered a new attack on RC4 that made it possible to exploit RC4 as used in TLS in practice (the RC4 NOMORE attack). He also focuses on wireless security, where he turns commodity wifi cards into state-of-the art jammers, defeats MAC address randomization, and breaks protocols like WPA-TKIP. He also did research on information flow security to assure cookies don't fall in the hands of malicious individuals. Apart from research, he knows a thing or two about low-level security, reverse engineering, and binary exploitation. He regularly participates in CTFs with KU Leuven's Hacknamstyle CTF team.
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21APT What the heck is an APT Bill Barnes
2021-12-21Securely Deleting Data from SSDs Stephen Larson
2021-12-21Strange times we live in Alexander Muentz
2021-12-21Technological Changes that Affect Forensic Investigations Diane Barrett BloomCon - 2017
2021-12-20Breaking Bad Stealing Patient Data Through Medical Devices
2021-12-20Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming
2021-12-20The Apple of Your EFI An Updated Study of EFI Security
2021-12-20Locknote Conclusions and Key Takeaways From Black Hat Europe 2017
2021-12-20Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing
2021-12-20Exfiltrating Reconnaissance Data from Air Gapped ICS SCADA Networks
2021-12-20Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017
2021-12-20Self Verifying Authentication A Framework For Safer Integrations of Single Sign On Services
2021-12-20Jailbreaking Apple Watch Black Hat - Europe - 2017
2021-12-20BlueBorne A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device
2021-12-20Automating Incident Response
2021-12-20Detach Me Not DoS Attacks Against 4G Cellular Users Worldwide from your Desk
2021-12-20Mobile Espionage in the Wild Pegasus and Nation State Level Attacks
2021-12-20Real World Post Quantum Cryptography Introducing the OpenQuantumSafe Software Project
2021-12-20Backslash Powered Scanning Hunting Unknown Vulnerability Classes
2021-12-20Narcos, Counterfeiters and Scammers An Approach to Visualize Illegal Markets
2021-12-20Rooting EVERY Android From Extension to Exploitation



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering