lure10: exploiting windows automatic wireless association algorithm · 2017-04-15 · lure10:...

21
Lure10: Exploiting Windows Automatic Wireless Association Algorithm HITBSecConf2017, Amsterdam GEORGE CHATZISOFRONIOU (@_sophron) [email protected] www.census-labs.com

Upload: others

Post on 11-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Lure10: Exploiting Windows Automatic Wireless Association Algorithm

HITBSecConf2017, Amsterdam

GEORGE CHATZISOFRONIOU (@_sophron)[email protected]

www.census-labs.com

> Wi-Fi Automatic Association Attacks

> Remember the KARMA attack?

> Windows 10 Countermeasures against KARMA

> Wi-Fi Sense

> How Wi-Fi Sense Works

> Introducing the “Lure10” Attack

> Fooling Windows Location Service

> Phase 1: Wi-Fi Sense WLAN identification

> Phase 2: Frame Collection

> Phase 3: Frame Broadcasting

www.census-labs.com

Windows10 Automatic Wireless Association Algorithm

Begin:

State = Unconnected

// Build list of visible networks (ANL) sorted

// by signal in the background

AvailableNetworks = ScanForAvailableNetworks()

// Step through the PNL in order until a network

// from the ANL is found and connected to

foreach n in PreferredNetworks

if AvailableNetworks contains n

then ConnectToWirelessNetwork(n)

if State == Connected then return

// If unable to connect to any networks in the

// intersection of the PNL and ANL, check for

// Wi-Fi Sense networks (SNL)

foreach n in WiFiSenseNetworks

if AvailableNetworks contains n

then ConnectToWirelessNetwork(n)

if State == Connected then return

> Case 1: No shared WLAN in PNL and ANL

> Case 2: One shared WLAN in PNL and ANL

> Removing a WLAN from the victim’s ANL

www.census-labs.com

Lure10 Attack

> Microsoft’s response

> Am I affected?

> How can I protect myself?

> Wifiphisher with Lure10 support