It’s Easy to Launch a Wireless Deauthentication Attack

简介: Beware: It’s Easy to Launch a Wireless Deauthentication Attack! By Mohit Raj on April 1, 2015 in Admin, Insight · 1 Comment This article shows how easily someone can pul

Hacker

This article shows how easily someone can pull off an attack on an 802.11 Wi-Fi network. The author sets up a mock attack using a VMware virtual machine to help readers understand the process. While these attacks are more of a nuisance value, they can pose a security threat to a wireless network in the production environment.

The era of wireless connectivity gives flexibility and mobility, but also comes with security issues. In wired connectivity, the attacker needs physical access in order to connect and attack. In the case of wireless connectivity, an attacker just needs the availability of the signal to launch an attack.

In this article, I will discuss the very serious deauthentication attack. Even your neighbour’s kid could make your life miserable by launching such an attack, in which your device can get disconnected from the access point (AP).
Before proceeding further, you will need to get familiar with some of the terminology we will use in this article.

Service Set Identification (SSID): An SSID is a 32-character (maximum) alphanumeric key identifying the name of the wireless local area network (WLAN).

AP (Access Point): This is used to connect the wireless device to the wireless network.

BSSID: MAC address of the AP.
The concept behind the attack
So, why are these attacks made? Where, and typically, who attacks whom? Well, the attack can be made by a penetration tester on a company’s wireless network, if the company or organisation wishes to check the robustness of its own wireless security. The tester then sends a report of the findings to the company. But some hackers mount such attacks simply to create a nuisance for users.

The connection between the clients and APs is established by the exchange of various frames, as shown in Figure 1. The communication between the client and the AP is established after probing the available wireless APs. After that, the exchange of a series of management frames, like authentication and association request frames, takes place.
figure 1

Launching the deauth attack
In order to launch the attack, I used the following:

  • Kali Linux as the attacker
  • Windows 7 as the victim

Kali Linux was installed in a VMware machine with a USB wireless card (Atheros-based), and it successfully recognised the wireless card. I then followed the steps given below to launch the attack.
Step 1. To know the name of the wireless card, I typed the command airmon-ng as shown in Figure 2.
figure2
figure 3
figure 4
The wireless card’s name is wlan0.
Step 2
. The next command airmon-ng start wlan0 sets your wireless card on monitor mode 0, which means mon0 as shown in Figure 3.
Step 3. I then typed iwlist wlan0 scanning as shown in Figure 4 to find out about all the APs in the vicinity.
In Figure 4, important information like the MAC address, channel number and ESSID of the AP is highlighted in red rectangle boxes.
Step 4. Here, I set mon0 to Channel 1, using the following command:

airodump-ng mon0 -c <channel>  --bssid  <mac address of AP>

…as shown in Figure 5.
figure 5
The consequences can be seen in Figure 6, where BSSID is the MAC address of AP, and STATION means all wireless devices are connected to the AP. I now chose one victim:88:53:2E:0A:75:3F
Now it’s time to mount the attack!
figure 6
Step 5. In the attack, I used aireplay to send the deauth packet.
The following command does the job:

aireplay-ng -0 10 -a 84:1B:5E:50:C8:6E -c 88:53:2E:0A:75:3F mon0

Here’s a description of the above command:

  • -0 sends the deauth packet
  • 10 refers to the number of packets
  • -a is the MAC address of the AP
  • -c is the MAC address of the client to be deauthenticated. The MAC address of the client has been spoofed here.

figure 7
Figure 7 shows the effect of the command.
Now, it’s time to look at the victim’s PC. Figure 8 shows the full story of the attack, which is sure to upset the victim.
figure 8

Analysing the deauthentication attack
Figure 9 shows the packet flow. The first frame comes from the victim’s machine (spoofed), which contains the deauthentication flag. The second deauthentication flag frame is sent from the AP to the victim. A local packet capture session is initiated using Wireshark to capture the frames generated by the attacker.
figure 9

figur 10

Who is behind the attack?
This attack is made at the data-link layer, which is associated with the MAC address. The book,  ‘Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet’ (Second Edition) by Eoghan Casey, states that the data-link layer addresses (MAC addresses) are more easily identifiable than network layer addresses (e.g., IP addresses). This is because a MAC address is usually directly associated with the network interface card in a computer, whereas an IP address can be easily reassigned to different computers. However, in Wireshark-captured data, the source is the victim and the destination is the AP, and vice versa. Therefore, it is impossible to find out the attacker’s identity.

So how do we detect the attack?
The deauthentication frame is sent by a station to another station when it wishes to terminate communications. When we manually disconnect from the AP, we can see three dauth packet after restarting AP three times as shown in figure 10. By using aireplay we have sent one deauth packet but on Wireshark, we captured 256 frames.

Wireshark captured frames from one side and we have sent packets from the other side; so I can say that, from our side, 256/2 = 128 frames were sent. In this way, this attack also falls in the category of a DOS attack.
After seeing a large number of frames, a wireless intrusion detection system (WIDS) can raise the alarm.

At the user level, there is still no fool-proof way to prevent this attack. But at the organisation level, a WIPS/WIDS system like AirMagnet Enterprise can specifically detect these attacks, preventing major enterprise-wide damage. Going ahead, wireless cards or APs should have some mechanism to protect users from deauthentication attacks.

References
[1] Timothy R. Schmoyer, Yu Xi Lim and Henry L. Owen, ‘Wireless Intrusion Detection and Response’, Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, 883 – 888, Vol. 2
[2]    Rupinder Cheema, Divya Bansal, Dr Sanjeev Sofat, June 2011. ‘Deauthentication/Disassociation Attacks: Implementation and Security in Wireless Mesh Networks’, International Journal of Computer Applications (0975 – 8887) Volume 23– No. 7
[3] Thuc D Nguyen, Duc H M Nguyen. August 3 -7, 2008, ‘ A light weight solution for defending against deauthentication /disassociation attacks on 802.11 networks’, the 17th International Conference on Computer Communications and Networks, at St Thomas, US Virgin Islands, USA.
[4]  http://www.aircrack-ng.org/doku.php?id=aireplay-ng

目录
相关文章
|
缓存 安全 Java
Shiro框架以及Spring Boot整合Shiro
Shiro框架以及Spring Boot整合Shiro
Shiro框架以及Spring Boot整合Shiro
|
测试技术 容器
DeepSeek-R1-Distill-Qwen-1.5B基于MindIE推理实践
基于MindIE实现DeepSeek-R1-Distill-Qwen-1.5B的纯模型推理和服务化推理。
|
SQL 存储 监控
MSSQL之十 触发器和事务
MSSQL之十 触发器和事务
548 0
|
机器人 API 数据安全/隐私保护
AppFlow:支持飞书机器人调用百炼应用
本文介绍了如何创建并配置飞书应用及机器人,包括登录飞书开发者后台创建应用、添加应用能力和API权限,以及通过AppFlow连接流集成阿里云百炼服务,最后详细说明了如何将机器人添加到飞书群组中实现互动。
1718 5
|
前端开发
前端学习笔记202306学习笔记第三十六天-js-作业讲解1
前端学习笔记202306学习笔记第三十六天-js-作业讲解1
151 0
|
运维 监控 安全
运维的艺术:从基础到精通的旅程
【10月更文挑战第27天】 本文旨在探讨运维(Operations)领域的艺术与科学,通过深入浅出的方式,带领读者从基础概念出发,逐步深入到高级实践技巧。我们将覆盖从系统监控、故障排查到自动化部署等关键领域,同时穿插真实案例分析,以期为读者提供一个全面而实用的学习路径。无论你是初入行的新手还是寻求进阶的老手,都能在此找到启发和指导。
175 0
|
数据可视化 JavaScript 定位技术
这款地图可视化神器终于支持新版jupyter lab了!
这款地图可视化神器终于支持新版jupyter lab了!
250 2
|
人工智能 安全 Linux
Python常用镜像源
Python常用镜像源
5139 0
|
监控 安全 网络安全
构筑防御堡垒:云计算环境下的网络安全策略
【2月更文挑战第29天】 在数字化浪潮推动下,企业纷纷迁移至云平台以获取灵活性、扩展性和成本效益。然而,随着云服务的广泛采用,数据安全和隐私保护的挑战也日益凸显。本文深入探讨了云计算环境中网络安全的关键问题,并提出了一套综合性的安全策略,旨在帮助企业在享受云计算便利的同时,有效防范潜在的网络威胁。通过分析云服务模型与网络安全的关系,评估面临的主要风险,并提出相应的防御措施,文章为构建安全的云环境提供了实用的指导和建议。
135 2
|
人工智能 云栖大会 开发者
假如我用AI创作MV,会怎样?
还是那句话,随着人工智能技术的快速发展,它在各个领域的应用越来越广泛。尤其是艺术创作领域,现在也开始借助人工智能的力量进行创新尝试。假如我能够利用人工智能技术来创作音乐视频(MV),会有怎样的效果呢?那么本文就来简单讨论一下这个问题,然后再展望一下用AI创作MV的可能性。
365 2
假如我用AI创作MV,会怎样?

热门文章

最新文章