Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Passwords Found on a Wireless Network

Passwords Found on a Wireless Network

First public demonstration of the dsniff network penetration toolkit (and Matt Blaze's passwords ;-) at the USENIX 2000 Annual Conference.

Dug Song

June 23, 2000
Tweet

More Decks by Dug Song

Other Decks in Technology

Transcript

  1. Passwords Found on a Wireless Network "Don’t sue me -

    honey made me do this" Dug Song [email protected] University of Michigan CITI CITI - USENIX 2000 WIP Jun 22, 19100 Page 1
  2. Why? • Insecure network authentication is just so passe •

    Virtual tar and feathers: better security through public humiliation • We’re not the bad guys, we’re the network police (BOFH) • We even eat our own: http://www.citi.umich.edu/dsniff.html CITI - USENIX 2000 WIP Jun 22, 19100 Page 2
  3. How? • dsniff - the mother of all password sniffers,

    plus sniffing tools for penetration testing arpredirect macof tcpkill tcpnice dsniff filesnarf mailsnarf urlsnarf webspy CITI - USENIX 2000 WIP Jun 22, 19100 Page 3
  4. arpredirect • Facilitates man-in-the-middle sniffing via ARP spoofing • Enables

    sniffing on switched networks • Can be used to poison the ARP caches of all, or arbitrary hosts on the LAN • Plays well with others - will restore the original ARP mapping on exit CITI - USENIX 2000 WIP Jun 22, 19100 Page 4
  5. macof • Floods the LAN with random MAC addresses •

    Some network switches fail open in repeating mode • Zen koan: Switch becomes hub, sniffing is good. CITI - USENIX 2000 WIP Jun 22, 19100 Page 5
  6. tcpkill • Selectively kills TCP connections • Useful in "initializing"

    connection state on a LAN for stateful, TCP/IP reassembling sniffers • OK, so maybe this is a little evil • It was just line noise, er, radio interference! Honest! CITI - USENIX 2000 WIP Jun 22, 19100 Page 6
  7. tcpnice • "You’re talking too fast, slow down!" • Slows

    down selected TCP connections via "active" traffic shaping (shrinking TCP window advertisements and ICMP source quenches) • In theory, could be abused to enforce local (unilateral) QoS policy, e.g. to hog bandwidth for my Napster downloads CITI - USENIX 2000 WIP Jun 22, 19100 Page 7
  8. dsniff • The mother of all password sniffers • Decodes

    30 major protocols and their variants: FTP, Telnet, HTTP, POP, poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, NFS, YP, SOCKS, X11, CVS, IRC, AIM, ICQ, Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL*Net, Sybase and Microsoft SQL • HTTP module also does QUERY_STRING and x- www-form-urlencoded parsing, to catch most CGI- based auth schemes (all major webmail services except Hotmail, unencrypted e-commerce sites, etc.) CITI - USENIX 2000 WIP Jun 22, 19100 Page 8
  9. dsniff (cont.) • Supports magic(5)-style automatic protocol detection - telnet

    on port 3000 won’t help you! • Supports full TCP/IP reassembly, and best-effort half-duplex TCP reassembly (in case of lossy sniffing, or asymmetric routing) • Uses Berkeley DB for storage, only saving unique auth info CITI - USENIX 2000 WIP Jun 22, 19100 Page 9
  10. filesnarf • Sucks down files sniffed from cleartext NFS v2,

    v3, UDP or TCP traffic • Practical exploit for theoretical attacks against X11, SSH, PGP e.g. ˜/.Xauthority, ˜/.ssh/identity, ˜/.pgp/secring.pgp • CIFS, AFS, you’re next • We’re working on NFSv4 - here’s your motivation CITI - USENIX 2000 WIP Jun 22, 19100 Page 10
  11. mailsnarf • Output e-mail sniffed from POP, SMTP traffic in

    Berkeley mbox format • Supports regular expression matching against mail header and body CITI - USENIX 2000 WIP Jun 22, 19100 Page 11
  12. urlsnarf • Output URLs sniffed from HTTP traffic in Common

    Log Format (e.g. Apache access_log) • Crunch through your favorite log analyzer, determing web surfing trends CITI - USENIX 2000 WIP Jun 22, 19100 Page 12
  13. webspy • Watch someone’s web surfing in real-time, on your

    own browser • Fun party trick! CITI - USENIX 2000 WIP Jun 22, 19100 Page 13
  14. Conclusions • Wireless and switched networks are still easily sniffed

    • Insecure network authentication is still widespread • Public humiliation may help CITI - USENIX 2000 WIP Jun 22, 19100 Page 14
  15. Availability • dsniff is freely available under a BSD-style license

    http://www.monkey.org/˜dugsong/dsniff/ CITI - USENIX 2000 WIP Jun 22, 19100 Page 15