+91 80 4201 0563 (Only for Sales), +91 80 4377 5796 (Admin & HR inquiries)
info@alethea.in
Schedule A Demo
Facebook
Twitter
LinkedIn
YouTube
RSS
Alethea.in Logo
  • Products
    • WiCheck LinA 6E
    • WiCheck 6
    • WiCheck 6 LinA
    • WiCheck ATF
    • Wi-Fi Experience Lab
  • Services
  • Wi-Fi Experience Lab
  • Resources
    • Blog
    • Brochures
    • Case Studies
      • Product Case Studies
      • Services Case Studies
    • Videos
  • About Us
  • Careers
  • Contact

Malicious Packet Injection

Ramakrishna ChikkalaSeptember 12, 2020

Introduction

There is a constant threat to your network from various actors in the big bad networking world. These actors use various techniques to steal information (malware) or prevent your network from working normally (attacks). It is imperative that Network administrators take actions to protect our network from them proactively (ex: antivirus, firewall).

Wireless networks in unlicensed bands like Wi-Fi are more vulnerable because of their “open” or accessible “to all” nature, unlike a wired network in a building or an underground duct, where we can protect it by limiting the access to the building or duct physically.

Security Threats

The security threat to Wi-Fi networks are primarily two types.

  • The bad actor can break the confidentiality/integrity algorithms and get access to data exchange and steal valuable information (Ex: Passwords, Credit card numbers). [reference]
  • The bad actor can inject some malicious packets and prevent the network from functioning normally (called Denial of service DOS).

In this blog we would discuss a few such commonly known attacks and methods/tools to prevent this kind of security threat.

Probe Flooding

In the previous blog, we had suggested that the ability to handle a large number of probes is a key performance metric for an Access Point. The same feature can also be used to make the network vulnerable to denial of service. If the bad actor sets up a number of clients that would constantly send broadcast or unicast probes targeting a set of Access Points in the network, the APs would not be able to service genuine clients. This can lead to network efficiency problems and ultimately lead to denial of service. It is also possible that this scenario exposes other problems in the AP (out of memory situation or a crash).

Authentication flooding

In this type of denial of service, the rogue clients try to authenticate with the network with an incorrect password. Since the whole of Authentication, Association, 4 way handshake takes a significant amount of time. This would also lead to reservation of resources on the AP until  the 4 way Handshake fails. Many such rogue clients and repetition of these attempts with different MAC addresses (MAC spoofing) can lead similarly to denial of service for genuine clients.

 Fig 1: Example exchange between an AP and Client when incorrect password is used by client

A variant of this attack can also happen on Public Hotspots with open security. In these networks once Authentication and Association is completed, the user is presented a Captive portal page to enter valid credentials. Since the rogue clients don’t have any valid credentials, they can simply squat (do nothing) or enter random credentials. Many such rogue clients coupled with MAC spoofing can lead to denial of service for genuine clients.

Deauthentication Attack

This attack has been well known in Wi-Fi networks [reference] for a while. This classic form of this attack uses the MAC addresses of clients already authenticated with the AP to send a deauthentication message to AP. This would make the real clients to be deauthenticated by the AP and they would now need to go through the full authentication and 4 way handshake cycle. This  attack is not possible if the network uses 802.11w (Protected management frames). However, many access points are shipped with 802.11w turned off by default to be able to interoperate with older Wi-Fi clients.

 

SWAT WiCheck Multiclient Simulator can be used to generate many such scenarios using the inbuilt packet injection feature together with robot framework scripts. This would lead to an efficient and automated way of testing the APs for these kinds of attacks at scale.

 

References:

[1] http://users.csc.calpoly.edu/~bellardo/pubs/usenix-sec03-80211dos-html/aio.html

 

: malformed packets, Malicious Packet Injection
Previous Post Packet Injection, Scale Test With WiCheck Next Post Switch Controller Web Application (Fixed Price)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2021 (2)
  • July 2021 (4)
  • September 2020 (1)
  • July 2020 (2)
  • February 2020 (1)
  • January 2020 (2)
  • December 2019 (1)
  • November 2019 (2)
  • September 2019 (2)
  • August 2019 (2)
  • July 2019 (3)
  • March 2019 (2)
  • December 2018 (1)
  • October 2018 (1)
  • September 2018 (1)
  • May 2018 (1)
  • March 2018 (1)
  • February 2018 (1)
  • January 2018 (1)
  • November 2017 (1)
  • October 2017 (1)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (2)
  • June 2017 (1)
  • May 2017 (1)
  • April 2017 (1)
  • March 2017 (9)

Recent Posts

  • Log Analysis using AI/ML for Broadband
  • Packaging Native Applications for Network SW
  • IoT Production Tester Application (Fixed Price)
  • Multi Client Lab Automation (IP based Services)
  • Multi Tenant Real Time Cloud App (T&M based)
About Us

We help organizations in Perfecting Broadband through our Products and Services. We strive to enhance the User Experience of your end customers.

Read More

Current Openings

LTE Protocol Test Engineer

C# Desktop Application Developer

GUI Developer for Test Tool

Read More

Contact Us

info@alethea.in

+91 80 4201 0563 (Only for sales queries)

+91 80 4377 5796 (Admin & HR inquiries)

Alethea Communications Technologies Pvt Ltd

Siri Shambhavi, #2346,

1st & 2nd Floor,

17th cross, HSR layout, Sector 1,

Bangalore 560 102, Karnataka, INDIA

Request A Live Demo
Request A Sales Call

Privacy Policy              Cookie Policy                 Contact Us

© Copyright 2017-2022 Alethea Communications Technologies Pvt Ltd | All Rights Reserved