lunes, 9 de enero de 2012

Jugando con la Wireless de los hoteles

Compartir este artículo:

Hola!

Muy buenas a todos/as!

Desde siempre las redes Wireless han sido un foco para los atacantes. Las redes Wireless desde siempre han sufrido ataques desde que se implementaron en el mercado. Si recordamos primero,  las redes Wireless surgieron abiertas, la gente empezó a quejarse y entonces mejoraron la seguridad a WEP, esto al principio fue una medida de mitigación pero pronto empezaron a surgir los primeros ataques contra redes inalámbricas, un ejemplo de un posible ataque que podía afectar a las redes era el de inyección, del que ya hablé aquí, otro ataque que tambiñen podía romper redes Wireless mucho más rápido era el ataque Chop Chop, que también expliqué por aquí.

Mas tarde surgió el protocolo WPA y WPA2 que consiguieron mitigar en gran parte los ataques a este tipo de infraestructuras.

En cada vez mas servicios que se ofrecen al público, tanto en cafeterías como en Hoteles, como en centros comerciales ofrecen servicio de Wireless o bien gratuíto, o bien de pago.

Estos servicios deberían de cumplir unos requisitos mínimos, por ejemplo, que si existe dos redes Wireless en el hotel, una de invitados y otra para los ya inscritos fueran por VLAN’s diferentes.

Otro de los requisitos es que exista isolation entre clientes en la misma red, es decir, que no pueda ver quien está conectado ni poder capturar con mi tarjeta en modo promiscuo los datos que navegan a través de la red.

También sería normal que si NO estamos autenticados en la red, no tengamos la visibilidad de los demás clientes conectados.

Una vez conectados a la red, por ejempo, con Cain hacemos un escaneo de los hosts de la red.

Parece ser que tenemos acceso a ver los clientes conectados en la red, ahora mismo está sin autenticar es decir, no está bien configurada la red.

Un ataque posible sería realizar un MITM, con Cain es muy fácil, también expliqué por aquí como se hacía

Haciendo el ataque de Poisoning podemos robar credenciales, por ejemplo:

Se pueden capturar las contraseñas haciendo un ataque Man in the middle

Si guardamos un pcap de la red, podemos consultar mucho mejor los datos extraídos.

Con NetworkMinner podemos ver los datos mas ordenados

Por último y debido a que ya con un Smartphone podemos auditar una red con ANTI para Android pude sacar este report

Los resultados són:

39 devices found on 192.168.1.36/24 network:1. IP=10.1.1.1, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!2. IP=10.1.1.3, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.3. IP=10.1.1.15, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.4. IP=10.1.1.21, MAC=[XX:XX:XX:XX:XX:XX], Type=Linux Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.5. IP=10.1.1.22, MAC=[XX:XX:XX:XX:XX:XX], Type=Linux Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.6. IP=10.1.1.23, MAC=[XX:XX:XX:XX:XX:XX], Type=Linux Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.7. IP=10.1.1.24, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.8. IP=10.1.1.25, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.9. IP=10.1.1.35, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.10. IP=10.1.1.41, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.11. IP=10.1.1.42, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.12. IP=10.1.1.45, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.13. IP=10.1.1.51, MAC=[XX:XX:XX:XX:XX:XX], Type=Linux Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.14. IP=10.1.1.52, MAC=[00:11:22:33:44:55], Type=Linux Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.15. IP=10.1.1.53, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.16. IP=10.1.1.55, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.17. IP=10.1.1.62, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.18. IP=10.1.1.63, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.19. IP=10.1.1.71, MAC=[00:11:22:33:44:55], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.20. IP=10.1.1.72, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.21. IP=10.1.1.75, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.22. IP=10.1.1.81, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.23. IP=10.1.1.82, MAC=[XX:XX:XX:XX:XX:XX], Type=Router Device     1 Open Ports:     [80/http] – Make sure you’re using latest HTTP Server.24. IP=10.1.1.95, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     4 Open Ports:     [22/ssh] – Make sure running SSH on this device is needed. Use strong passwords!     [23/telnet] – Opened port found.     [80/http] – Make sure you’re using latest HTTP Server.     [443/https] – Opened port found.25. IP=10.1.1.98, MAC=[XX:XX:XX:XX:XX:XX], Type=Windows Desktop     10 Open Ports:     [135/msrpc] – Opened port found.     [139/netbios-ssn] – Opened port found.     [445/microsoft-ds] – Recommended to block this port in firewall. Start->Run->firewall.cpl. Important tip : Run Windows update!     [5800/vnc-http] – Opened port found.     [5900/vnc] – Opened port found.     [49152/unknown] – Opened port found.     [49153/unknown] – Opened port found.     [49154/unknown] – Opened port found.     [49155/unknown] – Opened port found.     [49157/unknown] – Opened port found.26. IP=10.1.1.103, MAC=[XX:XX:XX:XX:XX:XX], Type=Windows Desktop     1 Open Ports:     [5357/wsdapi] – Opened port found.27. IP=10.1.1.107, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!28. IP=10.1.1.114, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!29. IP=10.1.1.116, MAC=[XX:XX:XX:XX:XX:XX], Type=Mac/OSX Desktop     No opened ports found!30. IP=10.1.1.130, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!31. IP=10.1.1.132, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!32. IP=10.1.1.139, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!33. IP=10.1.1.144, MAC=[XX:XX:XX:XX:XX:XX], Type=Mac/OSX Desktop     No opened ports found!34. IP=10.1.1.164, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!35. IP=10.1.1.170, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     1 Open Ports:     [8080/http-proxy] – Opened port found.36. IP=10.1.1.181, MAC=[XX:XX:XX:XX:XX:XX], Type=Unknown Device     No opened ports found!37. IP=10.1.1.183, MAC=[XX:XX:XX:XX:XX:XX], Type=Linux Device     No opened ports found!38. IP=10.1.1.191, MAC=[XX:XX:XX:XX:XX:XX], Type=Windows Desktop     4 Open Ports:     [443/https] – Opened port found.     [990/ftps] – Opened port found.     [993/imaps] – Opened port found.     [995/pop3s] – Opened port found.39. IP=10.1.1.194, MAC=[XX:XX:XX:XX:XX:XX], Type=Mac/OSX Desktop     No opened ports found!

Hay ordenadores bastante interesantes con bastantes puertos, que podrían dar mucho juego…

Aunque basta ya de jugar, la gente querrá consultar su correo ;)

No hay comentarios:

Publicar un comentario en la entrada

Related Posts Plugin for WordPress, Blogger...