ubnt解决方案
楼主: iodata

wps 离线攻击....

  [复制链接]

127

回帖

361

积分

58 小时

在线时间

少尉

注册时间
2008-10-11
金币
212 个
威望
0 个
荣誉
0 个

尚未签到

发表于 2015-4-8 20:31 |显示全部楼层
本帖最后由 iodata 于 2015-4-8 20:34 编辑

.....................
回复

使用道具 举报

806

回帖

1万

积分

1460 小时

在线时间

上校

注册时间
2012-2-14
金币
9466 个
威望
19 个
荣誉
2 个
累计签到:345 天
连续签到:0 天
[LV.365]无线熟人
发表于 2015-4-8 20:49 |显示全部楼层
iodata 发表于 2015-4-8 20:31
.....................

稍微看了看过程,看来我定评错了,先向搂主抱歉
回复

使用道具 举报

177

回帖

419

积分

202 小时

在线时间

少尉

注册时间
2013-2-22
金币
209 个
威望
0 个
荣誉
0 个
累计签到:2 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2015-4-8 21:11 |显示全部楼层
感觉好厉害的样子!!!!!
回复

使用道具 举报

132

回帖

791

积分

259 小时

在线时间

中尉

注册时间
2014-11-20
金币
620 个
威望
0 个
荣誉
0 个
累计签到:28 天
连续签到:0 天
[LV.50]初入江湖
发表于 2015-4-8 22:09 来自手机 |显示全部楼层
看不懂…………
回复

使用道具 举报

132

回帖

791

积分

259 小时

在线时间

中尉

注册时间
2014-11-20
金币
620 个
威望
0 个
荣誉
0 个
累计签到:28 天
连续签到:0 天
[LV.50]初入江湖
发表于 2015-4-8 22:11 来自手机 |显示全部楼层
看起来很高端,……
回复

使用道具 举报

5

回帖

159

积分

39 小时

在线时间

上等兵

注册时间
2012-7-23
金币
150 个
威望
0 个
荣誉
0 个
累计签到:13 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2015-4-8 22:49 |显示全部楼层
修改过的reaver安装不上。。。
回复

使用道具 举报

472

回帖

547

积分

145 小时

在线时间

中尉

注册时间
2014-4-6
金币
42 个
威望
1 个
荣誉
0 个
累计签到:62 天
连续签到:0 天
[LV.100]试剑无线
发表于 2015-4-9 03:08 |显示全部楼层
小白请问一下大神,这项工具到底如何使用啊,有没有教程啊
erotic bitch
回复

使用道具 举报

472

回帖

547

积分

145 小时

在线时间

中尉

注册时间
2014-4-6
金币
42 个
威望
1 个
荣誉
0 个
累计签到:62 天
连续签到:0 天
[LV.100]试剑无线
发表于 2015-4-9 03:10 |显示全部楼层
请问是在wifislax或是linux中加载然后使用吗
erotic bitch
回复

使用道具 举报

22

回帖

1836

积分

70 小时

在线时间

上尉

注册时间
2015-4-7
金币
1787 个
威望
2 个
荣誉
1 个
累计签到:207 天
连续签到:0 天
[LV.365]无线熟人
发表于 2015-4-9 04:09 |显示全部楼层
哈哈哈哈哈哈哈哈哈哈
回复

使用道具 举报

4

回帖

194

积分

8 小时

在线时间

上等兵

注册时间
2015-4-7
金币
189 个
威望
0 个
荣誉
0 个
累计签到:22 天
连续签到:0 天
[LV.50]初入江湖
发表于 2015-4-9 08:10 |显示全部楼层
楼主,麻烦把modified reaver 给我发一份,谢谢。229791000@qq.com
回复

使用道具 举报

124

回帖

2578

积分

426 小时

在线时间

少校

注册时间
2012-1-18
金币
2380 个
威望
2 个
荣誉
1 个
累计签到:243 天
连续签到:0 天
[LV.365]无线熟人
发表于 2015-4-9 08:43 |显示全部楼层
curry33 发表于 2015-4-6 12:41
http://usepremium.blinkweb.com/
用中转站下载

这个怎么下载?
出掉了 封贴。。。。。。。。。
回复

使用道具 举报

15

回帖

288

积分

163 小时

在线时间

少尉

注册时间
2011-5-20
金币
255 个
威望
0 个
荣誉
0 个
累计签到:6 天
连续签到:0 天
[LV.20]漫游旅程
发表于 2015-4-9 09:45 |显示全部楼层
本帖最后由 13715168054 于 2015-4-9 10:02 编辑

WPS Pixie Dust Attack (Offline WPS Attack)





A Kali member "Wiire" has released his tool "pixiewps!" It is available from Wiire's GitHub.

You can also download the modified version of reaver here.

Hello guys. I've been looking into the new WPS security flaw found by Dominique Bongard. All of the information I am providing here is not mine, all credit goes to Bongard and other sources listed at the bottom.

Here is a database with affected/non affected models

Background: Basically Dominique Bongard discovered that Broadcom eCos chips use a Pseudo Random Number Generator that is not entirely random; that is, we can easily brute force the state of the PRNG to gather a bunch of data that the router generates and is supposed to be secure. Ralink's implementation is even worse, however I haven't looked into it much yet. So basically, if we can find the state of the PRNG that generated the nonce, we can find the WPS PIN in one single try. This effectively destroys AP rate limiting tactics AND everything can be done within a matter of seconds.

The first thing we have to do is modify reaver so that once we receive an M3 message, the attack stops. We also need to make sure that we, the client, are the registrar, and the AP is the Enrollee.

The following information is known by all WPS enabled devices:
-Pseudo Random Number Generator used to make the public keys (g^AB mod p)
-g is the generator, A and B are private numbers of the Enrollee and Registrar respectively, and p is a prime modulus.


The following information is gathered from the M1 and M2 packets:
-N1 Enrollee Nonce
-PKR Public Key (Registrar Nonce) (g^B mod p)
-PKE Public Key (Enrollee Nonce) (g^A mod p)

The Authkey is derived from the KDK

The following information is gathered from the M3 packet:
-E-Hash1= HMAC (E-S1, PSK1, PKE, PKR)
-E-Hash2= HMAC (E-S2, PSK2, PKE, PKR)

Components: E-S1 and E-S2 are secret, 128-bit nonces generated right after the router generates its N1 Nonce. If we can brute force the state of the PRNG, then we can find out the E-S1 and E-S2 nonces.

PSK1 and PSK2 are the first and second halves of the router's pin. Many of you know that the router takes the 8 digit pin, and splits it in 2, not to mention the last digit of the second half is a checksum, so instead of 100,000,000 different pin combinations, we only have 10,000 + 1,000= 11,000 possible pins to brute force.

HMAC is a function that hashes all the data in parenthesis. The function is HMAC-SHA-256.

Conclusion:

So assuming already know the PKE, PKR, E-S1 and E-S2 (since we just brute forced them), we can run all the data through and basically just try every pin until we have a matching hash. When we are returned with a match, we can say "Ok, that last pin we used matched the hash from the M3 packet. That must be the pin." We do this for both PSK1 and PSK2 and with only 11,000 (20,000 if we don't want to calculate the checksum... won't make a difference in time) possibilities, it will take only a few seconds to compute everything. Now we can take the pin we just brute forced and toss it into reaver and the AP will say "Ok, you have the right pin, here are all my credentials," including the SSID, WPS Pin, and the WPA key.


If you find anything new or wish to correct me, please do and post it in the comments! I will try to respond and keep you updated as frequently as possible!

Here are all of my sources:

Dominique Bongard's Slide Presentation
Dominique Bongard's Video Presentation
Hack Forums Information
Top Hat Sec Information
Khan Academy Diffle-Hellman Key Exchange
Khan Academy Pseudo Random Number Generator Explaination
GitHub Leaked Broadcom random.c Function
WPS Background
Complete WPS Specification (PDF Download)

And I would like to give a special thanks to DataHead, Wiire, FrostyHacks and of course Dominique Bongard for all their help! Thank You!
  
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册 微信登录

本版积分规则

站点统计 | Archiver | 手机版 | 无线门户 ( 粤ICP备11076993号|粤公网安备44010602008359号 ) |网站地图

GMT+8, 2024-9-21 12:27

返回顶部 返回列表