[Intro. to Computer Security Course Note] Ch 24 (supplement 1)
Ch24 Supplement. Phishing Attacks in Wi-Fi Networks
Goal
- Understand how user credentials can be leaked by a man-in-the-middle phishing attack over Wi-Fi networks
- Expected to learn
- How to identify a victim’s device?
- How to redirect the victim’s traffic to our attack machine?
- How to steal user credential from intercepted data packets?
- How to return phishing web pages to the victim?
Scenario
Four Tasks
- Discover the IP/MAC addresses of a target victim device from a Wi-Fi network
- Redirect all the traffic of the victim device to your attack device
- Redirect the victim device to access a phishing web page
- Launch a man-in-the-middle attack to steal the victim’s credential
Task I
- Discover the IP/MAC addresses of a target victim device from a Wi-Fi network
- e.g., using “Fing”
What is ARP (Address Resolution Protocol)
- A communication protocol used for discovering the link layer (or MAC) address associated with a given IP
- A request-response protocol whose messages are encapsulated by a link-layer protocol
- Within the boundaries of a single network, never routed across interworking nodes
Task II
- Redirect all the traffic of the victim device to your attack device
- Launch ARP spoofing
- e.g., using “Arpspoof” (https://github.com/alandau/arpspoof) or “Ettercap”
- If the attack is successful
- the victim’s traffic will be routed to the attacker for both uplink and downlink
What is DNS (Domain Name System) Service?
- A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network
- The resolution of the hierarchical name space is done by a hierarchy of name servers
- Each server is responsible (authoritative) for a contiguous portion of the DNS namespace called a zone
- DNS server answer queries about hosts in its zone
DNS Address Resolution
- Domain name resolvers determine the domain name servers responsible for the domain name in question by a sequence of queries starting with the right-most (top-level) domain label
Task III
- Redirect the victim device to access a phishing web page
- Launch DNS spoofing
- e.g., using “Ettercap”
- If the attack is successful
- An access request to NCTU home page will be redirected to the attack server (140.113.207.243)
- The attacker can reply with a fake, phishing web page
Task IV
- Launch a man-in-the-middle attack to steal the victim’s credential
- Launch ARP spoofing (but no DNS spoofing)
- Use “Wireshark” to analyze your intercepted packets
- Access a web page from the link
- If the attack is successful
- You can steal user credentials from the intercepted packets
- Prerequisite: the web page cannot be encrypted