z-logo
open-access-imgOpen Access
Advanced Wi-Fi attacks using commodity hardware
Author(s) -
Mathy Vanhoef,
Frank Piessens
Publication year - 2014
Publication title -
lirias (ku leuven)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/2664243.2664260
Subject(s) - firmware , man in the middle attack , computer science , jamming , computer security , channel (broadcasting) , computer network , encryption , throughput , embedded system , side channel attack , computer hardware , cryptography , wireless , operating system , physics , thermodynamics
We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf WiFi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs continuous jamming, making the channel unusable for other devices. For the fourth attack we implemented a selective jammer, allowing one to jam specific frames already in the air. The fifth is a novel channel-based Man-in-the-Middle (MitM) attack, enabling reliable manipulation of encrypted traffic.These low-layer attacks facilitate novel attacks against higher-layer protocols. To demonstrate this we show how our MitM attack facilitates attacks against the Temporal Key Integrity Protocol (TKIP) when used as a group cipher. Since a substantial number of networks still use TKIP as their group cipher, this shows that weaknesses in TKIP have a higher impact than previously thought.status: publishe

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom