PACKET HACKING VILLAGE - WPA-SEC: The largest online WPA handshake database
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 322 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/39906 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
DEF CON 2675 / 322
18
27
28
40
130
134
164
173
177
178
184
190
192
202
203
218
219
224
231
233
234
235
237
249
252
255
268
274
287
289
290
295
297
298
299
302
306
309
312
315
316
00:00
DatabaseDatabasePresentation of a groupComputer animation
00:37
FunknetzProcess (computing)System identificationScripting languageReal-time operating systemSoftwareData dictionaryMotion capturePower (physics)Wireless LANResultantPurchasingProcess (computing)
01:10
System identificationAlgorithmHash functionRippingFunknetzTexture mappingSoftwareHash functionBitSet (mathematics)Computer-assisted translationUniform resource locatorFlow separationRevision controlSlide ruleElectric generatorSystem identificationVideo gameOpen sourceRippingThread (computing)Repository (publishing)
02:11
Motion captureAlgorithmData dictionarySpacetimeStatisticsElectric generatorWater vaporCASE <Informatik>ResultantData dictionaryDistribution (mathematics)Greedy algorithmService (economics)AlgorithmBridging (networking)Motion captureStatisticsRaw image format
03:02
MereologyDistribution (mathematics)ResultantComputer animation
03:35
Client (computing)Axiom of choiceSocket-SchnittstelleAlgorithmSinc functionMereologyMultiplication signInformationMotion captureConnected spaceShape (magazine)PLS (file format)Data transmissionClient (computing)Level (video gaming)Array data structureDoubling the cubeMathematicsGreen's functionKnotBeta functionPoisson-KlammerComputer animation
05:19
Hash functionMereologyRevision controlRippingServer (computing)Level (video gaming)Doubling the cube
06:02
SequencePhase transitionDatabaseSpacetimeField (computer science)ResultantArithmetic progressionAmerican Physical SocietyLipschitz-StetigkeitMathematicsPower (physics)BEEPRouter (computing)Control flowComputer animation
07:31
Computer networkAsynchronous Transfer ModeHash functionFunction (mathematics)Uniqueness quantificationInformation securityAssociative propertyFrame problemMotion captureMereologyInsertion lossPasswordAsynchronous Transfer ModeHash functionInformationData dictionaryElement (mathematics)Message passingBlock (periodic table)Revision controlInternet forumSoftwareComputer-assisted translationProper mapAssociative propertyComputer animation
09:06
Computer hardwareElectronic visual displayAdaptive behaviorTraffic reportingPower (physics)Bookmark (World Wide Web)Different (Kate Ryan album)MereologyComputer hardwareType theoryAsynchronous Transfer ModePiNP-hardComputer animation
10:28
Rule of inferenceProcess (computing)Motion captureHash functionQuery languageVenn diagramSoftwareProcess (computing)Motion captureKey (cryptography)AverageSoftware crackingMagnetic stripe cardWindowImage registrationUniform resource locatorResultantHost Identity ProtocolServer (computing)Food energyRouter (computing)
11:39
Kernel (computing)Graphics processing unitLocal GroupElectric currentClient (computing)Hill differential equationPower (physics)Graphics processing unit2 (number)Data dictionarySoftware crackingResultantNumberMereologyWordSoftwareCountingProduct (business)
13:20
Hash functionView (database)Real-time operating systemHash functionData dictionarySoftwareValidity (statistics)PasswordCache (computing)Multiplication sign
13:46
Electric currentKernel (computing)Graphics processing unitOverhead (computing)Local GroupClient (computing)Hash functionDialectReal-time operating systemPasswordMultiplication signData dictionaryRouter (computing)RandomizationDigital photographyComputer animation
14:20
Default (computer science)Source codeSoftware testingRouter (computing)SpacetimeReverse engineeringDevice driverChemical equationAlgorithmGoodness of fitResultantRemote procedure callHash functionDatabaseKernel (computing)SoftwareSoftware testingPasswordFirmwareDefault (computer science)Device driverIn-System-ProgrammierungComputer hardwareSoftware bugRouter (computing)Mathematical optimizationMereologyLink (knot theory)Root
16:32
Default (computer science)Äquivalenzprinzip <Physik>Phase transitionBuildingInterface (computing)Query languageEmailAuthenticationCommunications protocolFrame problemCustomer relationship managementMathematicsUser interfaceInternet forumTouchscreenWave packetDefault (computer science)ImplementationSinc functionServer (computing)Demo (music)Revision controlDifferent (Kate Ryan album)Projective planeClient (computing)Query languageEmailInformationÄquivalenzprinzip <Physik>
18:05
RippingBeat (acoustics)Infinite conjugacy class property
Transcript: English(auto-generated)
00:00
So we are now ready for our third presentation of the day a third presentation of the day Alex from way so you're from Bulgaria correct Bulgaria, right? So it is my pleasure to introduce to you you're going to be giving a talk on WPA sec Alex Donna
00:25
Thank you guys So today I will talk about The WPA sec which is currently the largest known Handshake WPA handshake database. So what exactly is this?
00:41
We are doing collection and processing of a wireless network captures Which are submitted by our users Then we identified these handshakes. We maintain carefully crafted dictionaries to checking down that and There are contributors that are contributing their
01:01
GPU power so we can try to crack these handshakes and Submit all the results in real time which are available So WPA sec works with several open source tools WPA sec is also open source and you can see
01:21
Over there whenever slide the life installation and the get help Because they're afraid So we're using the HX tools for handshake and identification HX tools is a very interesting Set of two. It's a pretty new from its develop since one year maybe a bit more and
01:44
The other is well-known Roker Kagan PC which works for They find that no PSK generation algorithms Of course, the cracking is done by hash cat and John the ripper the bleeding version and
02:04
We use we go thanks to the guys from there for our APG location so the brief stats about The service we now have more than half a million handshakes submitted as you see them
02:21
We're doing this since 2011, so this is a The whole Sarah what the handshakes You see the raw capture data and our success is around 27 percent No algorithm Generation was hitting around five persons, but I'm sure we can do better. Yeah
02:45
And from our crafted dictionaries, it's around 10% of the case plates already cracked because as you know this is pretty greedy algorithm to crack and These are the good results there, of course, we are striving for more
03:03
The yield distribution based on wiggle results You can see that there is almost there is no place where You can't Have handshakes there So a lot of people are submitting our users are around
03:22
40,000 so This is pretty much very interesting to see how what they're using users using on different parts of the world So, let's see what we're doing there
03:41
First we have to get the handshake We all know that how does this happen will be using back in time the old-school? Ap attack don't indicate active clients and get the shape check, right? This is very good because we can extract the a PBS ad and then we can joke a that's AP but
04:05
As you also know in crown that there is Or do bad connection transmissions etc with maybe in some places have to apply the a penis correction Of course, we can do better and do a PLS attack so we can attack directly the client
04:24
which is also not so new thing at least and There is no need for those corrections since we control the workflow with that plant and here we have to be very fast We have to work better and there is no need for a penis correction
04:42
And of course, we can leverage some more interesting attacks on high levels The tool that we are suggesting to use for submissions in WPSC is HX them too, which is part of HX tools and since Last week it have a lot of more interesting features
05:04
And of course before submitting to the database, please don't clean work on this and Do anything with these captures because you may destroy some valuable information that's in there The cracking part is also very well known, you know, I
05:27
Don't think that I have to explain that but I Basically bbkdf2 shit. It is a one And after that depending on the
05:41
Version of the WPA we're using the h mark and define h mark h a1 or with Pa to see Mac. We're using Oh Mac. So this is all implemented in the genre ripper and Hash contents, of course, it's implemented in WPSC server side so we can do it better
06:04
about the nose correction We all know about the nose correction and we're very much using it because we don't know to spend years Or many GPU power to crack something that can be cracked in the end
06:21
We can also try to rewind on the replay counter field So we have to know what exactly the mouse correction will use but this is Not very good solution because often the APS Keep the same replay counter field. So from the
06:44
Database around 5% of all these half a million and chicks that were cracked because not all not Every one of this half million was cracked of course, just like seven person So we needed the nose correction in five percent of these hair shakes
07:01
the nose correction can be negative or positive you see the persons Can be implemented as a mathematics with the became the animal in him here You see the results of course a lot of further progress lip space or begin them And it's normal see around 90% of them
07:24
Again of course a sex tools can deal with this situation so it can reduce this a lot so The new tip on the block the P&K ID
07:41
I believe bottom rope on the a forum post about that and the last version of Hash cat has these additional modes it was released just before back home so the idea here is that if you have network to throw me enabled and confusing the I stand out
08:03
We all have this P&K ID, which is part of everything information element here you see the Values that how it's a peer-to-peer value Calculated so here. We just need the Mac AP mark SDA
08:25
and which come from the session requests The reassociation request prop response, and you need the message one from the year pool So there is no need for all this
08:43
To get Parts of the handshakes like before of course there is no need from loss correction, so if you get the P&K ID You'll be on safe side that you're cracking if you have this Dictionary this password in the dictionary you will get it
09:07
So next part is the hardware what we are using to collect that Of course everybody builds his favorites girl We are using raspberry pis like this one
09:22
What you see here is a ink display the paper display That is not using any More power that we need and with this It's a probably better We can run this for around two or three days
09:41
without stopping the adapters we're using is Running-based or anything that works better on the hcx tools. You can see you can find Different types of adapters that we have tested from know that they're working
10:02
Here you see the open dirty being based device with hardware antenna modes It should just the pulling come up report return all this is very cheap Of course here, it's again raspberry pi based Solution, but with way better antenna not give us a lot more power
10:25
Of course you can use whatever You want for this? so when you already when you have the captures and The first thing that you have to do is to issue your own double basics key
10:41
There is no some Stripe registration process you just go Hit the issue key, and that's it So with this key you can access the results when they're cracked On the server side we're processing with hcx pick up to We check for duplicates
11:03
Of course we're doing a lot more like Trying to crack VIP and key so if we already have this Network with This esid which you will get the hidden. There is no need for
11:21
this whole thing to go to the crackers to exhaust their energy We're doing the we go APG location and of course if we are not having the results from router kick in PC this goes to handshake crackers
11:42
So the guys that Previously mined coins, or I don't know their favorite cryptocurrency They can spend one of their GPUs to run a health crack This downloads the handshakes and dictionaries and feeds them to cracker
12:02
it starts with the oldest handshakes and with Those ditches that are with fewer words and this gives some fair results for most people What we're doing here is because we have so much handshakes. We're doing the
12:21
esid combined so we are fetching all Networks that have one and the same esid So we are doing the heavy part of the PBTDF to just once and We are talking with Our dictionaries
12:41
Data part is automatic dictionary count because if you have very powerful GPU For one of these small dictionaries that we see for our 1 million word count in it You are spending around 30 seconds to initialize the GPU and after that for example
13:03
3 or 4 seconds to push the full dictionary there, so we are combining dictionaries automatically So it's scaling depending on number of GPUs we have and the GPU power
13:21
We did when Something is cracked You accepting one or more PSK by hash or by hash of the network or the bsid We are doing the validations as far as we can And in real time we generate these cracked txt gz
13:44
Dictionaries over there, okay, it's over there. So it's real time. You can get every password that has been cracked Yeah, and there is a separate dictionary that is for those that are coming from Rauterkeggen, they are separated because
14:03
most of the time they look very Random things, of course, they are not so random. That's why they get to the Rauterkeggen and But they are not really interesting if you want to use this dictionary for your your own assessments
14:22
So, what we've learned up to now There are a lot of Vendors and ISPs that are still using default bsid, sid based algorithms. In the database there are a lot of these hidden and we hope to get them rebuilt
14:45
To identify this and continue with that There is a lot of Going to In this part, a lot of people get the router firmware
15:02
captured and try to find these default algorithms and with this With WPA Sec results, we are validating their results and It gets pretty interesting. Of course, developing such a tool like xax tools
15:22
gets We hit a lot of Linux kernel and driver bugs. We try to fill as much as possible Bugs, a lot of them are already fixed. So this is a good thing for everyone that is using such a hardware
15:41
We also identified some optimizations improvements in hashcat and gm-dry-ripper and help you Get it also those better and in the end WPAsec is very useful as a source because For example, you're doing a remote penetration test on some
16:04
bank You also can go on WPAsec and on wiggle see what are the networks there After that go to WPAsec and see if somebody already captured some network hash there so
16:22
from now on you will be Way further and you already have something to work on and to try for password reuse and etc. And What's next with this project? It's running Some years But I'm sure that there are a lot of more hidden algorithms and we'll be very glad to
16:45
Check those out The interesting thing about these default algorithms that there is info on them on different forums, wiki-incent, etc are very very spread and Not really useful When you look for something and I think it this will be a nice place to collect them all and to improve it
17:06
Of Course the web interface. I really don't have full screenshot because it's really awful But this have to be gone from my teens and we have to do something better Of course It will be nice to introduce some API for DB query. So a lot of guys will have
17:27
The possibility to dig in this database, but for now if you have some ideas I'll be very happy to discuss them. Just drop me a mail and work it out And of course prepare for wp3 there are some speculations and
17:43
I'm sure that we will think of something but Let's see the first client implementations and server calls. So we'll see how this happened But since in 2018 We still pass out
18:00
WEP and wpa version so I'm sure this will not go around So So, thank you guys