We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

PACKET HACKING VILLAGE - WPA-SEC: The largest online WPA handshake database

00:00

Formal Metadata

Title
PACKET HACKING VILLAGE - WPA-SEC: The largest online WPA handshake database
Title of Series
Number of Parts
322
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Started as pet project in 2011, wpa-sec collects WPA handshake captures from all over the world. Contributors use client script to download handshakes and special crafted dictionaries to initiate attack against PSKs. With more than 115 GB captures from 240 000 submissions, collected samples represent invaluable source for wireless security research. This includes: Many improvements for emerging wireless security tools like hcxtools suite. Identified default PSK key generation algorithms, used by various ISPs. Those, along with fixes for current implementations get in RouterKeygen project. Many more to come, based on current research activities Performance optimizations for WPA crackers Identified some linux kernel driver bugs During the talk I will explain how wpa-sec works, provide statistics and a lot internals on optimization and how to use the database as OSINT source during pentests and red team actions.
DatabaseDatabasePresentation of a groupComputer animation
FunknetzProcess (computing)System identificationScripting languageReal-time operating systemSoftwareData dictionaryMotion capturePower (physics)Wireless LANResultantPurchasingProcess (computing)
System identificationAlgorithmHash functionRippingFunknetzTexture mappingSoftwareHash functionBitSet (mathematics)Computer-assisted translationUniform resource locatorFlow separationRevision controlSlide ruleElectric generatorSystem identificationVideo gameOpen sourceRippingThread (computing)Repository (publishing)
Motion captureAlgorithmData dictionarySpacetimeStatisticsElectric generatorWater vaporCASE <Informatik>ResultantData dictionaryDistribution (mathematics)Greedy algorithmService (economics)AlgorithmBridging (networking)Motion captureStatisticsRaw image format
MereologyDistribution (mathematics)ResultantComputer animation
Client (computing)Axiom of choiceSocket-SchnittstelleAlgorithmSinc functionMereologyMultiplication signInformationMotion captureConnected spaceShape (magazine)PLS (file format)Data transmissionClient (computing)Level (video gaming)Array data structureDoubling the cubeMathematicsGreen's functionKnotBeta functionPoisson-KlammerComputer animation
Hash functionMereologyRevision controlRippingServer (computing)Level (video gaming)Doubling the cube
SequencePhase transitionDatabaseSpacetimeField (computer science)ResultantArithmetic progressionAmerican Physical SocietyLipschitz-StetigkeitMathematicsPower (physics)BEEPRouter (computing)Control flowComputer animation
Computer networkAsynchronous Transfer ModeHash functionFunction (mathematics)Uniqueness quantificationInformation securityAssociative propertyFrame problemMotion captureMereologyInsertion lossPasswordAsynchronous Transfer ModeHash functionInformationData dictionaryElement (mathematics)Message passingBlock (periodic table)Revision controlInternet forumSoftwareComputer-assisted translationProper mapAssociative propertyComputer animation
Computer hardwareElectronic visual displayAdaptive behaviorTraffic reportingPower (physics)Bookmark (World Wide Web)Different (Kate Ryan album)MereologyComputer hardwareType theoryAsynchronous Transfer ModePiNP-hardComputer animation
Rule of inferenceProcess (computing)Motion captureHash functionQuery languageVenn diagramSoftwareProcess (computing)Motion captureKey (cryptography)AverageSoftware crackingMagnetic stripe cardWindowImage registrationUniform resource locatorResultantHost Identity ProtocolServer (computing)Food energyRouter (computing)
Kernel (computing)Graphics processing unitLocal GroupElectric currentClient (computing)Hill differential equationPower (physics)Graphics processing unit2 (number)Data dictionarySoftware crackingResultantNumberMereologyWordSoftwareCountingProduct (business)
Hash functionView (database)Real-time operating systemHash functionData dictionarySoftwareValidity (statistics)PasswordCache (computing)Multiplication sign
Electric currentKernel (computing)Graphics processing unitOverhead (computing)Local GroupClient (computing)Hash functionDialectReal-time operating systemPasswordMultiplication signData dictionaryRouter (computing)RandomizationDigital photographyComputer animation
Default (computer science)Source codeSoftware testingRouter (computing)SpacetimeReverse engineeringDevice driverChemical equationAlgorithmGoodness of fitResultantRemote procedure callHash functionDatabaseKernel (computing)SoftwareSoftware testingPasswordFirmwareDefault (computer science)Device driverIn-System-ProgrammierungComputer hardwareSoftware bugRouter (computing)Mathematical optimizationMereologyLink (knot theory)Root
Default (computer science)Äquivalenzprinzip <Physik>Phase transitionBuildingInterface (computing)Query languageEmailAuthenticationCommunications protocolFrame problemCustomer relationship managementMathematicsUser interfaceInternet forumTouchscreenWave packetDefault (computer science)ImplementationSinc functionServer (computing)Demo (music)Revision controlDifferent (Kate Ryan album)Projective planeClient (computing)Query languageEmailInformationÄquivalenzprinzip <Physik>
RippingBeat (acoustics)Infinite conjugacy class property
Transcript: English(auto-generated)
So we are now ready for our third presentation of the day a third presentation of the day Alex from way so you're from Bulgaria correct Bulgaria, right? So it is my pleasure to introduce to you you're going to be giving a talk on WPA sec Alex Donna
Thank you guys So today I will talk about The WPA sec which is currently the largest known Handshake WPA handshake database. So what exactly is this?
We are doing collection and processing of a wireless network captures Which are submitted by our users Then we identified these handshakes. We maintain carefully crafted dictionaries to checking down that and There are contributors that are contributing their
GPU power so we can try to crack these handshakes and Submit all the results in real time which are available So WPA sec works with several open source tools WPA sec is also open source and you can see
Over there whenever slide the life installation and the get help Because they're afraid So we're using the HX tools for handshake and identification HX tools is a very interesting Set of two. It's a pretty new from its develop since one year maybe a bit more and
The other is well-known Roker Kagan PC which works for They find that no PSK generation algorithms Of course, the cracking is done by hash cat and John the ripper the bleeding version and
We use we go thanks to the guys from there for our APG location so the brief stats about The service we now have more than half a million handshakes submitted as you see them
We're doing this since 2011, so this is a The whole Sarah what the handshakes You see the raw capture data and our success is around 27 percent No algorithm Generation was hitting around five persons, but I'm sure we can do better. Yeah
And from our crafted dictionaries, it's around 10% of the case plates already cracked because as you know this is pretty greedy algorithm to crack and These are the good results there, of course, we are striving for more
The yield distribution based on wiggle results You can see that there is almost there is no place where You can't Have handshakes there So a lot of people are submitting our users are around
40,000 so This is pretty much very interesting to see how what they're using users using on different parts of the world So, let's see what we're doing there
First we have to get the handshake We all know that how does this happen will be using back in time the old-school? Ap attack don't indicate active clients and get the shape check, right? This is very good because we can extract the a PBS ad and then we can joke a that's AP but
As you also know in crown that there is Or do bad connection transmissions etc with maybe in some places have to apply the a penis correction Of course, we can do better and do a PLS attack so we can attack directly the client
which is also not so new thing at least and There is no need for those corrections since we control the workflow with that plant and here we have to be very fast We have to work better and there is no need for a penis correction
And of course, we can leverage some more interesting attacks on high levels The tool that we are suggesting to use for submissions in WPSC is HX them too, which is part of HX tools and since Last week it have a lot of more interesting features
And of course before submitting to the database, please don't clean work on this and Do anything with these captures because you may destroy some valuable information that's in there The cracking part is also very well known, you know, I
Don't think that I have to explain that but I Basically bbkdf2 shit. It is a one And after that depending on the
Version of the WPA we're using the h mark and define h mark h a1 or with Pa to see Mac. We're using Oh Mac. So this is all implemented in the genre ripper and Hash contents, of course, it's implemented in WPSC server side so we can do it better
about the nose correction We all know about the nose correction and we're very much using it because we don't know to spend years Or many GPU power to crack something that can be cracked in the end
We can also try to rewind on the replay counter field So we have to know what exactly the mouse correction will use but this is Not very good solution because often the APS Keep the same replay counter field. So from the
Database around 5% of all these half a million and chicks that were cracked because not all not Every one of this half million was cracked of course, just like seven person So we needed the nose correction in five percent of these hair shakes
the nose correction can be negative or positive you see the persons Can be implemented as a mathematics with the became the animal in him here You see the results of course a lot of further progress lip space or begin them And it's normal see around 90% of them
Again of course a sex tools can deal with this situation so it can reduce this a lot so The new tip on the block the P&K ID
I believe bottom rope on the a forum post about that and the last version of Hash cat has these additional modes it was released just before back home so the idea here is that if you have network to throw me enabled and confusing the I stand out
We all have this P&K ID, which is part of everything information element here you see the Values that how it's a peer-to-peer value Calculated so here. We just need the Mac AP mark SDA
and which come from the session requests The reassociation request prop response, and you need the message one from the year pool So there is no need for all this
To get Parts of the handshakes like before of course there is no need from loss correction, so if you get the P&K ID You'll be on safe side that you're cracking if you have this Dictionary this password in the dictionary you will get it
So next part is the hardware what we are using to collect that Of course everybody builds his favorites girl We are using raspberry pis like this one
What you see here is a ink display the paper display That is not using any More power that we need and with this It's a probably better We can run this for around two or three days
without stopping the adapters we're using is Running-based or anything that works better on the hcx tools. You can see you can find Different types of adapters that we have tested from know that they're working
Here you see the open dirty being based device with hardware antenna modes It should just the pulling come up report return all this is very cheap Of course here, it's again raspberry pi based Solution, but with way better antenna not give us a lot more power
Of course you can use whatever You want for this? so when you already when you have the captures and The first thing that you have to do is to issue your own double basics key
There is no some Stripe registration process you just go Hit the issue key, and that's it So with this key you can access the results when they're cracked On the server side we're processing with hcx pick up to We check for duplicates
Of course we're doing a lot more like Trying to crack VIP and key so if we already have this Network with This esid which you will get the hidden. There is no need for
this whole thing to go to the crackers to exhaust their energy We're doing the we go APG location and of course if we are not having the results from router kick in PC this goes to handshake crackers
So the guys that Previously mined coins, or I don't know their favorite cryptocurrency They can spend one of their GPUs to run a health crack This downloads the handshakes and dictionaries and feeds them to cracker
it starts with the oldest handshakes and with Those ditches that are with fewer words and this gives some fair results for most people What we're doing here is because we have so much handshakes. We're doing the
esid combined so we are fetching all Networks that have one and the same esid So we are doing the heavy part of the PBTDF to just once and We are talking with Our dictionaries
Data part is automatic dictionary count because if you have very powerful GPU For one of these small dictionaries that we see for our 1 million word count in it You are spending around 30 seconds to initialize the GPU and after that for example
3 or 4 seconds to push the full dictionary there, so we are combining dictionaries automatically So it's scaling depending on number of GPUs we have and the GPU power
We did when Something is cracked You accepting one or more PSK by hash or by hash of the network or the bsid We are doing the validations as far as we can And in real time we generate these cracked txt gz
Dictionaries over there, okay, it's over there. So it's real time. You can get every password that has been cracked Yeah, and there is a separate dictionary that is for those that are coming from Rauterkeggen, they are separated because
most of the time they look very Random things, of course, they are not so random. That's why they get to the Rauterkeggen and But they are not really interesting if you want to use this dictionary for your your own assessments
So, what we've learned up to now There are a lot of Vendors and ISPs that are still using default bsid, sid based algorithms. In the database there are a lot of these hidden and we hope to get them rebuilt
To identify this and continue with that There is a lot of Going to In this part, a lot of people get the router firmware
captured and try to find these default algorithms and with this With WPA Sec results, we are validating their results and It gets pretty interesting. Of course, developing such a tool like xax tools
gets We hit a lot of Linux kernel and driver bugs. We try to fill as much as possible Bugs, a lot of them are already fixed. So this is a good thing for everyone that is using such a hardware
We also identified some optimizations improvements in hashcat and gm-dry-ripper and help you Get it also those better and in the end WPAsec is very useful as a source because For example, you're doing a remote penetration test on some
bank You also can go on WPAsec and on wiggle see what are the networks there After that go to WPAsec and see if somebody already captured some network hash there so
from now on you will be Way further and you already have something to work on and to try for password reuse and etc. And What's next with this project? It's running Some years But I'm sure that there are a lot of more hidden algorithms and we'll be very glad to
Check those out The interesting thing about these default algorithms that there is info on them on different forums, wiki-incent, etc are very very spread and Not really useful When you look for something and I think it this will be a nice place to collect them all and to improve it
Of Course the web interface. I really don't have full screenshot because it's really awful But this have to be gone from my teens and we have to do something better Of course It will be nice to introduce some API for DB query. So a lot of guys will have
The possibility to dig in this database, but for now if you have some ideas I'll be very happy to discuss them. Just drop me a mail and work it out And of course prepare for wp3 there are some speculations and
I'm sure that we will think of something but Let's see the first client implementations and server calls. So we'll see how this happened But since in 2018 We still pass out
WEP and wpa version so I'm sure this will not go around So So, thank you guys