1 / 9

Team ClockWork SRA 221 Project

Team ClockWork SRA 221 Project. Blake Michener Hunter Walker Eric Gibbs Bryan Beech Matt DeRosa Kevin Foldes. Objectives. Crack WEP encryption on a Wifi network Intercept Xbox Live data packets Analyze captured Packets. Tool Selection. Started with BackTrack 5 but… Kali Linux

danil
Download Presentation

Team ClockWork SRA 221 Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Team ClockWork SRA 221 Project Blake Michener Hunter Walker Eric Gibbs Bryan Beech Matt DeRosa Kevin Foldes

  2. Objectives • Crack WEP encryption on a Wifi network • Intercept Xbox Live data packets • Analyze captured Packets

  3. Tool Selection • Started with BackTrack 5 but… • Kali Linux • Bootable Thumb Drive

  4. Encryption Cracking Results • Used Fern to attack network • Part of Kali Linux suite • First Dictionary Attack with Fern • Fell within five minutes • Obtained WEP key easily • Too much traffic • Difficult to nail down Xbox traffic

  5. Second Attempt • Removed all traffic from network • Bridged Xbox’s internet connection via attacking laptop • Hard-wired • Hunter- internet setting • Pick up much more data • Dictionary attack took too long • Lack of traffic even with packet injection • Switched to chop chop attack- Success!

  6. Chop Chop Attack • Takes last bit of each packet, rendering it invalid • Last bit is then replaced with a new, recorded value • Modified packet is sent through the network • If it is accepted by the Access Protocol, the chopped bit was valid and part of the key • Repeat

  7. Second Attempt • Network access • Opened WireShark • Turned on Xbox and signed in to Live • Data packets begin to accumulate in capture

  8. Types of Packets Received • Registered Account handshakes • Hulu, HBO GO, NETFLIX • Image and GUI downloads • Xbox Live account handshake

  9. What we learned • WEP encryption is an absolute joke • Kali Linux experience with: • Fern • Wireshark • Internet Bridging • Microsoft servers use Kerberos • Xbox Live account download nature

More Related