what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ciscoLEAP.txt

ciscoLEAP.txt
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
SHA-256 | f69cb36da7ce0751074bc9234b215e5226463cd4f861e903270e34911dae734e

ciscoLEAP.txt

Change Mirror Download
1 month of audits by l33t security companies: No vulnerabilities
1 month of architecture research by CCIE's: No vulnerabilities
2 days of hacking by DaBubble, Bishop, and Evol: Root.
There's some things that fackers should audit (WEBAPPS) for everything
else, get a real hacker.

If you can't get the POC to work, if you don't like that there's no gui,
or if you don't understand this message send your 2weeks and get a job
making my starbucks coffee. Those people seem so heavily worked that
there must be a need for more of them. There is not a need however, for
more of you.

All,

Cisco leap is an authentication mechanism employed on high grade
wireless access points. The mechanism is used to replace WEP and was
supposed to offer greater security against malicious threat agents. I
have been watching the list today, and I saw a whole lot of FUD regarding
the matter of insecurities present in the protocol. I thought you all
would have known by now. Apparently my assumption is incorrect. Attached
is a POC attack for LEAP implementations utilizing Microsoft's Active
Directory as the authentication store.

Cisco LEAP authenticates users to the wireless access point via a
password. This password is authenticated against a back-end radius server
via a Challenge-Response protocol. The protocol is such:
1.) The Wireless client sends an authentication request;
2.) The AP Acknowledges request with an 8 byte challenge;
3.) The Wireless client computes the response by:
a.) MD4 Hashing the password producing a 16 byte hash;
b.) Padding the hash with 5 nulls producing 21 bytes;
c.) Splitting the resulting 21 bytes into 7 byte chunks;
d.) Iterating through the 7 byte chunks, des encrypting
the challenge as plain-text with the 7-byte chunk
as the key.
e.) Concatenating the resulting cipher text producing 24
bytes
4.) The client then sends the resulting 24 bytes as the challenge
response;
5.) The back-end systems iterate through the same processes and
check for a match; then
6.) If the two match, authentication has been accomplished.

Does anyone smell MS-CHAP? Attacks on this protocol are such:

1.) The complexity of finding the DES key of the last chunk is 255^2. Upon
finding this, the malicious threat agent can cycle through a precomputed
database of commonly used passwords, matching on the last two bytes of the
hash. This is a reduction of the complexity for a dictionary attack.

2.) From 1: this also reduces the complexity of a brute force search for
the key

3.) A chosen plain-text attack utilizing rainbow tables may be used by
impersonating an access point. The initial pre-computation complexity
is large, but manageable for any good hacker.

These attacks are based on the fact that if you didn't know about Cisco
leaps insecurities you're not going to know about the S-Box decoding
optimization on 56bit DES, nor how to reverse MD4 using genetic algorithms.
If no fackers post to bugtraq within the next 7 working days, I'll release
these as well.

<RANT>
The link to http:/www.unstrung.com/document.asp?doc_id=41185 leads me to
the conclusion that Wright, is a Facker (Fake Hacker). People like him
are dangerous to the information security community. As said in a rap
song, "If you don't give a sh** then don't throw it up". If you're not a
hacker then don't pretend to be, and don't run security audits. You're only
filling up my bugtraq e-mail box with rants about the next CSS
vulnerability, or SQL-injection vulnerability. These are not things worth
posting. Things that are worth posting include:
1.) New techniques
2.) Esoteric propreitary technologies's shortcomings (NOT WEBAPPS)
3.) etc.
It is people that are like this that prevent other people from sharing
their research. It takes me 2 minutes to find a CSS vulnerability, and 1
minute to find an SQL injection vulnerability so why are you going to post
that? Facker's need to remain like low-key and disappear.
</RANT>

-Evol
May I have your attention please
I repeat, may I have your attention please
Will the real Evol please stand up...
We're going to have a problem here

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close