exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ciscoLEAP.txt

ciscoLEAP.txt
Posted Oct 3, 2003
Authored by Evol

Writing describing the short comings of Cisco's LEAP authentication used on their wireless access points and how to score root on them.

tags | paper, root
systems | cisco
SHA-256 | f69cb36da7ce0751074bc9234b215e5226463cd4f861e903270e34911dae734e

ciscoLEAP.txt

Change Mirror Download
1 month of audits by l33t security companies: No vulnerabilities
1 month of architecture research by CCIE's: No vulnerabilities
2 days of hacking by DaBubble, Bishop, and Evol: Root.
There's some things that fackers should audit (WEBAPPS) for everything
else, get a real hacker.

If you can't get the POC to work, if you don't like that there's no gui,
or if you don't understand this message send your 2weeks and get a job
making my starbucks coffee. Those people seem so heavily worked that
there must be a need for more of them. There is not a need however, for
more of you.

All,

Cisco leap is an authentication mechanism employed on high grade
wireless access points. The mechanism is used to replace WEP and was
supposed to offer greater security against malicious threat agents. I
have been watching the list today, and I saw a whole lot of FUD regarding
the matter of insecurities present in the protocol. I thought you all
would have known by now. Apparently my assumption is incorrect. Attached
is a POC attack for LEAP implementations utilizing Microsoft's Active
Directory as the authentication store.

Cisco LEAP authenticates users to the wireless access point via a
password. This password is authenticated against a back-end radius server
via a Challenge-Response protocol. The protocol is such:
1.) The Wireless client sends an authentication request;
2.) The AP Acknowledges request with an 8 byte challenge;
3.) The Wireless client computes the response by:
a.) MD4 Hashing the password producing a 16 byte hash;
b.) Padding the hash with 5 nulls producing 21 bytes;
c.) Splitting the resulting 21 bytes into 7 byte chunks;
d.) Iterating through the 7 byte chunks, des encrypting
the challenge as plain-text with the 7-byte chunk
as the key.
e.) Concatenating the resulting cipher text producing 24
bytes
4.) The client then sends the resulting 24 bytes as the challenge
response;
5.) The back-end systems iterate through the same processes and
check for a match; then
6.) If the two match, authentication has been accomplished.

Does anyone smell MS-CHAP? Attacks on this protocol are such:

1.) The complexity of finding the DES key of the last chunk is 255^2. Upon
finding this, the malicious threat agent can cycle through a precomputed
database of commonly used passwords, matching on the last two bytes of the
hash. This is a reduction of the complexity for a dictionary attack.

2.) From 1: this also reduces the complexity of a brute force search for
the key

3.) A chosen plain-text attack utilizing rainbow tables may be used by
impersonating an access point. The initial pre-computation complexity
is large, but manageable for any good hacker.

These attacks are based on the fact that if you didn't know about Cisco
leaps insecurities you're not going to know about the S-Box decoding
optimization on 56bit DES, nor how to reverse MD4 using genetic algorithms.
If no fackers post to bugtraq within the next 7 working days, I'll release
these as well.

<RANT>
The link to http:/www.unstrung.com/document.asp?doc_id=41185 leads me to
the conclusion that Wright, is a Facker (Fake Hacker). People like him
are dangerous to the information security community. As said in a rap
song, "If you don't give a sh** then don't throw it up". If you're not a
hacker then don't pretend to be, and don't run security audits. You're only
filling up my bugtraq e-mail box with rants about the next CSS
vulnerability, or SQL-injection vulnerability. These are not things worth
posting. Things that are worth posting include:
1.) New techniques
2.) Esoteric propreitary technologies's shortcomings (NOT WEBAPPS)
3.) etc.
It is people that are like this that prevent other people from sharing
their research. It takes me 2 minutes to find a CSS vulnerability, and 1
minute to find an SQL injection vulnerability so why are you going to post
that? Facker's need to remain like low-key and disappear.
</RANT>

-Evol
May I have your attention please
I repeat, may I have your attention please
Will the real Evol please stand up...
We're going to have a problem here

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close