Fingerprinting Wireless Drivers 29
jfleck writes with news that researchers at Sandia National Laboratories have released a paper on a technique they have developed for passively fingerprinting wireless device drivers (PDF). The researchers comment, "This technique is valuable to an attacker wishing to conduct reconnaissance against a potential target so that he may launch a driver-specific exploit." They sketch the loose language in the 802.11 standard describing the way client devices should probe for access points. Because probing is not spelled out in any detail, the authors say, "...implementing active scanning within wireless drivers [is] a poorly guided task. This has led to the development of many drivers that perform probing using slightly different techniques. By characterizing these implementation-dependent probing algorithms, we are able to passively identify the wireless driver employed by a device." This technique beats Wi-Fi Fingerprints by a country mile.
Um. (Score:1, Funny)
Because beating them by a city mile just wasn't quite enough.
Re: (Score:1)
easy way (Score:2)
Re: (Score:2)
That said, I'm sure more ways will be discovered to fingerprint wi-fi devices. I do hope at some point soon it will stop being newsworthy when a new one is discovered.
Re: (Score:2)
Cool links. [blogspot.com]
By a country mile? (Score:5, Informative)
Error: Incompatable Types (Score:5, Informative)
OTOH, WiFi Fingerprinting monitors the fluctuations in the radio output caused by minute differences in the hardware(.04% differences between transistors, etc.) which give every single piece of wifi hardware a unique signature. Personally, I'd say that WiFi fingerprinting is cooler and useful for something other than hacking since it can defeat MAC spoofing. I don't know why the submitter thinks that determining the driver used instead of unique characteristics of the hardware is better by a country mile.
Re: (Score:2)
idiot (Score:2)
Parallel research (Score:1)
Re: (Score:2)
Ways to Prevent Fingerprinting (Score:3, Insightful)
Drivers should include this one anyways to be nice to laptop users. Give the users control of wether active probing is enabled or not. Access points send out announcements by default so you should be able to passively find most access points while conserving power and remaining unidentifiable.
Just make the time frame duration for probing requests part of the 802.11 standard and this problem goes away.
They say that this isn't a good solution since you'll eat up more power and bandwith. Additionally, signal processing algorithms are getting good at filtering out noise.
For the hacker elite. Get your own copy of some OSS wifi drivers and modify the timing in the probing algorithm so that you have your own unique fingerprint and no one knows what the heck you are running.
Another not so great solution. Their detection method maps the radio signal to your MAC. So if you have two devices with the same MAC both within scanning radius of the fingerprinter then it will get messed up. Still, not a real solution.
One of the weaknesses of the fingerprinting method is that it cannot tell what version driver you are running. More secure drivers and better driver patching mechanisms will narrow this attack vector in the future.
Re: (Score:2)
One of the weaknesses of the fingerprinting method is that it cannot tell what version driver you are running. More secure drivers and better driver patching mechanisms will narrow this attack vector in the future.
That's only true assuming the probing method doesn't change between patches. Granted, usually it *won't*, but there are probably going to be cases cases where does.
Why Bother? (Score:2)
You want tight security on something? Disconnect all the transmitters, receivers and ethernet cables. This is an utter waste of government money...
Oh... so ***that's*** why they are wasting time on this...
Government funded research in a government run lab. Better to give the money to universities, at least there useful things (sometimes) happen.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I may be missing something, but .... (Score:4, Interesting)
A table of MAC address ranges and manufacturers would yield a much more specific data point about the hardware, implying a short list of potential drivers.
I guess it does give you the added info of a potential OS id (Linux / OSX / Windows) but in the typical scenario of a public (unencrypted) wireless system, sniffing application layer data (an HTTP User-Agent header springs to mind) provides a more precise way to get that data.
Re: (Score:1)
OTOH, I'm surprised (and happy) to see that my ubuntu is able to use the broadcom's reverse-engineered kernel driver + kismet to make passive sniffin'with very good results. This is something that even the windows driver is not able to do.
Those pesky drivers! (Score:2)
Never mind.
--Rob
Some info (Score:1)