04 July 2023

Snappy: A tool to detect rogue WiFi access points on open networks

This functionality was incorporated into a Python script called Snappy that was published on Trustwave's GitHub repository and made available for free.

Snappy - A New Tool to Detect Fake WiFi Access Points


Snappy: A tool to detect rogue WiFi access points on open networks

 
  • July 2, 2023
  •  
  • 10:17 AM
  •  

WiFi

Cybersecurity researchers have released a new tool called 'Snappy' that can help detect fake or rogue WiFi access points that attempts to steal data from unsuspecting people.

Attackers can create fake access points in supermarkets, coffee shops, and malls that impersonate real ones already established at the location. This is done to trick users into connecting to the rogue access points and relay sensitive data through the attackers' devices.

As the threat actors control the router, they can capture and analyze the transferred data by performing man-in-the-middle attacks.

Trustwave's security researcher and wireless/RF tech enthusiast Tom Neaves explains that spoofing the MAC addresses and SSIDs of legitimate access points on open networks is trivial for determined attackers.

The devices of those who revisit the locations of open wireless networks they previously connected to will automatically attempt to reconnect to a saved access point, and their owners will be oblivious to the fact that they connecting to a malicious device.

Snappy to the rescue

Neaves developed a tool that addresses this common risk, helping people detect if the access point they're using is the same as the one they used the last time (and every time) or if it might be a fake or rogue device.

By analyzing Beacon Management Frames, he found certain static elements such as the vendor, BSSID, supported rates, channel, country, max transmit power, and others that vary between different 802.11 wireless access points but are consistent for a specific access point over time.

Elements that characterize an access point
Elements that characterize an access point (Trustwave)
The researcher figured that he could concatenate these elements and hash them with SHA256 to create a unique signature for each access point, which could be used by a scanner tool to generate matches and mismatches.
Matches mean that the access point is the same, hence trustworthy, while mismatches on the signature would mean that something has changed, and the access point might be rogue.
Apart from the mechanism to generate SHA256 hashes of wireless access points, Snappy can also detect access points created by Airbase-ng, a tool that attackers use to create fake access points to capture packets from connected users or even inject data into their network traffic.
This functionality was incorporated into a Python script called Snappy that was published on Trustwave's GitHub repository and made available for free.
Snappy in action
Snappy in action (Trustwave)
Executing Python scripts on laptops should be straightforward as long as Python is installed, but users of mobile devices will have to go the extra mile to source specific interpreters and emulators.
Android device owners may use PydroidQPython, or Termux to run Python scripts on their phones, while iOS users can choose between PythonistaCarnets, and Juno.
Hopefully, Trustwave will consider publishing the tool in a more usable form for the wider audience soon.

Related Articles:

Free Akira ransomware decryptor helps recover your files

Brave Browser boosts privacy with new local resources restrictions

CISA orders federal agencies to secure Internet-exposed network devices

DuckDuckGo browser for Windows available for everyone as public beta

CEO guilty of selling counterfeit Cisco devices to military, govt orgs

No comments:

Reports: Biden allows Ukraine to use US long-range missiles for strikes ...

  France 24 13 hours ago Search inside image No concrete evidence on who fired missile, Poland's president says Visit