WiFi

Cybersecurity researchers have released a new tool called 'Snappy' that can help detect fake or rogue WiFi access points that attempts to steal data from unsuspecting people.

Attackers can create fake access points in supermarkets, coffee shops, and malls that impersonate real ones already established at the location. This is done to trick users into connecting to the rogue access points and relay sensitive data through the attackers' devices.

As the threat actors control the router, they can capture and analyze the transferred data by performing man-in-the-middle attacks.

Trustwave's security researcher and wireless/RF tech enthusiast Tom Neaves explains that spoofing the MAC addresses and SSIDs of legitimate access points on open networks is trivial for determined attackers.

The devices of those who revisit the locations of open wireless networks they previously connected to will automatically attempt to reconnect to a saved access point, and their owners will be oblivious to the fact that they connecting to a malicious device.

Snappy to the rescue

Neaves developed a tool that addresses this common risk, helping people detect if the access point they're using is the same as the one they used the last time (and every time) or if it might be a fake or rogue device.

By analyzing Beacon Management Frames, he found certain static elements such as the vendor, BSSID, supported rates, channel, country, max transmit power, and others that vary between different 802.11 wireless access points but are consistent for a specific access point over time.

Elements that characterize an access point
Elements that characterize an access point (Trustwave)

The researcher figured that he could concatenate these elements and hash them with SHA256 to create a unique signature for each access point, which could be used by a scanner tool to generate matches and mismatches.

Matches mean that the access point is the same, hence trustworthy, while mismatches on the signature would mean that something has changed, and the access point might be rogue.

This functionality was incorporated into a Python script called Snappy that was published on Trustwave's GitHub repository and made available for free.

Apart from the mechanism to generate SHA256 hashes of wireless access points, Snappy can also detect access points created by Airbase-ng, a tool that attackers use to create fake access points to capture packets from connected users or even inject data into their network traffic.

Snappy in action
Snappy in action (Trustwave)

Executing Python scripts on laptops should be straightforward as long as Python is installed, but users of mobile devices will have to go the extra mile to source specific interpreters and emulators.

Android device owners may use Pydroid, QPython, or Termux to run Python scripts on their phones, while iOS users can choose between Pythonista, Carnets, and Juno.

Hopefully, Trustwave will consider publishing the tool in a more usable form for the wider audience soon.

Related Articles:

NSA shares zero-trust guidance to limit adversaries on the network

Hackers abuse QEMU to covertly tunnel network traffic in cyberattacks

Citrix, Sophos software impacted by 2024 leap year bugs

White House urges devs to switch to memory-safe programming languages

Apple adds PQ3 quantum-resistant encryption to iMessage