透過您的圖書館登入
IP:18.226.28.197
  • 學位論文

公眾無線網路之網頁認證機制的中間人攻擊漏洞

MITM (Man in the Middle) Vulnerability in Public WLANs Guarded by Captive Portals

指導教授 : 吳坤熹

摘要


無線網路帶來大眾的便利性,使得許多公眾區域也都開始提供無線網路的服務,讓平時在外移動或是用餐的用戶使用。由於許多上班族也常在外透過網路處理工作上的事務,因此,公眾無線網路的安全性也較以往更重要。目前提供公眾無線網路的服務商大部份都是採用網頁認證機制的方式,要求使用者透過網頁瀏覽器提供認證的帳號密碼;使用者通過認證前,並無法連上網路。此認證方式雖然簡單,但可有效率地管理使用者,因此廣為被國內外業者採用。 在此論文中,我們將說明目前採用網頁認證的公眾無線網路存在中間人攻擊的弱點。駭客只要在不被發現的情況下送出欺騙的封包,便可以在沒有通過網頁認證的情況下成功地連上網路。論文中並透過C語言實作,證明該漏洞的存在。

並列摘要


A lot of public areas provide WLAN service for nomadic users so that they can surf Internet or work online even when they are out of office. Therefore, the security of public WLANs is more important than the past. Nowadays many public WLAN service providers authenticate users with the Captive Portal. The Captive Portal uses a webpage to request a user to authenticate himself by providing his own username and password. This security mechanism proved to be simple and effective because users cannot access Internet before they get authenticated. However, in this thesis, we shall illustrate that public WLANs which are guarded by Captive Portal, are vulnerable to man-in-the-middle (MITM) attacks. Therefore, a hacker can carefully send out some spoofing packets and take advantage of the public WLAN to access Internet without being authenticated. We show the vulnerability by both protocol analysis and a real implementation in C programs.

並列關鍵字

ARP Spoof Captive Portal MITM Wireless Security

參考文獻


[1] 台灣網路資訊中心網路 -- 網路使用調查網站 -- 台灣網路使用調查報告,2010年1月
[http://www.twnic.net.tw/download/200307/200307index.shtml]
[2] Haidong Xia, Jose Brustoloni, ”Detecting and Blocking Unauthorized Access in Wi-Fi Networks”, 3rd International IFIPTC6 Networking Conference, Athens Greece, May 2004。
[3] David C. Plummer, ”An Ethernet Address Resolution Protocol”, RFC 826, Nov. 1982。
[4] Sean Whalen, Sophie Engle, Dominic Romeo, ”An Introduction to ARP Spoofing”, Apr. 2001。

延伸閱讀