Lure10 Exploiting Wi-Fi Sense for MITM on Windows devices

Lure10 Attack over Wi-Fi Sense: Karma has long been a key man-in-the-middle attack used for authorized wireless network security assessments. However, many modern operating systems and routers provide effective countermeasures, and thus need other approaches to cheating wireless clients.Wi-Fi Sense

We introduce you to Lure10: a new attack that takes advantage of the Windows Wi-Fi Sense feature.

What is Wi-Fi Sense?

Wi-Fi Sense, which is enabled by default in and Windows Phone 8.1, is a feature that automatically connects users to open wireless networks that they know (have reconnected to).

Based on the information gathered from various Windows devices that were connected to these open networks, Microsoft evaluates whether they provide a good quality connection and if they do, it adds them to the list of hotspots proposed by Wi-Fi Sense.

Wi-Fi Sense will select and show the user a network when within range, will automatically accept its terms of use and automatically link it to this network.

The Lure10 technique

The success of the attack presented by the security technician George Hadjisofronius at this year's conference Hack in the Box in Amsterdam is based on the following:

  • The victim's device is tricked into believing it is within the geographic area of an open wireless network labeled Wi-Fi Sense
  • The attacker successfully interrupts the existing Wi-Fi connection of the victim's device (by falsifying DEAUTH frames) and
  • It successfully mimics this Wi-Fi Sense network (a network with the same ESSID - extended service set identifier).

Wi-Fi Sense

This last condition can be achieved by finding a Wi-Fi Sense network located in an area relatively close to the victim (eg in his home country) and by collecting ESSID (eg “AIRPORT_FREE”).

At the same time, the attacker should also collect the BSSIDs of other wireless networks in the same area, as they are also used by the Windows discovery service to determine the location of a device.

With these BSSIDs, the attacker can fool Windows that think the device is in the area of ​​the impersonation network (the first condition of the attack).

Once the attacker manages to accomplish these steps, it starts sending beacon frames with the ESSID of the impersonated Wi-Fi Sense network. This is enough to automatically connect the victim's device if the shared WLAN is present in the list of preferred networks and the list of available networks.

But even this last situation can be achieved. You can see the researcher presentations for more details.

How To Protect Yourself?

The Lure10 attack technique has been added to the latest version of the open source tool Wifiphisher Rogue Access Point, developed by George Hatzisoforion.

The researcher said that Microsoft has been informed about this issue, has recognized its seriousness but has not yet taken steps to correct it.

You can protect yourself from this attack by disabling Wi-Fi Sense on your device.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).