Our Blog

We are passionate about modern day security

Jun 28

Before diving into the main content of this post, let’s quickly recap the essentials of Protected Management Frames (PMF).

PMF Recap

Protected Management Frames (PMF) provide enhanced protection for various management frames in Wi-Fi networks, which are critical for the proper functioning of Wi-Fi communications. PMF primarily secures the following types of management frames:

  • Association
  • Authentication
  • De-authentication
  • Disassociation
  • Re-association

With this understanding of what Protected Management Frames (PMF) are, it’s time to explore their limitations, specifically what PMF does not protect and the implications of these limitations.

State Machine

First, let’s take a closer look at the Wi-Fi state machine:

state_machine

In the context of PMF, protection only applies to states one through three, as well as the De-authentication and Disassociation frames. With PMF enabled, it becomes impossible to inject frames and interfere directly with the state machine during these states.

This restricted scope of protection raises important considerations, which we will now explore in more detail.

Shortcomings of PMF

Despite its protections, PMF does not cover all aspects of Wi-Fi network security. For instance, PMF is not applicable to Open or WEP-protected networks. Additionally, it only protects states one through three of the state machine. An exploitable vulnerability lies in the handshake process for WPA-Personal (WPA-PSK), which occurs outside of PMF’s protection, in state four.

This means that while PMF prevents sending a de-authentication frame to force a client (STA) back into state four, there are still alternative methods to exploit this gap.

Bypassing PMF

Several strategies can bypass or circumvent PMF protections, ranging from simple to more complex approaches. Let’s discuss a few notable options.

Sit and Listen

The most straightforward method involves passive listening. To capture the Pre-Shared Key (PSK) handshake, all we need to do is listen for it. Each time a client attempts to rejoin the target network, the handshake is transmitted. This method is passive and non-intrusive, making it an effective starting point.

However, what if there are no new clients joining the network? Even in this scenario, we have other tactics at our disposal.

Evil Twin Access Points

Many devices continuously send out Probe Requests even when they are already associated with a network. By setting up an evil twin Access Point that mimics the target network, we can potentially trick a client into attempting to associate with our rogue AP. Although the association will fail, it will cause the client to disassociate from the legitimate network.

Once disassociated, the client will attempt to reconnect to the real network, allowing us to capture the handshake during this process. This method leverages the natural behavior of devices and creates an opportunity for interception.

Wi-Fi Jamming

Another approach involves actively disrupting Wi-Fi communications by creating as much radio frequency interference as possible on the channels used by the Access Point (AP) and the client (STA). This technique, known as Wi-Fi jamming, aims to force a temporary disconnection between the AP and the STA.

By jamming the communication, the devices may experience a forced timeout, after which they will attempt to reconnect. During this reconnection attempt, we can cease the jamming and listen for the handshake. This method requires more aggressive tactics but can be effective in forcing the desired behavior.

Conclusion

While PMF significantly enhances the security of Wi-Fi management frames, it is not a perfect solution. Its limitations, particularly concerning the protection of the WPA-Personal handshake, leave room for various bypass strategies. By understanding these shortcomings and the methods to exploit them, we can better appreciate the complexities and ongoing challenges in securing Wi-Fi networks.




You May Also Enjoy