ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs

P. Meunier1, S. Nystrom1, S. Kamara1, S. Yost1, K. Alexander1, D. Noland1, J. Crane1
1Center for Education and Research in Information Assurance Security CERIAS, Purdue University, West Lafayette, IN, USA

Tóm tắt

Researching the vulnerabilities and security concerns of WinCE-based personal digital assistants (PDAs) in an 802.11 wireless environment resulted in identifying CAN-2001-{0158 to 0163}. The full understanding and demonstration of vulnerabilities would have required reverse engineering ActiveSync, which was beyond the scope of this research. Moreover, the WinCE IP stack demonstrated instabilities under a number of attacks, one of which produced symptoms in hardware. The inaccessibility of the 802.11b standard documentation was a source of delays in the research; however, we created three proof-of-concept applications to defeat 802.11b security. One collects valid MAC addresses on the network, which defeats MAC-address-based restrictions. Another builds a code book using known-plaintext attacks, and the third decrypts 802.11b traffic on-the-fly using the code book.

Từ khóa

#TCPIP #Personal digital assistants #Communication system security #Information security #Hardware #Books #Java #Portable computers #Media Access Protocol #Cryptography

Tài liệu tham khảo

frantzen, 2000, ISIC (IP Stack Integrity Checker) deraison, 2000, Nessus 10.1109/2.933495 joncheray, 1995, A Simple Active Attack Against TCP, The Fifth USENIX Unix Security Symp walker, 2000, Unsafe at Any Key Size; An Analysis of the WEP Encapsulation morris, 1985, (1985) A Weakness in the 4.2BSD UNIX TCP/IP Software, cstr 117 10.1145/381677.381695 arbaugh, 2001, Your 802.11 Wireless Network has No Clothes, Department of Computer Science