After I’ve tried setting up a rogue access point using squid and hostapd I’ve seen that KDE’s network-manager offers host access-point functionality. How easy is it to combine this with BURP for an SSL man-in-the-middle attack? Well some GUI clicking and 3 command line invocations..
I bought two USB 802.11n wireless adaptorts on deal extrem, so far both of them work as an access point:
- a small whitish one for $5.55, perfect for working “undercover”. This was supported by a standard Ubuntu 13.10 installation.
- a larger one for $8.92, should have a better reception as it has an antenna (you see that I’m a software guy). Be aware that you’ll need a recent Kernel for this version, Kernel 3.13 in the upcoming Ubuntu 14.04 supports it.
Setting up the Hardware
Hostap was rather hard to setup, how is KDE faring? You can add a new “Wireless (shared)” network connection within the network manager (this was done with the network-manger in KDE 4.12, KDE 4.13 looks similar).
First of all setup the wireless network:
Then make sure that IPv4 is enabled and shared (you can disable IPv6 BTW):
For bonus points, you can automatically use an anonymous VPN service for all outgoing traffic:
And that’s it on the access point side.
Setting up BURP
BURP supports SSL MitM-Operation out-of-the-box. You just have to start it, by default it listens on Port 8080 (BTW: I’m using the command line parameter to force usage of IPv4, don’t know but Java always binds on IPv6 addresses on my network):
After BURP starts navigate to it’s proxy’s history where you will see all captured requests after the final configuration step:
It’s also quite interesting how much background traffic an Android phone makes. I can’t believe that sending data periodically every 5 minutes is the best thing ever for my battery.
Use iptables to forward traffic to BURP
Now that we have an access-point and an listening interception proxy we just need to forward traffic from the former to the latter. I’m just forwarding all traffic, an attacker might only forward http (port 80) and selected https (port 443) connections to the interception proxy. To forward one port just use the following iptables script:
And that’s it.