Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Maybe Better If You Don’t Read This Story on Public WiFi
Medium.com ^ | 15 Oct 2014 | Maurits Martijn

Posted on 10/18/2014 7:52:38 AM PDT by GonzoII

We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled.

In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones.

Wouter removes his laptop from his backpack, puts the black device on the table, and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors....


(Excerpt) Read more at medium.com ...


TOPICS: Chit/Chat; Computers/Internet; Society; Travel
KEYWORDS: computing; hacker; hacking; internet; wifi
Navigation: use the links below to view more comments.
first 1-2021-23 next last
Heads up!
1 posted on 10/18/2014 7:52:38 AM PDT by GonzoII
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

Tech ping


2 posted on 10/18/2014 7:55:04 AM PDT by raybbr (Obamacare needs a death panel.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GonzoII

Sounds like they were logged into their Facebook accounts and he just followed the traffic to their pages and noted the info. He probably just used a network monitoring tool to do it. There are plenty of them out there. Some get pretty expensive tho...


3 posted on 10/18/2014 7:57:20 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 1 | View Replies]

To: jsanders2001

Read the whole article. Bottom line. He uses a device which creates a network that people can log into and he can name it whatever he wants to so if you’re at a Starbucks and the network name is “Starbucks” but you see another network with a name like “Starbuckz” you better know which one is the correct one because if you log into the hacker’s network he can see all the data that our device is receiving and sending including your passwords. Clever little trick and simple but effective.


4 posted on 10/18/2014 8:07:52 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 3 | View Replies]

To: GonzoII

BTTT


5 posted on 10/18/2014 8:08:35 AM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GonzoII

“Wouter” is a cool name.


6 posted on 10/18/2014 8:15:24 AM PDT by moovova
[ Post Reply | Private Reply | To 1 | View Replies]

To: jsanders2001

Sounds like a form of “spoofing” to me.


7 posted on 10/18/2014 8:15:53 AM PDT by Tonytitan
[ Post Reply | Private Reply | To 4 | View Replies]

To: GonzoII
We see that one visitor has the gay dating app Grindr installed on his smartphone. We also see the name and type of the smartphone he’s using (iPhone 5s).
8 posted on 10/18/2014 8:18:58 AM PDT by Jeff Chandler (Conservatism is the political disposition of grown-ups.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GonzoII

>>We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled.<<

My birthplace and schools are no where on my laptop nor on the interwebz. I keep saying only a fool puts any personal data on FB. This reaffirms that.

Likewise I don’t use Google, I use StartPage.

The old “Wifi Spoof” is one of the oldest hacks. But people still fall for it.


9 posted on 10/18/2014 8:25:13 AM PDT by freedumb2003 (Zimmerman, Brown, Fast & Furious, IRS harassment, Philly ignorance: holdering in 1st degree)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GonzoII

I lay all of this at the feet of Microsoft. In their zeal to catch and destroy Netscape, they eschewed securing their software architecture and how it could have secured the hardware. By the late 90s they were irrevocably committed and couldn’t go back and secure everything.


10 posted on 10/18/2014 8:40:31 AM PDT by Bryan24 (When in doubt, move to the right..........)
[ Post Reply | Private Reply | To 1 | View Replies]

FReepers, Let's go!
Everyone needs to donate!

All contributions are for the current quarter expenses.


11 posted on 10/18/2014 8:42:35 AM PDT by RedMDer (May we always be happy and may our enemies always know it. - Sarah Palin, 10-18-2010)
[ Post Reply | Private Reply | View Replies]

To: Tonytitan

Indeed. His black box is probably nothing ,ore than a smart phone providing a ‘hot spot’ for people to use for wi fi


12 posted on 10/18/2014 8:43:45 AM PDT by Pikachu_Dad (Impeach Sen Quinn)
[ Post Reply | Private Reply | To 7 | View Replies]

To: jsanders2001

Who sends passwords in clear text?


13 posted on 10/18/2014 8:44:37 AM PDT by Darth Reardon (Is it any wonder I'm not the president?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: jsanders2001

Sounds like a Man in the Middle attack as well.


14 posted on 10/18/2014 8:55:12 AM PDT by theBuckwheat
[ Post Reply | Private Reply | To 4 | View Replies]

To: jsanders2001

Actually, it is far more insidious. While he clones the nearby hotspot (same name and credentials) he also listens for attempts to connect to known networks which were not secured. Been to Disney World? Open WiFi ports there, and it just appeared in downtown Phoenix. Betcha a whole bunch of phones, laptops and computers will connect, and start sending data through the network. Some DNS spoofing, and you credit union app likely just shared your account credentials.

Clear any unsecured hotspots from your connection list (Vons, Statbucks, Hilton..) as soon as you are done with them. And if you frequent such hotspots, absolutely look into and use a VPN tunnel to a secure computer to act as your gatekeeper (and obscure your data from sniffing at the hotspot.)

Just imagine if this technology was used against Obama protesters by a liberal hacker -they might find out your Facebook account, where you work, your church.. They could cause pronlems, maybe lie to your boss, insert child porn and report you for harassing children.

Really makes you think.


15 posted on 10/18/2014 9:19:50 AM PDT by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: jsanders2001

Wifi spoofing, he creates Starbucks with the same password and a far stronger signal on a different band. Then jam the real Starbucks band. Every laptop will automatically lock to the clear signal and relog.


16 posted on 10/18/2014 9:24:11 AM PDT by American in Israel (A wise man's heart directs him to the right, but the foolish mans heart directs him toward the left.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: moovova

Wouter” is a cool name.

A compond name of “Wanker” & “Router”?... perfect for a German hacker


17 posted on 10/18/2014 9:39:53 AM PDT by tophat9000 (An Eye for an Eye, a Word for a Word...nothing more)
[ Post Reply | Private Reply | To 6 | View Replies]

To: GonzoII

It is a long and detailed article that conveys no useful information aside from wi-fi use is highly risky, unless.......

Unless what, what security measures?


18 posted on 10/18/2014 9:58:57 AM PDT by ansel12 ( LEGAL immigrants, 30 million 1980-2012, continues to remake the nationÂ’s electorate for democrats)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GonzoII

On the rare occasion I use a WiFi hotspot I didn’t set up myself, I open a VPN connection before doing anything.

I have OpenVPN clients on all of our phones, tablets, and laptops.


19 posted on 10/18/2014 10:06:46 AM PDT by justlurking (tagline removed, as demanded by Admin Moderator)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jeff Chandler

I see what you did there. LOL.


20 posted on 10/18/2014 11:14:16 AM PDT by Moltke ("The Press, Watson, is a most valuable institution if you only know how to use it.")
[ Post Reply | Private Reply | To 8 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson