Posted on 08/03/2006 12:51:29 AM PDT by Swordmaker
If you want to grab the attention of a roomful of hackers, one sure fire way to do it is to show them a new method for remotely circumventing the security of an Apple Macbook computer to seize total control over the machine. That's exactly what hackers Jon "Johnny Cache" Ellch and David Maynor plan to show today in their Black Hat presentation on hacking the low-level computer code that powers many internal and external wireless cards on the market today.
The video shows Ellch and Maynor targeting a specific security flaw in the Macbook's wireless "device driver," the software that allows the internal wireless card to communicate with the underlying OS X operating system. While those device driver flaws are particular to the Macbook -- and presently not publicly disclosed -- Maynor said the two have found at least two similar flaws in device drivers for wireless cards either designed for or embedded in machines running the Windows OS.
(Excerpt) Read more at blog.washingtonpost.com ...
This is serious... for both PCs and Macs.
I don't think this is FUD.
If you want on or off the Mac Ping List, Freepmail me.
Thanks for the heads up!
Another reason to use linux.
Could be... but the last paragraph of the article bears repeating:
I should note here that while the bad guys may or may not have known about these security weaknesses for some time, there is not a single shred of evidence that these flaws have been exploited "in the wild" (as security companies like to say). That said, it might not be terrible idea to take advantage of the button your laptop that allows you to turn off the machine's constant search for wireless networks when you're not actively trying to go online.
Mine always is... because I have been always suspicious of such an exploit being possible. The good thing is that this is just another proof of concept... and it isn't in the wild... yet.
Apparently, the exploit isn't platform dependent... seems to be in the wireless cards themselves and their drivers. I would not be too sure that Linux isn't vulnerable as well.
Associated Press -
The researchers demonstrated the vulnerability at a computer-security conference, showing how to take complete control of a MacBook from Apple Computer Inc. But the two researchers, David Maynor, 28, and Jon Ellch, a 24-year-old who prefers to go by his hacker handle Johnny Cache, said the technique will work on an array of machines, including those that run Microsoft Corp.'s Windows and the free Linux operating system.
I'll speculate that a common code base exists for the Windows, Linux and Mac drivers for the Atheros chipset, which allows the exploit to access all of those systems.
http://madwifi.org/browser/trunk/net80211/ieee80211_scan_sta.c
I don't know if this would help prevent the problem, but as a countermeasure on a Mac with Airport, I'd suggest setting the "Join Preferred Networks" and "Ask Before Joining Open Networks" options.
lol! but .. but.. but...
I'm going back to pad and pencil.
Sounds like somebody found a flaw in a certain popular wireless chipset. What does the Mac use?
One article I found said that they had found the same vulnerability in nine chipsets...
From MacSlash...
Well (they) definately found a security flaw... but couple things to remember before everyone starts running for the hills. The Flaw requires a few things:I would guess a patch is already in the works, so hopefully the problem is corrected before it starts widespread panic!
- It required use of a third party wireless card attached to the MacBook (I doubt many people would opt for that over the built in card)
- You need to actively decide to join this unknown access point (many people will likely hop on any free WiFi... better think twice!)
- The flaw is in the wireless driver for that third party wireless card (still Apple's respsonsibility I guess if they provided the drivers with OS X) [Latest Reports are that although they used a 3rd party card, Apple's own internal wireless would also be vulnerable. Why then use the 3rd party card????? - Swordmaker}
- He doesn't say if he actually got root access or just user level... regardless he could still mess with your personal stuff! [Latest Reports are that he did not... and he already knew the passwords and login info for the Macbook! - Swordmaker}
- This is NOT limited to just Apple...
- it is buggy THIRD PARTY software drivers that got p0wned. So yes, Windows users are vulnerable to the same flaw.
There's more:
Anyone who read this article will also note that the "hackers" also had to install a "root kit" on the MacBook prior to running the hack. With no know exploits for OS X in the wild, how is this going to happen? // The MacCast. For Mac Geeks, by Mac Geeks // Find it @ maccast.com
The only FUD is that they chose to conveniently choose to exploit the attack on a MacBook instead of a PC. Don't think that the choice was by accident.
Either way - someone needs to close up some holes!
Ugh... right after I post, I see that you had answered with more info....
So - I never use a third-party wireless card (Airport Extreme - why anything else??)
I don't use 3rd party drivers.
Root Kit???? What the heck would I need to install that for?
Seems to me that the most "vulnerable" to such a hack would be the same type person that would be an exploiter of such a vulnerability - and would know how to counter it....
Yes it is. they used a third-party WiFi card and driver. That's haram.
bump
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.