Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Secure your wireless networks, or else
ZDNet ^ | Friday, October 15 | Robert Vamosi

Posted on 10/18/2004 4:38:28 PM PDT by gitmo

snip

Fictional scenario

At this year's Black Hat Briefing in Las Vegas, the annual Hacker court involved a scenario where a houseboat sailing up and down the Potomac River was able to use various unsecured wireless networks to access troop deployment plans from the Naval Academy at Annapolis. Presented in the form of a mock court case--including a real live federal court judge--the prosecution laid out how it identified various Web addresses used to launch the intrusion on the Naval Academy. However, when federal agents arrived at the homes matching the Internet addresses, they found the computer hard drives to be lacking any evidence of the crime. All of the homes, however, had 802.11 networks that were not secure, and all bordered the Potomac. Through some silly testimony that I won't explain here, prosecutors ultimately revealed that a houseboat sailing on the river had the ability to receive wireless signals from shore; the occupants of the boat had used the onshore wireless networks to commit their crimes. The prosecution provided forensic evidence of the houseboat's laptop, which contained the incriminating data.

Think that scenario is pretty far-fetched? Not so. snip

(Excerpt) Read more at reviews-zdnet.com.com ...


TOPICS: Crime/Corruption; Extended News; Government; Technical
KEYWORDS: cybersecurity; fbi; hacker; internet; security; terrorist; wireless
Navigation: use the links below to view more comments.
first previous 1-2021-4041-57 last
To: Musket

"Can a MAC address be spoofed?"

Yes. Most Wireless Routers do this. The cable or dsl company only wants one computer per link. The router spoofs the MAC address of your compute so that all packets look like they come from one MAC address.

You have to know the MAC address to begin with to spoof it.


41 posted on 10/18/2004 5:49:13 PM PDT by IamConservative (People with courage and character always seem sinister to the rest.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: PeterFinn

So what are you going to set it to?

With 6 Hex digits, you have a lot of combinations to try
before you hit on one that I have in my allowed Mac list.

Like I say, this is neither easy, quick, or simple. You have to guess a mac that is alredy in my list, but not currently in use.


42 posted on 10/18/2004 5:50:21 PM PDT by konaice
[ Post Reply | Private Reply | To 39 | View Replies]

To: ItisaReligionofPeace

"I'll take my chances. Can't beat sitting on the couch, watching Fox, and FReeping on a laptop..."

You lookin' in my window? Freepin on a laptop watchin' O'Reilly while I write this post.


43 posted on 10/18/2004 5:51:28 PM PDT by IamConservative (People with courage and character always seem sinister to the rest.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: konaice
Your point taken as well.

Upon reading your post it looked (to me) as though you were speaking in generalities.
You have now pointed to the specifics. I stand corrected.

(However, I still stand by the original intent of my post. That being that laws and regulations have never stopped the dedicated criminal mind.)

44 posted on 10/18/2004 5:54:00 PM PDT by Fiddlstix (This Tagline for sale. (Presented by TagLines R US))
[ Post Reply | Private Reply | To 37 | View Replies]

To: Musket

cloned.


45 posted on 10/18/2004 5:54:46 PM PDT by e_castillo
[ Post Reply | Private Reply | To 10 | View Replies]

To: Fiddlstix

I'm running linux on my cb, breaker breaker.


46 posted on 10/18/2004 6:33:22 PM PDT by stainlessbanner (For Liberty!)
[ Post Reply | Private Reply | To 44 | View Replies]

To: stainlessbanner
I'm running linux on my cb, breaker breaker.

Damn. You're really getting too modern for me.
(I'm still using CP/M on mine.)

47 posted on 10/18/2004 6:44:05 PM PDT by Fiddlstix (This Tagline for sale. (Presented by TagLines R US))
[ Post Reply | Private Reply | To 46 | View Replies]

To: tdadams

I've yet to see someone physically access a hardwired network without making a hardwired connection.

No matter what's done with wireless some hacker will find a way to break through. Why do you think fiber's so popular on secure communications?


48 posted on 10/18/2004 6:59:24 PM PDT by Bogey78O (John Kerry: Better than Ted Kennedy!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Fiddlstix

Not if you use NetBeui on your LAN.


:O)

P


49 posted on 10/18/2004 6:59:43 PM PDT by papasmurf (G'me 4 more years of floppy ears!!!)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Bogey78O

It really matters very little whether you're using a wired or wireless network. Most networks have some vulnerability and there is someone out there who knows how to get in. Even on systems I've worked on that I thought were very secure and not prone to exploitation, hackers have gotten into.

It is not a problem inherent to wireless technology. It's a problem inherent to software design flaws and the endless and creative ways people find to exploit vulnerabilities.


50 posted on 10/18/2004 7:08:48 PM PDT by tdadams ('Unfit for Command' is full of lies... it quotes John Kerry)
[ Post Reply | Private Reply | To 48 | View Replies]

To: papasmurf
Thank you for the info

Please Click Here

51 posted on 10/18/2004 7:27:18 PM PDT by Fiddlstix (This Tagline for sale. (Presented by TagLines R US))
[ Post Reply | Private Reply | To 49 | View Replies]

To: sneaky_goofy
So I turned off WEP but SSID broadcast is off, MAC address filtering is on. The only people who can uncloak your SSID hackers using Linux or BSD OS.

All it would take is to bring along another AP. It would link up with yours, giving any computer free access through this rogue AP. And, as a bonus, it would provide all your MAC addys and the SSID of your network in its routing table.

Oh, and it could care less if you are running WEP or WPA. APs don't authenticate each other.

If you truly want to secure your APs you must use RADIUS.

52 posted on 10/18/2004 8:03:32 PM PDT by Antonello
[ Post Reply | Private Reply | To 29 | View Replies]

To: Antonello
Most wireless routers let you turn off bridging and even if you want to permit other APs to connect, if you are using MAC filtering then the AP of the other access point has to be entered into the filter table or they will cannot connect.

I'm not disputing the superiority of the more "industrial strength" solutions such as RADIUS which you suggest, though.

53 posted on 10/18/2004 10:17:45 PM PDT by Weirdad (A Free Republic, not a "democracy" (mob rule))
[ Post Reply | Private Reply | To 52 | View Replies]

To: tdadams

Not vulnerable to network outages, impervious to electronic interference, and capable of moving along well-established travel routes.

54 posted on 10/18/2004 10:41:39 PM PDT by kezekiel
[ Post Reply | Private Reply | To 16 | View Replies]

To: Antonello
If you truly want to secure your APs you must use RADIUS.

What's your take on this No-Hardware (Web-Based) Radius Server for a small home-based wireless network?

The price seems reasonable, at least.

55 posted on 10/19/2004 9:07:12 AM PDT by browardchad
[ Post Reply | Private Reply | To 52 | View Replies]

To: konaice
If your firewall-router-ap has Mac Address lists, its the best security option you can use.

Security is a combination of measures.

  1. Definitely use MAC filtering.
  2. Set a good, strong WEP key.
    • Use hexidecimal.
    • Do not use any names.
    • Do not use words that can be looked up in a dictionary.
  3. Change your keys periocically.
    • I left a laptop running kismet on the living room couch for three months.. in all of that time it logged only one "interesting packet", which still wasn't enough to guess the key, and I run a fairly busy WiFi network here.
    • I now change my keys every sixty days.

My "access point" is actually a WiFi card in my Linux firewall box. The firewall rules deny access to any MACs which aren't in the approved list, even if the key is right. The firewall also logs all intrusion attempts.

A couple of years ago I logged many attempts to get into my network, and I presumed it was a neighbor up the block or somebody cruising hotspots in a car. They finally gave up after a few months. I subsequently toured the neighborhood myself, using NetStumbler, and found three wide-open APs. I guess the intruders just moved on to easier targets...

56 posted on 10/20/2004 7:34:50 AM PDT by TechJunkYard (http://scaryjohnkerry.com/)
[ Post Reply | Private Reply | To 5 | View Replies]

To: tdadams
Who needs a stupid computer when I've got a perfectly good typewriter

I can go one further ... instead of the internet ... how about a system of strings and tin cans

57 posted on 10/20/2004 7:38:40 AM PDT by clamper1797 (This Vietnam Vet is NOT Fonda kerry)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-57 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson