New Way to ID Invisible Intruders on Wireless LANs 122
Bergkamp10 writes "Australia's University of Technology in Queensland has created a groundbreaking new system that can detect invisible intruders on wireless LANs. Wireless networks have been almost impossible to thoroughly secure as they possess no clearly defined boundaries, instead they are defined by the quality and strength of the receiving antenna. QUT Information Security Institute researcher Dr Jason Smith has invented a new system to detect eavesdropping on unencrypted networks or active hijackings of computer sessions when a legitimate user who is logged onto the network leaves the connection. Smith has created a series of monitoring techniques that when used together can detect both attackers and configuration mistakes in network devices."
Virtually impossible? (Score:5, Interesting)
Re:Virtually impossible? (Score:5, Insightful)
WPA can be cracked if someone uses a simple passphrase, and even random passphrases can be cracked without a whole lot of effort simply by renting part of a botnet, or running your own.
Using the Storm botnet as an example:
There were estimates that put the botnet as large as 50,000,000 computers. Having done WPA-PSK key cracking on a P4 1.6 laptop, it can run around 30 passphrases/second. My desktop is significantly faster, although I haven't actually tried PSK cracking on it. I'd assume probably 45 / second or more. It's not a state of the art machine, by any means. Probably about average.
So if we assume an 8 character random passphrase, (which is all a lot of people will use, so it's easier to remember) that you can type on your keyboard, (again, who's going to use Alt-Numpad combinations?) there are 96 possible keystroke characters that can make up each byte. 96^8 = 7213895789838336 possible password combinations.
Assuming 45 passphrases / second for each machine, it will take, using this botnet, just over 37 days to break that password. That's assuming the most complex password possible for 8 characters. Realistically, you can take out any special character that's not in 13375p3@k, and for most all you'd need is numbers and letters. That'll cut your time significantly.
Yes, that's only an 8 character password, which will take 96 times as long to break with only 1 extra character, but how many people, who don't use their full allotment of 63-characters of randomness, are going to use something like "password", "dave sucks", "fleabert" (name of their cat), or even "fleabert scratches too much" as their passphrase?
Now you've got standard words, which can easily be pulled from a dictionary and put together in different combinations until the passphrase is cracked. Trivial, with enough computing power. And unfortunately, the only people who have access to that kind of computing power, are (I shudder to use the word) cybercriminals.
Re: (Score:3, Insightful)
Oh, yeah, and bear in mind: those 50,000,000 would all have to be in range of the access point and would have to not overwhelm the access point. Even the best Cisco Aironet equipment isn't g
Re: (Score:2)
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:2, Informative)
If you augment this with weekly password changes and the strongest possible password, they aren't getting in unle
Re: (Score:2)
or you could just change your mac. This is very easy.
ifconfig eth1 hw ether newmacaddress
this also isn't
Re: (Score:3, Interesting)
Even so
Re: (Score:2)
I agree.
Exactly. Anyone who reads a decent amount should not have any trouble finding a nice long quote from a book they liked which they can remember, which is what I always recommend. If they don't read enough for that to be the case.... fuck'em they don't deserve to be secure ;-)
Re: (Score:2, Informative)
You are assuming that WPA needs a human-configured passphrase here. Your calculations are all nice, but they refer to WPA-PSK (pre-shared key). If you use WPA with IEEE 802.1x (sometimes called WPA-"Enterprise"), a PMK (Pairwise Master Key) is generated by a AAA server *anew for every session*. I.e. as soon as someone logs
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
You, kayditty, are an asshole. Just like all the other stupid fucks in this industry, you assume that since you don't know how to do it, it cannot be done. Your kind are the most arrogant, conceited pricks on the pla
Re: (Score:2)
Yet again, piles upon piles of arrogance. I could be Bruce Schneier for all you know. I'm not, but my point is you're making a shitload of assumptions of my ability based on....what? Nothing. Other than my statements not agreeing with your preconceived opinions.
Not only arrogance, but childishness, also. Never once did I say that I had ever
Signal roundtrip times is the tipoff (Score:1, Flamebait)
But look, if you want a secure wifi, perhaps you're misunderstanding the need for wifi. Pervasive internet connections without wires is what we want. If you want to broadcast wifi, you ought to be required to provide this service to all listeners (how many times have I been to a customer site which had wifi that was locked down and inaccessible?). If you want to implement some sort of au
Re: (Score:3, Insightful)
I don't wan't anyone not authorised by me on my network. I see no reason why I 'ought to be required to provide this service to all listeners'. Sorry, my network, my rules.
Re: (Score:2)
Re: (Score:1)
Or what if they don't play nice and cause congestion which you don't want to deal with?
Re: (Score:2)
There are countries in which this is true.
Re: (Score:2)
Re: (Score:3, Insightful)
Not worth the risk to be a good Samaritan to the neighbor's who can't afford their own internet.
Re: (Score:1)
Re: (Score:2)
If you want it secure, stop broadcasting it. Simple.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Anybody posting here should know better than to leave a WAP open, the amount of trouble that can be caused by somebody abusing the set up is more than sufficient to justify keeping a sound security policy. Even then it may get broken, but that's where plausible deniability comes into it.
Re: (Score:2)
You always have plausible deniability, even if you don't have a access point at all. It's completely possible and quite frequent that people's computers are 0wned by viruses and trojans, and used to route anonymous traffic, send spam, and mounts scans and attacks on other machines. If securing your systems was required to give plausible deniability, millions upon millions of computer users could be subject to criminal pro
Re: (Score:2)
Yeah, that worked splendidly in the Jammie Thomas case [wired.com].
"Nothing can protect you from having to deal with the police or the FBI."
Well, not completely, but I would say not allowing people to commit crimes on your network would do something to dissuade that a little bit. And this [arstechnica.com] headline couldn't more clearly refute your claim - "Child porn case shows that an open WiFi network is no defense". From TFA -
The merits of leaving your wireless access point (WAP) ope
Reading TFA. (Score:3, Informative)
Well, the first thing you need to do is actually start reading the article you're using for support. From the fine article you quoted:
Up to the time you can show how a wifi connection will make a physical CD magically show up in a room, then any argument about plausible deniability based off this case is full of it. You can't claim someone else was using your wireless connection to download child porn when you have a big st
Re: (Score:2)
Re: (Score:2)
But the crime in that case wasn't committed over an open wireless network. The argument was that a search warrant shouldn't have been granted because of the open access point, it didn't have anything to do with plausible deniability. The guy was caught with CDs of child porn in his room, which is pretty open and shut, he was just trying to get off on a technicality about the search
Re: (Score:2)
Re: (Score:2)
For example, if you operated a hobby radio repeater and someone broadcasted a bomb threat to town hall through your radio repeater, you wouldn't be liable because you're a common carrier - your technology re
Re: (Score:2)
In case you hadn't noticed, they confiscate first and ask questions
Re: (Score:2)
Reducing the probability of dealing with authorities by not opening your network, does not make the resulting still non-zero -- but smaller -- probability useless.
Whether the effort required to do so is worth your time is an cost-benefit analysis left as an exercise to the reader. If you choose to decide it's not worth your time, great. But don't expect everyone else to agree with you.
And no, my network isn't open. I have plenty of ne
Re: (Score:1)
No, it doesn't. At that point you need to offer some evidence that someone actually did compromise your computer / network.
Re: (Score:2)
Re: (Score:2, Insightful)
Excuse me? How in the hells would you tell of someone was passively reading incoming radio waves? Isn't that the point of active vs passive radar systems, for instance? You can't!
Re: (Score:2)
Entertainment is what we want. If you want to do entertaining things, you ought to be required to provide this service to all.
Re: (Score:2)
By that logic, if you buy into Maslow's heirarchy [wikipedia.org], you have an even greater responsibility to be providing food, shelter, and sex to people too. After all, we want those more than entertainment.
Let me know your address; I'll do my part by personally bringing some homeless people to you so you can help out. I'll need to know which gender you prefer, too; I wouldn't want to stretch
Re: (Score:2)
otoh, if I re-read your post incorrectly, and you do believe I should be unsecuring my wireless net, feel free to take the slam personally.
Re: (Score:2)
Doesn't seem to practical (Score:5, Insightful)
It's an interesting idea, but I have a hard time seeing it become widespread.
Re: (Score:1)
Given that the primary researcher now works for a hardware maker (last line in the article), I wouldn't be surprised to see this as a feature on some routers in the near future.
Re: (Score:1)
Re: (Score:2, Insightful)
As an aside, the company can also have a policy explicitly forbidding access from the parking lot. If what they
Re: (Score:2)
Re: (Score:2)
Damn (Score:5, Funny)
Re: (Score:1)
"detect eavesdropping" (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
I have a pain-relief gel which has a side-effect of super-(strength/speed/control of sea animals).
Triangulation (Score:5, Interesting)
Re: (Score:3, Interesting)
Sounds like they're not "triangulating" - computing the DIRECTION to a station from two monitoring locations in order to identify the station's location as the third point of a triangl
Makes sense. (Score:2, Interesting)
I'm fairly new to all this but at a very basic level it seems to make sense.
It just a more complex method of looking at the flashing lights on the modem to see if its in sync with your known wireless connections. -- Okay alot more complex than that.
I wondeer if this can be applied to other wireless systems, e.g., radio systems. If so it would be very useful
eavesdropping (Score:5, Interesting)
Re: (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Re:eavesdropping (Score:5, Insightful)
Your firmware might react to being associated with a network enough to eavesdrop it by also responding to low-level configuration traffic. If that happens, even if you don't send any data the firmware may respond to probes, letting the network know you're listening.
If you're truly eavesdropping you're undetectable. But do you know what the vendor put in the binary blob?
Re: (Score:2)
It is fairly cheap and easy to set up a listen-only client using hardware whose transmitter is easily disabled. A few minutes with a razor blade or soldering iron, and I don't need what the proprietary firmware *tries* to do. If I want an
Nothing to see here, move along (Score:2, Funny)
And they would shoot the guy with the laptop in the lobby? Whoops, wrong guy. It was the other guy in the lobby. Nope, it was the woman in the parking lot. Wait, no, it was an anomoly.
Sounds more like a weak attempt at a research project.
Re: (Score:2)
Shooting would only come into effect if they resisted.
Of course, at those security levels they don't use wireless.
Re: (Score:2)
The German Police (Score:1)
Australia's University of Technology ? (Score:4, Informative)
Zonk or Bergkamp10, please do us all a favour and don't change the name of institutions.
Re: (Score:2)
Where's the paper? (Score:1)
How is this ground breaking? (Score:5, Insightful)
2) higher than average roundtrip times are noticed via traditional means
3) signal is triangulated via traditional means to put a location on a suspected signal.
A new but an obvious proceedure that someone has decided to put to paper and product. It is a nice product to notice but this is about as ground breaking as peanut butter and chocolate.
CC
Use 1x (Score:1)
Re: (Score:2)
What you said is akin to recommending a purchaser of a computer use the box it came in.
Doesn't appear to track eavesdropping (Score:1)
By capturing signals, unencrypted and WEP-encrypted traffic can be snooped for sensitive data.
This same technique also works against other weakly-encrypted or unencrypted protocols, provided you can get close enough to snoop. I'm thinking infrared keyboards and possibly bluetooth not to mention old-fashioned CRT-sniffing using a specially-equipped police van like you seen i
Wireless 101 (Score:1)
2. SPECIFY the MAC addresses of the specific client hardware in the routing table; a whitelist will REJECT any other connection attempt (MOST routers will do this!)
3. TURN OFF SSID Broadcast once you have the specified units set up; this will render the wireless network invisible to casual scanners.
I have never had a support call for hacked wireless on ANY system that I've set up using the three points listed.
Re: (Score:2)
On mine, I've also taken the steps of disabling DHCP, and setting my network subnet mask to 248 as the last octet. This leaves only 6 IP's available, exactly the number of devices on my network. A hacker would not only have to clone a MAC address, but take one of my in-use IP addresses. Not an impossible task, but a pain in the as
Re: (Score:2, Informative)
MAC filtering is useless because anyone with Kismet can see the active MAC addresses on the network.
SSID hiding is useless because anyone with Kismet can see the active SSIDs around them.
Someone mentioned it earlier, but have a look at this:
http://blogs.zdnet.com/Ou/index.php?p=43 [zdnet.com]
If they're invisible... (Score:1)
A more effective solution, which has been employed by every ignorant security "expert" in the world is to claim that all wireless networks are insecure. Yes, Duh! Next question.
To a certain extent, all networks are vulnerable whether they're carried in t
False Positives and Reliability (Score:1)
Freeloader (Score:1)
FUD: tracking can be done w/accuracy (Score:2)
Businesses that don't put lock on their doors-- oops I mean a strong access key-- invite break-ins. It IS POSSIBLE to secure specific access points to the point where it's no longer useful to try and crack them; WPA2 with a random strong temporal, randomly-changed key (say 24hrs at most) will suffice. Instead, notebooks or stationary devices are more astute targets for the ne'er-do-wells.
I have been doing this for awhile (Score:1)
All you kids... (Score:2)
This is new? Products that do some/all now... (Score:2, Interesting)
Not to flame or troll or slashvertise, but how is this new? I was a conference recently where the coolest security product on display was from http://www.airtightnetworks.net/ [airtightnetworks.net]: Their WIPS can be configured with an organization's known wireless clients (MAC address, make, HW and SW versions, etc.), and then detect systems that shouldn't be there.
According to the reseller's CTO - I had the good fortune to stop by the booth before he and the COO departed and the booth was left with only salesdroids - the syst
Stating the bleeding obvious.... (Score:2)
What, not like gold bullion or something?
URL to paper (Score:1, Interesting)
Does not detect eavesdropping (Score:2)
I really don't see how this can detect eavesdropping. Of course, my definition of eavesdropping is that it is a passive activity, listening if you will, but not talking.
Since this technology appears to predicated on receiving a signal from the "eavesdropper" the real world equivalent would be the eavesdropper butting into your conversation to ask you a question or to tell you something.
Not that it isn't interesting or cool but perhaps the cl
Detects Invisible Intruders My Ass... (Score:1)
Re: (Score:1)
Re: (Score:1)