Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Wireless Camouflage? 174

Anonymous Coward writes "Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables. Fake AP is a proof of concept released under the GPL."
This discussion has been archived. No new comments can be posted.

Wireless Camouflage?

Comments Filter:
  • by Anonymous Coward on Tuesday September 03, 2002 @06:10PM (#4191752)
    Won't this kill available bandwidth?
  • Uhm, huh? (Score:2, Interesting)

    by Qwerpafw ( 315600 ) on Tuesday September 03, 2002 @06:21PM (#4191801) Homepage
    I really don't understand how this works. I perused their website for a bit, and even downloaded the binary, but it still bewilders me.

    So this program creates a whole host of fictional access points? Well, a few points I don't get

    How do *you* the correct user, find out which AP is correct?

    What keeps the wardriver from doing that?

    How does this affect performance?

    how does this affect range?

    If it doesn't affect either of the two above, then how does it work? It requires, apparently, only one 802.11b card...

    Of course, I only run a small wireless network, and I am really not the most technically skilled of people. However, I use whatever security I have (the relatively weak WEP, with a well generated key), and would love having a bit more assurance of network safety.

    Anyone who understands this willing to come forwards?
    (And not just understanding in principle, i understand their whole schpiel about hiding in plain sight, like an apple in a barrel of apples.)

  • by ihowson ( 601821 ) <ian@mouldyTIGER.org minus cat> on Tuesday September 03, 2002 @06:25PM (#4191826) Homepage
    that doesn't eat up bandwidth on your network, is to simply disable beacons on your AP. Having thousands of beacons sent makes it fairly obvious that there's an actual AP somewhere in the area, and there are other ways to determine the real network name.

    Admittedly, not all AP's allow beacons to be disabled. But then, Kismet doesn't need them at all to detect networks.
  • Contaminated Coffee. (Score:4, Interesting)

    by perlyking ( 198166 ) on Tuesday September 03, 2002 @06:47PM (#4191922) Homepage
    Am I the only one who saw this and thought of Starbucks?
    :-)
  • by TechyImmigrant ( 175943 ) on Tuesday September 03, 2002 @06:54PM (#4191948) Homepage Journal
    The messaging of WEP security associations within the 802.11 mac spec is performed in the clear by passing challenge texts and responses around.

    So just compile a list of all the APs you see and listen out for a good security association. From this you can devine the real AP.

    With the proposed enhanced security mechanisms (TKIP & AES) the encryption similarly is not turned on until a security association (based on 802.1x) is completed. You can see this happen on the air and you can see which AP is being communicated with.

    For this to work well you might need to also fake lots of good security associations to all the fake APs that are beaconing.

    I see this is a poor mechanism. It is security through obscurity. It can be circumvented and the beacons suck away bandwith.

    TKIP is the way to go.

  • Very effective @ DCX (Score:2, Interesting)

    by kwj8fty1 ( 225360 ) on Tuesday September 03, 2002 @07:14PM (#4192043) Homepage
    While I was at defconX, I fired up kismet at one point, and started see lots of APs. It turns out that the folks sitting behind me had been from Black Alchemy, playing with this neato tool. I personally saw about 600 APs/minute with this tool under kismet, and they had lots of dumb windows clients trying to associate with them. With some tuning, I'm sure they could get the number of APs per second to increase (They may have done this by the time of release).

    It was good stuff, and I ended up getting my name in the credits. :)
  • by Jim McCoy ( 3961 ) on Wednesday September 04, 2002 @01:56PM (#4196020) Homepage
    1) WarChalking &| WarDriving are not crimes, the bands used by 802.11 are *public airspace* they belong to *everyone* not *anyone*.


    Just because something is public does not mean that rules do not apply to this public space. A park is a public space but there are rules about how you can use it, the unlicensed spectrum used by 802.11b is available for anyone to use but you are still required to follow FCC regulations regarding how you operate within this spectrum. There are rules that dictate how your wireless card operates, how much power it can put into it's signal, etc.


    In fact, it might be wise of you to consider this in terms of another user of this particular segment of the spectrum -- cordless phones operating at 2.4 GHz. The signal goes out over the same unlicensed spectrum band, but if you were to create a base station which prevented your neighbors from using their cordless phone handsets (even if it was accidental) you could be fined for violating the FCC rules regarding this slice of the spectrum. If you were to monitor and record a transmission between the base station and remote node you would be breaking the law. If you created a phone handset that masqueraded as your neighbors handset and used his phone base station (and phone line) for your calls you would be breaking the law. Both offenses can bring stiff fines and jail terms, something that aggressive wardrivers and 802.11b access point "borrowers" might want to keep in mind...

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...