Wartrapping? 266
netphilter writes "This article on ZDNet writes: "A "honeypot" trap consisting of a Wi-Fi-equipped laptop is the latest weapon against drive-by hackers." Although I'm sure that I've heard of this somewhere before, it appears that the latest twist is that this company is looking to sell them to corporations. Hmm...I wonder what the warchalking symbol for a honeypot really would look like?"
Old news (Score:3, Informative)
war & wi-fi (Score:5, Informative)
Actually, wardialing referred to having your computer rapidly dial phone numbers and look for modems that would allow anyone to connect. The idea was that Joe Scriptkiddie would start a wardialing program when he got up in the morning and it would dial a randomized list (because the phone company is looking for lots of numbers being dialed sequentially) of phone numbers all day. In the afternoon when he got home from Junior High, he would check to see if the program had found any "interesting" information (modems on numbers that he didn't know about before) and if so he would add them to his "to-investigate" list.
If we define warX to mean aimlessly using method X to find hosts that will talk to anyone, that fits with the definition of wardialing - aimlessly dialing numbers in the hope of finding a modem. Even though driving isn't the most important component of wardriving (one could walk, I suppose), the term wardriving seems to fit. It means aimlessly driving around with a laptop scanning for hosts that will talk to anyone.
Can we dispense with the prefixing of "War" to anything 802.11 related, PLEASE?! This is just stupid now.
As far as I know, wardriving is the only war* term related to 802.11 technologies.
Wardriving is not illegal (Score:5, Informative)
For those of us looking for wireless acess, we just want to check email and check a few web pages. There's no way of telling whether a unsecured wireless network was deliberately unsecured to allow people to access the Internet, (like many people and some businesses - notably, Starbucks - do) or whether it was left unguarded due to ignorance, laziness, or boneheadedness.
If you find people accessing your network and you don't want to share, lock it down. What's the point of a honeypot? To find all those roving bloggers on park benches, obsessively updating their fans on the minutiae of their lives? What are you gonna do when you find them? Slap them on the wrist?
Doesn't everyone realize that this is the future? Unfettered access to information, whether you're in line at the DMV, at the park with the kids, Saturday morning soccer, whatever. What other technology is going to bridge that last mile? Nobody's putting fiber down in my neighborhood. Wireless seems like the best option for fast, ubiquitous acesss to me.
Re:Huh? (Score:5, Informative)
Stop thinking of GPS as a magic solution to all problems involving knowing where you are. It's good, but it's not that good.
Re:WarSTUPID (Score:4, Informative)
The dialer program [lycos.de] in the movie, and ones like it which people made, got nicknamed "War Dialers".
Re:This is ridiculous (Score:3, Informative)
It also is completely passive (so most likely legal, since 2.4ghz is a public band with no regulations on it) and anything it hears, not just AP broadcasts, are logged. You can drive around, then throw Ethereal up and see what data you happened to grab. All completely passively.
Check out the kismet site [kismetwireless.net] for more information. Here [nuxx.net] is a map I made of downtown Ann Arbor. No intrusions were performed, SSIDs are purposefully left off the map, and the colors are completely arbitrary. I'm interested in what is where. Not using other people's bandwidth/networks.
Re:war & wi-fi (Score:3, Informative)
Uh.. Wardriving, warchalking, wartrapping, warwanking...
He's got a point...
Re:OT: VPNs (Score:2, Informative)
OpenBSD: builtin (read FAQ)
Windows: PgPNet seems to work
Re:2 things (Score:3, Informative)
Well, I wouldn't say you're a dumbass, but no, it does not address most of the security issues
It is trivial to sniff a valid MAC address, and then set your card to be that address.
Re:I don't (Score:2, Informative)
Re:Isn't it obvious??? (Score:3, Informative)
The actual system is not designed to accept the data as a useful transmision, it's designed just to log what comes in on it's interfaces (probably set in promiscuous mode) and provide an appropriate response, give the hacker what he'd expect to see.
Sure, some brightspock hacker could find a bug in the software, exploit it and gain access, then browse to and remove any log files that might have been kept. But, by the time the hacker figures out it is a honeypot, the computer has already logged and recorded everything he/she has done to probe the network, and how long do you think it is going to take to find an exploit, that would let him / her remove evidence of his / her presence.
I dont hack, but I have to imagine that it's not quite that easy hacking a black box that you have never seen, when it probably runs some custom OS / software that you most likely will never gain access to. The Honeypot has it's own security through obscurity.
Probably, he or she wont bother and will instead walk away, but the data captured by the device will be invaluable in securing networks which are vulnerable to attack.
You will of course, soon find an elite group of hackers that go around specifically searching for honeypots, so that they can find ways of identifying them, and once one of them finds a way it will be passed on as knowledge, then this test will be done by any attacker as a probe first, so that his / her tactics are not exposed to any honeypots.
Re:Huh? (Score:4, Informative)
* Obviously, you need a dhcp server handling that leg so it's not quite ALL traffic, but you can really restrict what that leg can do, how it's logged, etc.
Re:I don't (Score:4, Informative)
Best I could find.
And in that case, wouldn't it be a "Hunnypot"?
Why is this so hard? (Score:2, Informative)
Re:I don't (Score:1, Informative)
Re:Huh? (Score:2, Informative)
Re:Honeypot Symbol (Score:3, Informative)
Re:Huh? (Score:3, Informative)
Looks like GPS will remain in use for wardriving - since you're outside with a clear view of the sky it works just fine for that. :)
If you're interested in more GPS facts, check out this Google Cache [216.239.35.100] - I don't want to slashdot the main site.
Re:Idiots... (Score:2, Informative)
Beautiful user interface != Good user interface.
Not that I'm disagreeing with your comment, just that particular logic snippet.
Re:Trespass (Score:4, Informative)
AFAIK (IANAL): in England and Wales, trespass is not a *crime*. There is a big distinction between crimes which are tried in criminal courts and other actions (torts) for which there is only a civil remedy. If someone comes onto your land you don't in general have much comeback against them unless they do some harm or damage - they haven't committed a crime. If they do damage, then you may be able to claim recompense in civil courts, but it's still probably not a crime.
However, if they are armed, then it's armed trespass, which IS a crime and you can call the cops straight away. In cases of ordinary trespass the police will be very disinterested because their responsibility is basically criminal not civil law.
GPS? you gotta be crazy (Score:2, Informative)
Anywas, we're not taking about MAC addresses here... GPS would be an expensive and impracticle means of identification.
There are plenty of ways to secure a network, people just aren't putting forth the effort - if it's important enough just set up a VPN