
802.11b Honeypots Open for Business 103
11thangel writes "SecurityFocus is running a story about a wireless honeypot project, being run by the SAIC. The setup consists of 5 Cisco access points in the Washington D.C. area, with two extra antennas (high gain omni's) plugged in. The network itself has a bunch of comps with various vulnerabilities, similar to a traditional honeypot. At the present, the network doesn't have a net connection, but the administrator is considering hooking it through a web proxy that would add a consent-to-monitor banner, so he can watch who's doing what. Time to find a WiFi card that can MAC-hop."
Honeypots (Score:5, Funny)
Re:Honeypots (Score:1, Insightful)
obscure winnie the pooh refrence, on SLASHDOT of all places
Re:Honeypots (Score:1)
I don't know why they'd do anything when they know it is a honeypot, but at least if they get it stuck on their head we know what they are. Pooh
(Yes, I'm wondering about after they know it is a honeypot. Before that point, they're either wardriving or cracking, depending upon what they're doing.)
Re:Honeypots (Score:1)
Useful? (Score:4, Insightful)
Re:Useful? (Score:2)
Re:Useful? (Score:1)
Re:Useful? (Score:1)
I believe the goal of this project is to find out about latest techniques and tools. But I'm pretty sure they will find hardly anything constructive. Wait till they release their report
Re:Useful? (Score:1)
Re:Useful? (Score:2)
Honeypots are a whole different story. It's more like a game of chess. You can see all the past moves your opponent has made, but you don't necessarily know where they are going to go next. You can lay traps for your opponent, but if they are good enough they can turn the trap around on you.
Honeypots are nearly irresistable to an ego and the desire for an adrenaline rush.
Re:Useful? (Score:2)
It's being used to study what tools they use and probably thier habits.
"Furthermore, we have found that WiFi hackers tend to inundate the served webpages with messages such as 'First Hack!' and 'Hot Grits!' A secondary wave of hacks shortly follows discussing why 'First Hack!' should actually say 'First Crack'."
Why advertise 'em? (Score:1)
Re:Why advertise 'em? (Score:1)
Consider this before attempting. (Score:1)
Re:Consider this before attempting. (Score:1)
Our Nation's Capital (Score:2, Funny)
Re:Our Nation's Capital (Score:1)
Re:Our Nation's Capital (Score:4, Funny)
Re:Our Nation's Capital (Score:1, Offtopic)
Re:Our Nation's Capital (Score:1)
Another bit of trivia for those of you that visit DC. Prostitutes are easy to identify. They look just like well dressed business women except that they are wearing sneakers. Furthermore, there is free parking for Ryder rental vans on the 900 block of Pennsylvania Avenue, NW.
Warchalk (Score:4, Informative)
Re:Warchalk (Score:4, Interesting)
Common sense would dictate never to use an untrusted network for personal information, but I can see it now: people in the park with a laptop will connect to an unknown system and start chatting their personal problems on irc. The Senator's son doing this? Never happen!
Re:Warchalk (Score:1)
Re:Warchalk (Score:2)
VPN
When you are leaching off of someone else's access point, only use it to establish a VPN tunnel.
When you are trying to harden your own access point, set it so it only allows direct communication with one server on one port---the VPN (pptp or whatever you happen to use) port on your VPN gateway.
Re:Warchalk (Score:2)
Re:Warchalk (Score:2)
alternative to vpn (Score:2)
Re:Warchalk (Score:2)
Re:Warchalk (Score:2, Funny)
I guess the warchalkers should add another symbol to their icons to warn people about honeypots.
Just draw your symbol and the quote Winne the Pooh... Write "Oh Bother" accross your pretty little symbol
Re:Warchalk (Score:1)
*sigh* (Score:1, Troll)
Re:*sigh* (Score:1)
Re:*sigh* (Score:1, Funny)
A grizzly future for crypto, indeed.
Re:*sigh* (Score:1, Insightful)
Re:*sigh* (Score:2, Insightful)
WARNING: Use of the network is restricted to users authorized by XXXX only. User activity is monitored and recorded by system personnel. Anyone using the network expressly consents to such monitoring and recording. BE ADVISED: If possible criminal activity is detected, system records, along with certain personal information, may be provided to law enforcement officials.
Nobody enticed you to do anything. In fact, they did just the opposite and told you not to do it, and you did it anyway.
Re:*sigh* (Score:2, Interesting)
There are ways of grafting them on (using http redirection and so on), but those won't be seen by everyone and there are no standards, so it's not possible to connect using a script (for example). Just one example of why 802.11 isn't really an ideal protocol for public networks.
It's probably about time there were standards for things like: displaying network AUPs, privacy policies, registration/authentication. Ideally machine-readable so they could be used automatically where desired (would be quite easy to have third parties validate and sign these, done on a regular basis it would make it easier to block any networks discovered to be rogue by refusing to sign a renewal).
I think DHCP might be a reasonably good place for something like that to go (there are plenty of occasions it would be useful on a wired network too) but this type of thing is rarely useful without fairly widespread support.
Re:*sigh* (Score:4, Funny)
802.11 isn't a service or a communications protocol, it's a network layer. This is like complaining that 100 base-T doesn't have a MOTD
Brand new MOTD for cat5e! Just enter the message you want with this 1Hz binary input rocker switch, and in just minutes (depending on message length and encoding*) you can improperly interrupt network communications with a hardware-layer message.
* Available in ISO 8859-1, ISO 8859-6, and Unicode. Check with local suppliers for availability. Comes with free hexadecimalbinary convertor chart.
Re:*sigh* (Score:1)
As used [qsl.net] by radio amateurs to satisfy the identification requirements of their license. (Amateurs using 802.11b kit can still use part 15 [lns.com] [or local equivalent in other countries] but in many cases they can also transmit at higher power if they comply with various conditions, including broadcasting their callsign).
AUPAP:// (Score:2)
It would be reasonable to create an AUP/Authentication Protocol. This could have quite a substantial level of function to it.
If the user doesn't support AUPAP and doesn't successfully authenticate with the network's "domain controller" or somesuch authority, the user would be limited to the most basic access (or none at all). If the user successfully authenticates, they have their appropriate access.
If the the user supports AUPAP, they could then choose to agree to different areas/levels of access, monitoring, etc. This would allow a publicly-accessible network to provide users with Internet Access (with permission to monitor/block), SMTP-send capabilities (with message/MAC Addr/system info logging), etc without users becoming upset that they weren't aware it was happening.
Of course, there will be plenty of "Click-through" users, but an AUP is more to cover the provider than the user.
--
1.3 You acknowledge that you are aware that some areas of MSN and the Internet may contain material that is unsuitable for minors, and you agree to supervise usage by minors whom you permit to use your MSN account. -- MSN [msn.com]
Re:*sigh* (Score:1)
Re:*sigh* (Score:4, Informative)
They are laying the groundwork for controlling and making precedent for what is "unauthorized access." Don't be suprised when someone is arrested for browsing
Re:*sigh* (Score:2, Insightful)
Here is why WiFi Honeynets are necessary. (Score:2)
If I were after a specific target, I would use less-publicized software that supports a true 'passive' mode, sniff traffic (need several megabytes of captured traffic to crack WEP), then clone the MAC from a valid but not-currently-active client node to use for active probing. Attackers with criminal intent most likely have this whole process automated and scripted.
One purpose of honeypots is to detect new, unpublished exploits and tools 'in the wild'. This goal includes new WiFi intrusion tools.
Disclaimer: IANAL.That a network was not adequately secured is no excuse for connecting and using their bandwidth without permission. Criminal "trespass to chattel" is not excusable by virtue of the victim not having taken extreme measures to protect their assets.
Changing the MAC (Score:5, Informative)
Re:Changing the MAC (Score:2)
Re:Changing the MAC -- Prism2 / WLAN (Score:2, Informative)
PLEASE MOD PARENT UP (Score:1)
Re:Changing the MAC (Score:2, Informative)
Basically
hermes_write_ltv(hw,
USER_BAP,
HERMES_RID_CNFOWNMACADDR,
HERMES_BYTES_TO_RECLEN(ETH_ALEN),
dev->dev_addr);
when resetting card does the trick. (i'm using orinoco_cs drivers).
If you are lazy to add this code where appropriate, use these patches [shmoo.com]. They support mac changing plus monitoring mode for orinoco/wavelan cards.
Sabotage their efforts (Score:1, Interesting)
Anyway, the real wireless hotspot in DC is going to be American University [american.edu] since they're going all wireless [wired.com] this year. Nothing says wide open like a campus network!
Honeypots (Score:2, Funny)
Honeypot (Score:1)
Re:Honeypot (Score:1)
After finding the WLAN honeypot (Score:1)
It would be nice having a small WLAN with 5 AP's available for anyone to use for surfing the internet. ( And the FEDS can even have their fun analyzing the logs.. )
Re:After finding the WLAN honeypot (Score:1)
Help for Orinoco owners (Score:2, Informative)
The newer versions of this patch also let you change the MAC address with ifconfig as seen in another post on this story. Stock versions of the driver (as found in the pcmcia-cs distribution) don't.
Driving around with one of these things and a standard Lucent range extender popsicle antenna is almost boring now. LOTS of ISPs are getting into the business, and you get hits just about anywhere you go. You can even pick up a good signal while being chased by alligators at Brazos Bend state park outside Houston. It's everywhere.
MAC hopping with 802.11b cards (Score:1)
A MAC hopper wouldn't work too well, considering you must take the interface down to set MAC (this would obviously de-associate you from the AP).
I recommend using Snax's patches [shmoo.com] to enable RF Monitor mode as well, for use with Kismet [kismetwireless.net], an excellent passive 802.11b scanner.
Re:MAC hopping with 802.11b cards (Score:1)
O'Bother? (Score:2)
Dumb question. (Score:1)
Re:Dumb question. (Score:1)
At least, that's my understanding of it... feel free to correct me as I'm also learning the terminology and the equipment used in WiFi setups.
squished donut (Score:1)
There is logic to it, but it doesn't necessicarily apply to the moniker!
Re:Dumb question. (Score:1)
this address in DC (2650 Wisconsin Ave NW). Knock on the door. Point to the roof and asked the occupants what is a "high gain omni" antenna.
That's easy to find the hacker (Score:2)
please remember to proceed with caution when confronting the nerd.
After you find the cracker... (Score:1)
It's probably bogus... (Score:2)
Honey, I'm Home (Score:1, Insightful)
And if the net is available and I surf what have I taken?
Bandwidth?
Well I receive 10's of millions of unwanted bytes daily of unrequested/unwelcome advertisements which are "taking" my bandwidth. Whats the difference?
And furthermore couldn't an open wifi port be called an "attractive nuisance" in legal parlance. Like a swimming pool without a fence.
BTW I have an open to the net wifi port operating as I type. Am I a victim or a perpetrator.
war-driving in D.C. (Score:3, Insightful)
Maybe they're advertising because no one landed in their little pot so they're trying stoke the flames a little. I found several hundred AP's just driving a couple miles and back downtown. I would think it would be a little more interesting to situate your honey pot in a corporate area with low to medium RF traffic. Pinpointing a car in a relatively suburban area would be much easier than downtown. (and people wonder why I tinted my windows)
If you want to attract a war driver, dump something interesting on the air. You'd be surprised how much internal crap dumps out onto wireless due to broadcast traffic. (oh, you say you're on a switch? hehe..)
And how far can they track the "intruder?" I've been able to get line of sight at several miles to a few AP's while driving downtown. (and as long as someone else is driving, once they get a fix on me, they won't have me at that point for very long.) (course, LOS at a couple miles would be hard to keep associating while driving.)
As for the Mac-hopping comment... What good is that? Or are you talking about channel hopping? Get a real nic that monitors on all channels simultaneously. And war driving just isn't war driving unless you have a external antennas for both your GPS and your WiFi cards. (In some cases, an amplifier can help...)
Re:war-driving in D.C. (Score:1)
Re:war-driving in D.C. (Score:1)
Re:High-Gain Omnidirectional Antenna (Score:2, Insightful)
So in order to cover more people it probably would be better to use a couple of sector antennas with a down-tilt (as often seen on cellular base stations).
An alternative would be an amplified lower gain omni (but in many situations that wouldn't work as well since it will pick up more noise).