Wireless Camouflage? 174
Anonymous Coward writes "Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. As part of a honeypot or as an instrument of your site security plan, Fake AP confuses Wardrivers, NetStumblers, Script Kiddies, and other undesirables. Fake AP is a proof of concept released under the GPL."
Security through Obscurity (Score:2, Insightful)
http://slashdot.org/features/980720/0819202.sht
Re:Security through Obscurity (Score:2)
It's not about using up bandwidth.. it's simply the data packets that announce other APs as present.
A very small amount of traffic, actually.
Re:Security through Obscurity (Score:3, Insightful)
Same for Brooks' law, for all the people who love to invoke that one. It's not a formal proof that adding a developer will necessarily delay a project.
Re:Security through Obscurity (Score:2)
If you can't rely on it, why are you wasting your time doing it in the first place?
Security through obscurity is never "protection" because you're not really doing anything - because people who believe it's useful do rely on it.
That being said, I disagree that this is obscurity - like a honeypot, nothing is being hidden; I see it more as a way to waste a potential hacker's time.. if they try a few that are bogus, they'll give up and go elsewhere.
Re:Security through Obscurity (Score:2, Insightful)
Re:Security through Obscurity (Score:1)
Re:Security through Obscurity (Score:2)
Re:Security through Obscurity (Score:2, Insightful)
Not saying it's bulletproof, but if it makes it harder to get in and the cost is small then there's no reason not to do it.
Re:Security through Obscurity (Score:2, Informative)
This is security by obscurity in the same way that chaff released to confuse a radar system is. You obscure a target so that attacking it with your primary mode of attack is no longer profitable.
In other words, as many others have said, it's another layer of protection. I certainly wouldn't leave my network unsecured behind such a fuzz curtain.
Just think of this as a form of radar jammer. It doesn't stop you from looking for the target. It just makes one of the easier ways of doing so hard.
--JoeWon't this kill available bandwidth? (Score:2, Interesting)
Re:Won't this kill available bandwidth? (Score:1, Funny)
There is no bandwidth anyhow
Re:Won't this kill available bandwidth? (Score:1)
Re:Won't this kill available bandwidth? (Score:1)
On a related note, you won't mind if I bring in 20 access points, or a few microwave ovens and place them in range of your network right?
Since you have invincible bandwidth and all.
Re:Won't this kill available bandwidth? (Score:1)
What's next? (Score:4, Funny)
Cacophany! (Score:1, Funny)
Kudos!!
* bows to anonymous coward *
So how do your wireless devices know what's real? (Score:1)
Why... (Score:2)
Re:So how do your wireless devices know what's rea (Score:2, Informative)
Re:So how do your wireless devices know what's rea (Score:2)
Re:So how do your wireless devices know what's rea (Score:2)
To be continued ad naseum... Grghh....
Re:So how do your wireless devices know what's rea (Score:2, Informative)
This product works a lot like a flare that is used to distract missiles or other military ECM. It's meant more as a distraction. I am surprised someone didn't come up with this idea before now.
I think the point is that it will waste the potential intruder's time - not that it will totally secure your network. If the potential intruder WANTS to get in, he/she will get in eventually. This is to confuse someone trying to just do a drive by hit.
Then again, there is no stopping luck - what if the person hits on the right access point the first time?
I haven't seen any studies on wireless where people are finding Wireless AP's with the "Broadcast SSID" turned off (NetStumber can't find WAP's if you have the "Broadcast SSID" turned off)and MAC security enabled (you can clone a MAC address but you have to have a card that can do this function). If you are going to run a Wireless AP, why would you let any MAC hook into your system and why would you broadcast your wireless AP? Ok, you might have some clueless users who don't know how to configure their laptops and yes, it is a pain in the ass to have to distribute the SSID and the encryption Network key to everyone but why would you make it that much easier for an intruder?
If you have a WAP that doesn't let you turn off the broadcasting of the SSID, why don't you research into either flashing the firmware to enable this feature or buying one that does let you do that? They aren't that expensive anymore.
DOS application? (Score:2, Insightful)
Re:DOS application? (Score:2)
Re:DOS application? (Score:1, Informative)
Re:DOS application? (Score:2)
It'll probably stop Steve and Bill [infoworld.com] from stealing your service, though :-)
Imagine . . . (Score:1, Funny)
hehehehe. THat joke never gets old.
well not to me anyway.
Peripheral damage (Score:2)
Isn't that going to completely slaughter your actual AP?
No. (Score:1)
Re:No. (Score:2)
Re:No. (Score:1)
Re:Peripheral damage (Score:1)
As for bandwidth usage - 802.11 is collision-based shared media just like unswitched wired ethernet. If you keep flooding the airwaves with junk packets you increase the chances of there being a collision and decrease the available bandwidth. Actually securing the network is a better course of action.
-m
DMCA (Score:1)
Re:DMCA (Score:1)
So who's going (Score:1)
I'm not being a prick... But there are a lot of users out there who use WinDoze and this would be another tool in protecting us from those crazy script kiddies...
Oh to be young and under 18 again...
Re:So who's going (Score:3, Funny)
Re:So who's going (Score:4, Insightful)
And a better analogy would be trying to avoid venereal disease by dumping condoms all over the place so it's a veritable certainty that you'll be within reach of one wherever you happen to find yourself doing the nasty.
A better
Re:So who's going (Score:1)
Another analogy... (Score:2)
Use IPSec (Score:2)
Re:Use IPSec (Score:2)
The above is a content-free statement that wishes it was a rebuttal. What gateway? My gateway to the internet? What, do you actually think I've got a Cisco with an IPSec module lying around that I can use merely for authenticating outbound web browsing? Are you clinically thick? Do you mean the wireless access point? How many consumer 802.11b access points do you think have an integrated VPN server built into them? None that I've found. Sure if you're an enterprise and have the cash to spend, and the need for wireless networking on a a large and secure scale, you can get a Colubris Access Controller, but I, and most of the other people fielding wireless access points for their homes, can't afford it. And even if they could, setting up a VPN securely is not a trivial task that just anyone can do. Neither is using a spare Intel box to run a xBSD or Linux-based VPN server, not to mention the issues involved in securing the VPN server itself, that many well paid system administrators and security professionals can't seem to do correctly.
Real security also has all kinds of side benefits, such as actually having reasonable assurances of security.
I dare you to find the right access point out of 53000 others WITHOUT having to come up with a story behind why you're inching around with a Pringles can trying to figure out which access point my computers are using. ANY security measure can be socially engineered into uselessness. All your "resonable assurance of security" buys you is a false sense of invulnerability, and the good feeling you get from spouting industry buzzwords.
Doesn't this just slow down the wardriving a bit? (Score:4, Insightful)
In fact, I think that the problem with this solution is the amount of effort expended in defense is equal to the amount of effort for the war driver. You've got to have a PC pumping out fake APs constantly. Both radio modems are putting out the same bandwidth. This isn't a good equation for most of us.
Good encryption, on the other hand, takes only a few cycles to do but a gazillion cycles to undo. That's a great ratio of defense to offense.
Plus, don't the fake APs still end up jamming the channel. If you're faking an AP, someone else can't use the channel on that micro second. Given that wardrivers come only occasionally, but the jamming goes on constantly, I think that the legitmate users will pay a big price in network access for something that would only slow war drivers down a bit.
But I may be wrong.
Re:Doesn't this just slow down the wardriving a bi (Score:1)
Yes. Re:Doesn't this just slow down the wardriving (Score:4, Insightful)
That's probably its achilles heal. If you measure which AP point has the most traffic, you've blown past any illusion of security this gives you.
Re: wouldn't improperly encrypted pkts be better (Score:2)
Of course, the much better solution would be if encryption was used properly by wireless networks. If you add a good key management system, it might even be usable (a globally shared key is just not a good idea). Many people are working on these, of course. Of course, it does not matter how good your encryption is if people do not use it.
Dumb. (Score:4, Informative)
Re:Dumb. (Score:1)
Security through obscurity is not the best solution.
It seems to me that if this solution is commonly used, the tools will also rapidly adapt.
I ask that question... (Score:2)
Re:Dumb. (Score:2)
I mean, you wouldn't dream of hiding the door to your home with bushes and leaving it unlocked because after all nobody can see the door for all the bushes. If I suggested that was a good idea, you'd probably laugh at me.
(Hell, you probably already are.
Re:Dumb. (Score:2)
Heh, this sounds like the best way to secure a network. Along with the usual firewalls and other gems of obscurity, this is like a minefield that stands to catch 99.99% of the wannabee intruders. If you place lucrative triggers of deception everywhere, a newbie to your network is guaranteed to set off an alarm.
This is just the final touch for security. Its more beautiful than the venus fly trap. Imagine an intruder blindly walking off the edge of a cliff. The death penalty won't protect you from pests, but this will!
Uhm, huh? (Score:2, Interesting)
So this program creates a whole host of fictional access points? Well, a few points I don't get
How do *you* the correct user, find out which AP is correct?
What keeps the wardriver from doing that?
How does this affect performance?
how does this affect range?
If it doesn't affect either of the two above, then how does it work? It requires, apparently, only one 802.11b card...
Of course, I only run a small wireless network, and I am really not the most technically skilled of people. However, I use whatever security I have (the relatively weak WEP, with a well generated key), and would love having a bit more assurance of network safety.
Anyone who understands this willing to come forwards?
(And not just understanding in principle, i understand their whole schpiel about hiding in plain sight, like an apple in a barrel of apples.)
Re:Uhm, huh? (Score:2, Informative)
You should know what your SSID is. That is how your device knows which AP it should use.
What keeps the wardriver from doing that? :)
Don't tell the wardrivers your SSID.
How does this affect performance? how does this affect range?
Minimal. The packets that announce APs are a small fraction of your outgoing packets.
SSID def, (Score:1)
You still need a secure authentication b/c the ssid can be sniffed. What solutions are there for this prob?
Re:Uhm, huh? (Score:1)
Re:Uhm, huh? (Score:1)
Just check the warchalk on the sidewalk outside.
Script kiddies are people too (Score:2, Insightful)
I mean come on. Is the big problem in todays work environment really that before all the staff can play Quake III on the company LAN someone has to go out and scatter all the hooligans with laptops?
This is cool, don't get me wrong. But if encryption isn't enough, go with the cat5 cable.
Re:Script kiddies are people too (Score:1)
Right now? I'd guess not. But, as soon as Joe Average-user figures it out...
Nice site... (Score:2)
Open source Innovates! (Score:1, Redundant)
This is pretty innovative.....sorry just my 2 cents.
Re:Open source Innovates! (Score:1)
The idea of hiding a gold nugget in a sea of crap is nothing new.
Except here you can just erase all that crap by just sniffing for TCP on 80-
Well gee- now what you gonna do?
Fake a slew of web requests so someone sniffing can't see the real ones?
yeesh...
Won't Work (Score:1)
A much simpler solution... (Score:3, Interesting)
Admittedly, not all AP's allow beacons to be disabled. But then, Kismet doesn't need them at all to detect networks.
Re:A much simpler solution... (Score:1)
That should throw one more wrench into the intruder's machinery...
Physical security (Score:4, Funny)
Re:Physical security (Score:5, Funny)
You must know the guy who set up our office network
Re:Physical security (Score:2)
What a day... (Score:4, Funny)
Next thing you know, we'll see a post about the invention of visible cloaks.
Not much help unless your network is unused.. (Score:5, Insightful)
Re:Not much help unless your network is unused.. (Score:4, Funny)
No, I'm a hacker, and I can tell you, this has us beat. Trust me on this one: this will work. I promise.
Also, run your telnet daemon on port 123. That will stump us as well.
Re:Not much help unless your network is unused.. (Score:2)
I'd say the effectiveness of this is not to hide a real AP amongst bogus AP's, but to hide real networks amongst bogus networks. So don't set this up in your office building... set it up in places there aren't currently wireless networks so wardrivers waste their time trying to break into something that can't be broken into. This isn't security through obscurity, it's a honeypot designed to lure people away from the real target.
uhhhh, OK. (Score:1)
Now, how does this generate all the frames? Does it require the 802.11 interface to be on the Linux box, or does it manage to send the data to the interface as normal packets. In other words, if I am using one of the Linksys router/802.11 boxes, can I run this on my normal Linux box, or do I need to hack the Linksys to run Linux?
And what is the effect on throughput? Any time the system is sending a fake frame, that is time it cannot be sending real data.
Security through obscurity (Score:1, Redundant)
I thought that the (Score:1)
Oh, I see. It runs on Linux. Never mind. Carry on and sing praises to it.
From the trenches.. (Score:5, Insightful)
However I've noticed that companies with wireless AP's tend to be in clusters in close vicinity to each other. I'm just wondering what the effects on the persons neighboor would be. I could just see someone running this and just confusing the hell out of his neighboors. It would be even worse if the fake broadcasts were on different channels, then there would be real chaos with legit users.
Fun to play with, but not practical for production since a determined attacker would wade through the data to get your real SSID
Just my $0.02
MAC filter always worked for me (Score:3, Informative)
It seems to work very well and would foil would-be wardrivers.
Re:MAC filter always worked for me (Score:2)
Re:MAC filter always worked for me (Score:2, Insightful)
You're most likely right, since they are likely doing this for sport, not hacking. If you are using this simply as a deterrent, not security, then you are correct.
However, any hacker who actually wanted in your network could do so in seconds:
1. Listen for a unicast frame to determine a valid MAC address on the network.
2. Change MAC address on his/her card to be one of the MAC addresses.
3. Pillage the network of the person sitting dumb, fat, and happy on their unsecured net.
The short and sweet of this is that it is not hard to spoof MAC addresses. Therefore, Access Control Lists (ACL) can not be the only level of security.
Re:MAC filter always worked for me (Score:2)
Ummm...how, exactly, are they going to do this without being on the network? Mac filtering will keep them off the network unless they are an incredibly lucky guesser or have a lot of spare time on their hands.
Re:MAC filter always worked for me (Score:2)
Contaminated Coffee. (Score:4, Interesting)
This seems easy to circumnvent (Score:2, Interesting)
So just compile a list of all the APs you see and listen out for a good security association. From this you can devine the real AP.
With the proposed enhanced security mechanisms (TKIP & AES) the encryption similarly is not turned on until a security association (based on 802.1x) is completed. You can see this happen on the air and you can see which AP is being communicated with.
For this to work well you might need to also fake lots of good security associations to all the fake APs that are beaconing.
I see this is a poor mechanism. It is security through obscurity. It can be circumvented and the beacons suck away bandwith.
TKIP is the way to go.
Very effective @ DCX (Score:2, Interesting)
It was good stuff, and I ended up getting my name in the credits.
Re:Very effective @ DCX (Score:3, Informative)
Which is exactly why this is a bad idea. The software doesn't just send beacons. It requires to you install a driver which contains full AP functionality, and then starts configuring it with random MAC address and common, well known SSID's, every quarter second. Which means that anybody within range who happens to have "linksys", or "tsunami", or any of a handful of common SSID's is going to be out of luck when their laptop connects to whomever is running this Alchemy "tool". People who set up broken AP's with liberal (i.e. wide open) security are assholes. And that's exactly what this. software does.
Wireless DOS attacks? (Score:2)
Now, I don't think such a thing is illegal or is it?
Re:Wireless DOS attacks? (Score:1)
Re:Wireless DOS attacks? (Score:2)
What if they had a default network, ssid 101 or airport on channel 1 or something like that, if you're not on their territory and having a lan party with a couple of laptops sitting in your car with the same default settings, they can't accuse you of dos'ing right?
Wait a minute... (Score:2)
Come on! They idea is for them not to notice, and set up a barrier if they do. Not for you to set up a red light district.
Re:Wait a minute... (Score:2)
)(
forgetit
fine, then sniff for probe packets (Score:2)
Linux radius (Score:1)
This "tool" is a remarkably bad idea (Score:2)
Basically, I can't imagine this being effective at all against war-driving. But I can imagine it being quite effective as a DoS tool. Imagine setting it up with the SSID that Starbucks uses and walking into one of their shops with this. You could have half the customers futily trying to connect to the legitimate service but getting your non-connected and continously resetting "AP" instead. It would be easy enough for this "tool" to configure the card so that clients couldn't accidentally connect to it, by enabling WEP or MAC filtering or whatever. But it doesn't do that, or even try to. I understand it's version 0.2, but at this point I think it should be filed under "trojan horse" or "skript kiddie" given that it'll easily screw up legitimate users while doing basically nothing to protect you from any crackers around.
Illegal under FCC Part 15? (Score:1)
Are slashdotters really this stupid? (Score:2)
Not much more than a diversion (Score:2, Insightful)
As has been pointed out in other replies to this story:
it's easy to sniff for data traffic and thus ignore the fake access points,
this is a useful DoS tool more than a way of securing networks.
Seems to me that as long as network admins, users or Jo-average-computer-at-home-user keeps thinking of 802.11 kit as a "alternative to wires", we'll be stuck with all the security problems. Wireless = broadcast. That will inevitably involve sending your data out to anyone who cares to set up an antenna and kit to recieve it. You trade the convenience of not having to run wires for the insecurity of broadcasting your bits to the world. Anyway, given that this unpleasantly insecure technology is spreading worldwide, it's interesting to see this article at CNet [com.com] about small, cheap 802.11 chipsets destined for set-top boxes. I contentedly predict that in a couple of years there'll be scares about wardrivers sniffing what people are watching on their wireless TVs :)
Anna B
Why don't we try this for open relays? (Score:2)
Imagine a BeoWolf cluster of these
If everyone did this, we would raise the cost of spamming. It will not stop spammers, but it will make them have to check if the relay is actually working by spamming themselves. Nice little breadcrumb trail, no more bulk sending blind
Issues (Score:2)
We should stop this attitude in its tracks, it is a selfish and irresponsible waste of bandwidth.
1) WarChalking &| WarDriving are not crimes, the bands used by 802.11 are *public airspace* they belong to *everyone* not *anyone*.
2) The vast majority of 802.11 access points are still expermental and like the early days of the Web are *supposed* to be *free* to use by responsible early adopters.
3) If your AP is not intended for public use, it is it's owners responsibility to secure it.
Public doesn't mean unregulated (Score:3, Interesting)
Just because something is public does not mean that rules do not apply to this public space. A park is a public space but there are rules about how you can use it, the unlicensed spectrum used by 802.11b is available for anyone to use but you are still required to follow FCC regulations regarding how you operate within this spectrum. There are rules that dictate how your wireless card operates, how much power it can put into it's signal, etc.
In fact, it might be wise of you to consider this in terms of another user of this particular segment of the spectrum -- cordless phones operating at 2.4 GHz. The signal goes out over the same unlicensed spectrum band, but if you were to create a base station which prevented your neighbors from using their cordless phone handsets (even if it was accidental) you could be fined for violating the FCC rules regarding this slice of the spectrum. If you were to monitor and record a transmission between the base station and remote node you would be breaking the law. If you created a phone handset that masqueraded as your neighbors handset and used his phone base station (and phone line) for your calls you would be breaking the law. Both offenses can bring stiff fines and jail terms, something that aggressive wardrivers and 802.11b access point "borrowers" might want to keep in mind...
WarChalking doesn't mean Cracking (Score:2)
You seem to be missunderstanding my position. I am AGAINST this tool.
You also seem to be making incorrect assumptions about what WarChalking &| WarDriving are about, it is no more about cracking than hacking is. The majority of people doing these are the very people trying to develop invovative uses of the technology.
I suggest your persue this site: http://www.wardrivingisnotacrime.com/
spectrum used by 802.11b is available for anyone to use but you are still required to follow FCC regulations regarding how you operate within this spectrum
I agree. Though the author of this tool clearly does not. It is essentially an area denial of service attack for 802.11, filling the spectrum with invalid SSID's. This is akin to seeding local DNS servers with invalid domains, are worse hijacking popular domains. I am sure that the FCC would consider that abuse. I know the UK's Radio Communication Agency would.
but if you were to create a base station which prevented your neighbors from using [...]
I am not doing that, though anybody using this tool would be.
Area DOS attack (Score:2)
This tool is essentially conducting an Area DOS attack against peer 802.11 services.
Re:FP? (Score:1)