
Wartrapping? 266
netphilter writes "This article on ZDNet writes: "A "honeypot" trap consisting of a Wi-Fi-equipped laptop is the latest weapon against drive-by hackers." Although I'm sure that I've heard of this somewhere before, it appears that the latest twist is that this company is looking to sell them to corporations. Hmm...I wonder what the warchalking symbol for a honeypot really would look like?"
Honeypot Symbol (Score:5, Funny)
Liam
Re:Honeypot Symbol (Score:3, Funny)
Re:Honeypot Symbol (Score:4, Funny)
Re:Honeypot Symbol (Score:3, Informative)
Re:Honeypot Symbol (Score:2)
Uh, trespassing? If I go around and try and bilk old ladies out of their retirement funds, is that a crime? Just because people are gullible and stupid (unsecured networks) doesn't make it your right (or make it legal) to take advantage of that.
Re:Trespass (Score:4, Informative)
AFAIK (IANAL): in England and Wales, trespass is not a *crime*. There is a big distinction between crimes which are tried in criminal courts and other actions (torts) for which there is only a civil remedy. If someone comes onto your land you don't in general have much comeback against them unless they do some harm or damage - they haven't committed a crime. If they do damage, then you may be able to claim recompense in civil courts, but it's still probably not a crime.
However, if they are armed, then it's armed trespass, which IS a crime and you can call the cops straight away. In cases of ordinary trespass the police will be very disinterested because their responsibility is basically criminal not civil law.
Re:Honeypot Symbol (Score:2, Funny)
Isn't that a Disney character? If so, probably never. If you have enough money you can buy a never-expiring copyright from your local congressman.
Huh? (Score:4, Interesting)
Re:Huh? (Score:2, Interesting)
The one thing this doesn't solve is if a company residing in a suite doesn't want to share their network with ABC Corp upstairs. In that case, they may be able to string copper wire in the ceiling as a "shield".
Re:Huh? (Score:2, Interesting)
Actually, GPS provides altitude, as well as position. So you're all set--no floor and ceiling shielding necessary.
Re:Huh? (Score:2, Interesting)
Unless you can't see enough satellites. Which has been my experience in many office buildings. Maybe my GPS is a POS, but unless it's right next to the window, or outside, all the concrete and whatnot block the signal. So I wouldn't want to trust my network access to that kind of spotty coverage.
Re:Huh? (Score:5, Interesting)
Yeah right. Like someone who would want to use your network wouldn't lie about his position (by hacking the card, driver,etc..). Maybe non-trivial, but once one guy does it, he gives the recipe.
When modems began to be deployed, corporations wouldn't even ask a password to be connected. Just dial the line. This is equivalent of the now unsecured wireless networks. Your solution would then have been to only allow some phone numbers to dial in. Not that bad, but asking for a password is probably simpler and better.
Re:Huh? (Score:3, Interesting)
Re:Huh? (Score:5, Informative)
Stop thinking of GPS as a magic solution to all problems involving knowing where you are. It's good, but it's not that good.
Re:Huh? (Score:4, Insightful)
Or they could just secure the thing with ACLs, secure transactions, etc. - in short everything else that can be done that doesn't involve a pair of sneakers. Sure beats jogging through the building every so many hours with a preciously configured laptop.
Re:Huh? (Score:3, Informative)
Looks like GPS will remain in use for wardriving - since you're outside with a clear view of the sky it works just fine for that. :)
If you're interested in more GPS facts, check out this Google Cache [216.239.35.100] - I don't want to slashdot the main site.
Re:Huh? (Score:5, Interesting)
The problem is that they called the security scheme Wired Equivalent Privacy, thus botching the job from the start. They failled to understand that the big difference between a wired and a wireless network is access control, you can bypass the guard at the gate.
This proposal appears to be macho bullshit rather than serious security. First off most people who are warchalking just want to download their email. So while it is great press to demonize them don't make a big issue.
Secondly it is very easy to apply a layered security solution. You can use IPSEC or 802.1x with a bunch of other stuff.
The bugs in WEP have been known for some time and the people doing the next generation crypto security know what they are doing. Incidentally the 802.11 working group knew about and was fixing the bugs before Stanford put out the report. A small company up in Redmond Washington had decided to make 802 available throughout their campus (sounds like a directive from his Bill-ship). Before deploying their crypto people had a look at the security of WEP and went AGGGHH!
I found out about this because I tried to contact Big-Softie after hearing about the WEP problems at a cipherpunks meeting. Working out how to fix a problem like that without having to replace every card is really hard.
Point is that nobody should be using honeypots until they have actually deployed decent crypto security. And you should protect the honeypot as closely or almost as closely as the real network.
Rather than messing with this stuff why not just put up a courtesy 802.11b network with a net ID of 'OPEN123' or something, plug it into your network so that it is outside the firewall and set throttles so that nobody can use too much bandwidth. Then people who just want to downlod their mail can get it.
I keep trying to persuade folk that we should do this sort of this in the base infrastructure, Access points should offer a guest mode as standard with appropriate limits, say no more than 20Mb of guest use per hour.
Re:Huh? (Score:2, Insightful)
If I'm a malicious cracker and I'm out wardriving around, I find an unprotected network. Sure, I may not care about the corporate resources on _that_ network I'd have to IPSEC to, but what about other networks? I've gained access to Corporation XYZ's WLAN, why don't I start rooting boxen on other networks? They're going to trace it back to XYZ's netblock, and potentially pursue legal action. As the security architect for XYZ, I would have no option to view my deployment as criminal negligence. Sure, my internal net is protected, but crackers are sullying my good name by using my network to attack others. What if the cracker decides to use my WLAN to attack my strongest competitor? Do I drop an IDS on the WLAN? Now I've spent more time/money/resources in babysitting my open WLAN than properly introducing (be it weak) WEP and (be it also weak) registered MAC addresses.
Re:Huh? (Score:4, Informative)
* Obviously, you need a dhcp server handling that leg so it's not quite ALL traffic, but you can really restrict what that leg can do, how it's logged, etc.
Re:Huh? (Score:2, Informative)
Re:Huh? (Score:2)
Again I think we can fix this. The next generation of WiFi chips will have certs built into them so they will not be completely anonymous. They will however be anonymous in that it will not be possible to conduct traces without a huge and highly visible infrastructure to allow the trace.
Again the reason why I propose caps is because of the likes of SPAMing scum. However there are other ways arround that.
Re:Huh? (Score:2, Insightful)
Re:Huh? (Score:3, Insightful)
Man, don't be such a bread head. You use technology that I invented and gave away for free every day of your life and you don't even know you are doing it.
Seriously, I have a WiFi connection in my house. If someone passing by wants to download their email that is fine with me.
If someone comes to our corporate offices and wants to download their email or send a presentation or whatever that is also fine.
Of course you get people who abuse the hospitality on offer which is why I propose use caps.
Funny thing is that I have done a lot better not worrying too much about money than the folks who think of nothing else. Thing that most disappoints me about having my stock price in the crapper at the moment is not the fact that I can't afford to buy Blandings Castle [apleyhall.com] at the moment, I am much more concerned that I can't just write a check to build a hospital or school in Afghanistan. Still in five years from now I'll be doing fine and you will still be a breadhead loser who thinks only about what you shoulf receive and not about what you might give.
Secure network topology (Score:5, Interesting)
This also relates to discussions about cooperative wireless mesh networks. If you want people to volunteer to share their wireless node with neighbors, you have to provide a box that enables it to be done safely. If the design isn't rock solid and foolproof, all it takes is a little FUD to damage the necessary trust that makes people feel ok volunteering.
The idea of placing an access point outside the wired network is probably the correct solution given the claimed weaknesses in WEP, and it might save you from replacing all those cards immediately. If I was proposing adding wireless access to a corporate or educational campus, I would propose this exclusively. No access points inside the gateways, and access the internal network resources as if you were coming in from outside. If you use a VPN solution for telecommuters, the same would work for wireless access. Now you have end2end security on your external people, and whatever your policy is about sharing out some bandwidth for free, it's more like giving a free drop to a nonprofit down the hall. You'd just hook them up to your external router with no internal access.
There was also a small comment in the interview with Vint where he says that he wishes they had designed in access controls for each node from the start. This would probably be a big help here as well as with problems related to IP spoofing and such. Perhaps IPv6 would be an opportunity to get this in, but if it isn't in the spec yet (anyone know?), it's probably too late.
It might look something like this (Score:5, Funny)
or
)NO!(
Or failing that a picture of a fat bear with handcuffs being lead away by the brain police. Damn you Pooh bear...
Re:It might look something like this (Score:2)
Re:It might look something like this (Score:4, Funny)
I mean like this [cantina.co.jp].
blargle...now it's not even funny anymore.
Re:It might look something like this (Score:2)
So not only are you an Evil Computer Hacker/Terrorist leaving secret coded terrorist messages to the other members of your cell, but you're commiting mass copyright infringement in the process! Maybe Bush and Ashcroft aren't going far enough, because you obviously haven't learned your lesson yet, punk!
How the heck (Score:5, Insightful)
Re:How the heck (Score:5, Insightful)
In this way I think that Wi-Fi honeypots could be VERY effective. Given the inherent insecurity of the protocols being used, any data that could be used to develop better standards is definitely welcome.
Re:How the heck (Score:2)
XP to the rescue (Score:2, Funny)
Valuable WinUSER
1069 Penn Ave, Washington DC.
(100) 555-1069
192.168.1.1
Press 1 to recieve list of all songs and movies ever watched on this PC.
Press 2 to recieve social security number
Press 3 to recieve mother's maiden name
Press 4 to be authenticated as vendor with power of attorney for Valuable WinUSER.
Press 5 to spam.
Oh wait, 192.168.1.1 is a local IP. Bill, you need to store medical records so we can cross reference the social security number with the real ISP, thanks.
Re:How the heck (Score:2, Interesting)
It's basically just an intelligence gathering device then. If in a month all of 4 people try to connect, and all they do is surf the web or something, then there isn't any point on that office spending thousands protecting the network, but, on the other hand, if half of London is loging on, trying to gain as much access as they can, then it might be worth actually trying to do something about it.
It's not designed to catch people at it, just determine how much a problem it actually is before taking further action.
Honeywagon (Score:3, Funny)
What they use to put all the crap in...
Would be interseting . . . (Score:3, Interesting)
Things could get sticky.
Old news (Score:3, Informative)
A use for the TIMBOT!!!!!!! (Score:2, Funny)
I don't (Score:4, Funny)
Re:I don't (Score:2, Informative)
Re:I don't (Score:4, Informative)
Best I could find.
And in that case, wouldn't it be a "Hunnypot"?
Hackers? (Score:5, Insightful)
I wound't call em hackers, just opportunists.
War Chalking Symbol (Score:2, Funny)
Re: (Score:2)
Good (Score:3, Insightful)
Well, I for one am glad that we are going to see a crackdown on today's tech-obsessed miscreant.
Re:Good (Score:2)
Re:Good (Score:5, Insightful)
Additionally, taking someone's car is stealing -- you deprive them of the car. Using someone's bandwidth is likely not, unless you use so much that they can't get their work done.
Re:Good (Score:2)
Actually, this starts to become entrapment, if cops purposely leave this car with its doors open and hang around the corner waiting for somebody to bite.
There are better ways to do this (Score:5, Insightful)
Since even a secured wireless network can be broken into in about 30 minutes,
it makes more sense to treat the wireless network as an external network.
All accesses to the 'real' internal network then go through the firewall as if they came from the Internet.
Doing anything less than this seems to be courting danger.
Re:There are better ways to do this (Score:2)
They are measuring how much (unauthorized)activity occurs at the access point.
WarSTUPID (Score:4, Interesting)
Historically, "wardialing" was phr33k-slang for the rapid dialling of phone numbers. Exactly what does this have to do with 802.11? Driving around and listening to packets is not the equivalent of "wardialling", nor is it in any way similar.
And don't even get me started on the idiotic term "Wi-Fi"...
war & wi-fi (Score:5, Informative)
Actually, wardialing referred to having your computer rapidly dial phone numbers and look for modems that would allow anyone to connect. The idea was that Joe Scriptkiddie would start a wardialing program when he got up in the morning and it would dial a randomized list (because the phone company is looking for lots of numbers being dialed sequentially) of phone numbers all day. In the afternoon when he got home from Junior High, he would check to see if the program had found any "interesting" information (modems on numbers that he didn't know about before) and if so he would add them to his "to-investigate" list.
If we define warX to mean aimlessly using method X to find hosts that will talk to anyone, that fits with the definition of wardialing - aimlessly dialing numbers in the hope of finding a modem. Even though driving isn't the most important component of wardriving (one could walk, I suppose), the term wardriving seems to fit. It means aimlessly driving around with a laptop scanning for hosts that will talk to anyone.
Can we dispense with the prefixing of "War" to anything 802.11 related, PLEASE?! This is just stupid now.
As far as I know, wardriving is the only war* term related to 802.11 technologies.
Re:war & wi-fi (Score:3, Informative)
Uh.. Wardriving, warchalking, wartrapping, warwanking...
He's got a point...
Good History Lesson Erpo! (Score:2)
The only other term I could think of would be involve grep, however that implies a more sequential search and regular expressions.
Re:war & wi-fi (Score:2)
Uhhh, well "warchalking" was being used well before "wardriving." So that's at least one more.
Re:WarSTUPID (Score:4, Informative)
The dialer program [lycos.de] in the movie, and ones like it which people made, got nicknamed "War Dialers".
Re:WarSTUPID (Score:2)
Your warpost makes an excellent warpoint.
Idiots... (Score:5, Insightful)
It is quite possible to do wireless without opening up your entire company network. Just like it's possible to NT networking securely.
The problem is for the most part there are idiots in control of the corporate IT that have impressive MS certifications after their names but don't know diddly squat. This quote:
proves it and let's us know who they plan on selling to.And just what is it they plan to do when they get people logged into their honey pot? Call the police? Oh man please.
Re:Idiots... (Score:3, Insightful)
Why? Why on earth would wanting a good user interface make you an idiot? You'd prefer a bad user interface?
Cheers,
Ian
Re:Idiots... (Score:2)
The point is that the two are not mutually incompatible. Grunge interfaces for the sake of is just pure posturing - and I speak as someone who does the majority of my work in vi running on xterms.
Cheers,
Ian
This is ridiculous (Score:5, Insightful)
OT, does anyone know of a Netstumbler-like tool that works with the Toshiba e740's built in Prism wireless card?
Re:This is ridiculous (Score:3, Informative)
It also is completely passive (so most likely legal, since 2.4ghz is a public band with no regulations on it) and anything it hears, not just AP broadcasts, are logged. You can drive around, then throw Ethereal up and see what data you happened to grab. All completely passively.
Check out the kismet site [kismetwireless.net] for more information. Here [nuxx.net] is a map I made of downtown Ann Arbor. No intrusions were performed, SSIDs are purposefully left off the map, and the colors are completely arbitrary. I'm interested in what is where. Not using other people's bandwidth/networks.
Re:This is ridiculous (Score:2)
Sorry...
honeypot symbol... (Score:2, Funny)
-(|||) - is that a honey pot symbol?
Hahah (Score:5, Insightful)
Not all people accessing wireless networks drive up to the front door.
Will someone explain what the "threat" is? (Score:2, Insightful)
A Much Better Idea (Score:5, Insightful)
If you want wireless security, take your WAP and plug it into a spare interface on your firewall, or whatever hardware you're using to do your VPN. Now send out a memo saying 'We now have wireless access. In order to use the wireless access you'll need to use that VPN software that we gave you so you could work from home'.
Only accepting authenticated IPSec connections is going to do a hell of a lot more good than getting useless statistics on how many people wanted to hit google while sitting in that park half a block down the street from your office.
half right (Score:2)
Ture.
It's a research tool for security firms that can help provide data that will help sell security services
False. It's a research tool for security firms that can't provide security because their clients insist on using insecure software like Microsoft Windows TM. I imagine the silly thing will disrupt legitimate corporate communications and collect a bunch of usless "Valuable user at 192.168.1.1" information.
As you seem to suggest, the only way to secure your wireless network is to treat it as an external insecure network. The streams must be encryped (WEP no good) and the connections must be authenticated. If you don't do that you just might end up with half your NT admins in the park accross the street.
If you just hand out IP addresses and service to anyone who walks by, you can expect people to take it. They might as well put PCs on the street and then complain when people stop and surf or play solitair. Duh, what will they think of next, trying to secure bags of money in the lobby with nerve gas?
Re:OT: VPNs (Score:2, Informative)
OpenBSD: builtin (read FAQ)
Windows: PgPNet seems to work
Re:OT: VPNs (Score:2)
802.11 can be secure, if the admins know how to! (Score:5, Interesting)
I recently worked at a large government organization (in Canada if it matters). The particular organization held a lot of information classified secret. It was all stored on a password protected mainframe that users accessed through telnet.
Well, someone had liked the idea of setting up wireless networking for a group of users in the building. The admin who installed the system simply used MAC address authentication as the only security on the WLAN. They only had so many wireless nics, so they simply added those addresses.
The problem here is that the admin did not realize the security hole he had just opened, as we all know that mac addresses offer no security at all. Though the wireless network I was able to capture plaintext telnet sessions, which included logins and passwords, and I could gain mainframe access from my car in the parking lot. (BTW, don't attempt these types of activitys without your employers permission).
If the admin had done his homework he would have at a minimum turned on WEP (although it is not secure either, but before the crack was out it was thought to be). Finnaly I convinced them to start using the built-in LEAP authentication and a RADIUS server, as well as limiting the access that users could have with their wireless nics (ie, no telnet access though the wireless). With simply a little deeper look into the security aspects of 802.11, the admin wouldn't have opened the huge security hole in the first place.
Re:802.11 can be secure, if the admins know how to (Score:3, Funny)
well duh, it matters! Canada only has, like, three secrets. And two of them have to do with maple syrup. I wouldn't lose much sleep over it.
Wart Rapping? (Score:2, Funny)
Re: Heard of it before... (Score:3, Funny)
Maybe it was here.... [slashdot.org]
Similar story... (Score:2)
It should be EASY (Score:5, Interesting)
I would never use one of those airport systems because ANYONE could be spoofing it. There could be someone sitting next to me with a laptop in his suitcase.
Good Initiative (Score:2)
I like the idea of wireless internet access everywhere, but not though stealing bandwidth of some business with bad security. I feel very bad for the companies being hacked and abused because of the bad security of the wireless solutions they use.
It surprises me that no-one thought of this before the technology was launched.
my vote for new symbol: (Score:2)
Fill in the blanks: (Score:2)
1. Buy the honeypot from this Van Strien fellow, packaged as "a security tool for corporate Wi-Fi users" with "a beautiful user interface". Estimated cost: _____
2. Maintain it. Estimated cost: ______ per month.
3. Keep someone on the payroll to watch for suspicious activity. Estimated cost: _____ per month.
4. When suspicious activity is found.... um... what exactly do you do then?
Alternative 2:
1. Let laptop users connect through Wi-Fi to the company's VPN server, just like the road warriors. Nothing except this server is accessible through the wireless network. Estimated cost: _____
Would anyone fill in the blanks for me? I want to see which one is more cost-effective.
Re:Fill in the blanks: (Score:4, Funny)
2. Maintain it. Estimated cost: ______ per month.
3. Keep someone on the payroll to watch for suspicious activity. Estimated cost: _____ per month.
4. When suspicious activity is found.... um... what exactly do you do then?
You forgot:
5. Profit!
Wardriving is not illegal (Score:5, Informative)
For those of us looking for wireless acess, we just want to check email and check a few web pages. There's no way of telling whether a unsecured wireless network was deliberately unsecured to allow people to access the Internet, (like many people and some businesses - notably, Starbucks - do) or whether it was left unguarded due to ignorance, laziness, or boneheadedness.
If you find people accessing your network and you don't want to share, lock it down. What's the point of a honeypot? To find all those roving bloggers on park benches, obsessively updating their fans on the minutiae of their lives? What are you gonna do when you find them? Slap them on the wrist?
Doesn't everyone realize that this is the future? Unfettered access to information, whether you're in line at the DMV, at the park with the kids, Saturday morning soccer, whatever. What other technology is going to bridge that last mile? Nobody's putting fiber down in my neighborhood. Wireless seems like the best option for fast, ubiquitous acesss to me.
Re:Wardriving is not illegal (Score:2, Funny)
Re:Wardriving is not illegal (Score:2)
Here's a clue: just because you can do something, doesn't mean that you should do something whether it's legal or not. In this case, not.
Re:Wardriving is not illegal (Score:3, Insightful)
You walk into a large public restroom. Is it illegal to bend down to see which stalls you can see people's feet in?
Is it illegal to look at pretty girls (or boys) on the beach? It would be illegal to try to look at them in a dressing room or in their bedrooms, but if they're in public, is it illegal?
If I'm walking down the hall in a hotel, is it illegal for me to look into a room where the door is open? If the door's open, there must not be much of an expectation of privacy at the moment. I don't have the right to walk into that room or to open any closed ones, but I can look to see which ones are open, can't I? And if it's open, I can see inside, right?
The way I see it, it's all just electromagnetic radiation. If you don't want people to see you naked, wear clothes, close the door, whatever. If you don't want people to access your wireless network, use access controls.
The trouble with it all is that some people DO put up public wireless networks. How will you find them if it's illegal to search for them? It's pretty friggin' easy to turn on the basic WEP encryption and not allow people in. The fact that it's insecure and can be easily broken is beside the point here. If there's even rudimentary safeguards against public use, you assume it's private. Otherwise, it's public.
The world you live in would have no wireless access for the masses (because, evidently, you're not allowed to find the access points.) That's a world I don't want to live in, unless you've come up with another way to get fast net access on the go.
Re:Wardriving is not illegal (Score:4, Insightful)
I'm getting really damn tired of the obtuseness of so many people that bend over backward to justify network intrusions. I don't get this fetish over the fact that it's broadcast over EM. So what? You don't need a freaking wire to connect. Otherwise, it's the same as any other network. And, on any other network, you are not presumed to have a right to access network assets you have not explicitly been explicitly been granted, regarldess of whether it's been secured. If someone has their permissions screwed-up on their shell account on some machine, you still don't have a right to go accessing their files. If, as once was common, you find that with your spiffy new cable modem there are suddenly thirty machines in your "Network Neighborhood", you still don't have a right to access those shares, if any. Permission has to be explicitly granted. If you haven't been explicitly given permission to use a WAP, then you are breaking the law by using it.
This isn't about "worlds". I, too, want to live in a world where there are public access wireless networks, just like I want to live in a world where there are public restrooms. The answer isn't to proclaim that all unlocked restrooms are (or should be) presumed "public", but to presume that all restrooms are private unless explicitly labeled as "public". A more thoughtful technology would use a protocol that can explicitly mark a WAP as being public. Until then, it's invasive, self-serving, unethical, and illegal to use a WAP that you don't have explicit permission to use. It just doesn't matter whether it's secured or not. Under the rule of law, the responsibility isn't on the potential victim of an injury to protect themselves from it (such as locking your doors), it's on the perpetrator to not inflict the injury. This marks the difference between the sort of society where the strong are encouraged to prey upon the weak and a society where every human being is presumed capable of moral choice--the onus is on them to choose correctly.
Your restroom analogy is very poor because the whole of it is in the context of a public place. A public restroom is explicitly public. Any random unsecured WAP is not. It's merely unsecured. So, you can "look" under the door, but it doesn't matter because, no matter what, you don't have a right to go in.
New name? (Score:2, Insightful)
Re:New name? (Score:2)
Sniffing for an air biscuit!
Packetmunching.
Tasting the Ether.
Looking for someone peeing into the wind.
Lilypad hopping.
SD
Get similar fake wireless AP software right now (Score:3, Funny)
I do not get it. (Score:5, Insightful)
kind of pointless (Score:5, Funny)
BOFH: Hey, tripwire shows we got a fly in the honeypot!
PFY: (looking out window with binos) Really? It could be that guy at the sidewalk cafe with the notebook out.
BOFH: Heheh, Mr. warwhiz left port 139 open and admin share on! Now where did you put smbclient?
PFY: In daisy/pub. Go for it and I'll let you know of any change in facial expression.
Re-using hobo signs (Score:5, Interesting)
Three slashes over the warchalk symbol.
Evolution (Score:2, Insightful)
True technology evolves -- and this is how these 'environmental' networks will become secure, finally -- not through laws and threats against "hacking"....
expect a response (Score:2)
I suspect that the first problems are going to be identification, notification and most of all entrapment.
This is nothing to fear, there is nothing to fear, but caution should be observed.
Record your activity and the instant you are notified that it is a restricted system GET OUT and STAY OUT.
Do not destroy your records, keep 2 copies in different locations, you may need them.
My larger concern is that these are unregulated frequencies and corporate use combined with prosecution could inspre the less altruistic to push to have them regulated (in the US).
warchalking? (Score:2)
My first warwalk... (Score:2)
Anyway, tinkered around with the settings, rebooted a coupla times, ifconfiged up and down (you get the idea) and before you knew it, 2 APs detected from within my lounge. Walked outside, another 2. Next day, on the way to the the train station - another 6. From the station to work ( a ten minute walk), another 30. Around 50% of these bothered using encryption and when I put the kismet packet logs into ethereal, I didn't have a lot of stuff, but I did get a few web pages browsed and even a few pop3 account emails and passwords.
Now I'm no hacker - I did this warwalk just as I read so damn much about it (on sites like this), but either these companies / individuals want there bandwidth used or they really have completely clueless admins who have no idea what their unleashing on there networks. I feel like emailing the addys I did get with a "please secure your network", but that'd probably go to the poor users who have no idea what they're doing but have been given a neat tool by their IT dept.
So what to do ?
Use the universal geek trap symbol: (Score:4, Funny)
'nuff said.
Why is this so hard? (Score:2, Informative)
What purpose does this serve? (Score:2)
The only purpose of this would be to determine whether people were looking for open networks. I can save them some money right here: the answer is "yes" - now spend your money securing your network instead of hiring consultants and "investigating."
I don't fault the company making the honeypot in this case. They're simply taking advantage of the cluelessness of companies.
I can't imagine why you'd want to BUY this though; renting one should be enough. You rent, you find out people are snooping around, you take the thing back and start concentrating on locking down.
Even better; hire someone to come by once every few months and try to break into your network. If they can, then fix the problem. Repeating this occasionally takes care of the departments/individuals that go down to Fry's and buy a WAP and install it without the knowledge of the IT dept.
Re:2 things (Score:3, Informative)
Well, I wouldn't say you're a dumbass, but no, it does not address most of the security issues
It is trivial to sniff a valid MAC address, and then set your card to be that address.
Re:Isn't it obvious??? (Score:3, Informative)
The actual system is not designed to accept the data as a useful transmision, it's designed just to log what comes in on it's interfaces (probably set in promiscuous mode) and provide an appropriate response, give the hacker what he'd expect to see.
Sure, some brightspock hacker could find a bug in the software, exploit it and gain access, then browse to and remove any log files that might have been kept. But, by the time the hacker figures out it is a honeypot, the computer has already logged and recorded everything he/she has done to probe the network, and how long do you think it is going to take to find an exploit, that would let him / her remove evidence of his / her presence.
I dont hack, but I have to imagine that it's not quite that easy hacking a black box that you have never seen, when it probably runs some custom OS / software that you most likely will never gain access to. The Honeypot has it's own security through obscurity.
Probably, he or she wont bother and will instead walk away, but the data captured by the device will be invaluable in securing networks which are vulnerable to attack.
You will of course, soon find an elite group of hackers that go around specifically searching for honeypots, so that they can find ways of identifying them, and once one of them finds a way it will be passed on as knowledge, then this test will be done by any attacker as a probe first, so that his / her tactics are not exposed to any honeypots.
"Crooks", houses, and wireless (Score:5, Insightful)
Using weak metaphors to argue about computer security gets really old. A closed door, locked or not, is an indication that you're not supposed to go in unless the owner wants you there. Likewise, a WEP-protected network may be easy to get into, but the use of WEP is a sign that you're not wanted there. And just like a house with an Open House sign on the front, my wireless network has no such "go away" signal because I want people to use it. (Of course, just like an Open House sign does not mean "please burn my house down", my 802.11b base station is not an invitation to abuse my network, just an opportunity.)