Drive-By Pharming Attack Could Hit Home Networks 185
Rob wrote in with a link to a CBR Online article discussing drive-by pharming, a new exploitation technique developed by Indiana University and Symantec Corporation. While it's not known if the technique is in use 'in the wild', the exploit could easily co-opt the web-browsing habits of a user that had not properly configured their router. "The attack works because most of the popular home routers ship with default passwords, default internal IP address ranges, and web-based configuration interfaces. The exploit is a single line of JavaScript loaded with a default router IP address, a default password, and an HTTP query designed to reconfigure the router to use the attacker's DNS servers." The article goes on to discuss several related and more advanced techniques related to this one, which security companies will have to keep in mind to guard against future attacks.
Simple solution for this (Score:3, Interesting)
2. Browsers are modified to lookup these hashes in #1 to determine if the DNS servers it is talking to are ok.
The net needs to be more secure and there need to be more checks in place through authoritive sources.
This pharming attack reminds me of when I first installed the doorbell on my house, every once in a while it would go off and nobody was at our door, it turned out that the people across the street had the same doorbell set to the default settings.
Made a mistake, please don't publically flog me. (Score:3, Insightful)
This isn't about wireless! (Score:2, Informative)
Re:Simple solution for this (Score:5, Insightful)
2. Browsers are modified to lookup these hashes in #1 to determine if the DNS servers it is talking to are ok.
A simpler solution would be for the manufactures of these routers to have them refuse to act as routers with any of the default settings. i.e. with the default settings you could connect to it for configuration, but no Internet access until the password, SSID, etc had been changed.
Re: (Score:3, Insightful)
I know, I know. The people who write the manuals don't actually use the products they talk about* so the manufacturer will have to make
You haven't dealt with end-users much, have you? (Score:5, Funny)
Aha, aha, ahahaha. If you DO put it in the documentation, on the top of every page, in red 24 point bold all caps, you will get hundreds of calls from irate users. If you DON'T, the number will be approximately 99% of whatever your userbase actually is. The other 1% will, as usual, stick their tounge in the wall socket to see if it's live before plugging in the device, somehow poke both their own eyes out with the ethernet cable, or eat the packet that says "DO NOT EAT."
Re: (Score:2)
Then all people need is a 3.5 postcard(s) in the box telling them to plug their computer into the router and go to http://192.168.1.1/ [192.168.1.1] and follow the instruction.
I know, its not perfect, but its better - way better - than what's there
Re: (Score:2)
Slightly better solution (Score:2)
Of course, you can still use the router without the installation, and it still has the web interface, so users who know what they're doing toss the CD and just configure it themselves, but I thought it was an interesting solution.
Non-knowled
Re: (Score:3, Funny)
Dude, ATM machines don't even have futuristic features like that. Come back to reality.
http://it.slashdot.org/article.pl?sid=06/09/21/181 9242 [slashdot.org]
Re: (Score:2)
Cars ship with seatbelts and big fat warning signs in the glove box and the top side of the sun visors that tell you to use them, but an alarming number of people don't.
Yet, if your car failed to start if you weren't buckled up, p
Re:Simple solution for this (Score:5, Funny)
If they aren't buckled up, they are going ballistic anyways...it's just a matter of time.
Re: (Score:2)
I didn't look it up, but this is intriguing in a "Hey, where'd that go???" sort of way. So what happened?
I'm the guy who rewired his starer/clutch interlock so I can start without pressing in the clutch pedal (while in neutral or in gear) and tweaked some crap so I can use high-beams and OEM fog lamps at the same time...so I don't see this lasting in my vehicle for long anyway
Signed,
the rock crawling, fat knubby tire, off camber driving, lifted Jeep Wrangler driving nut-case
Re: (Score:2)
Re: (Score:2)
That's really not a bad idea, interlock or not. Loose objects flying around your car during an accident are no picnic.
Re: (Score:2)
Re: (Score:1, Funny)
A. You bought a *wireless* doorbell.
B. You refer to double-stick taping it to your wall as "installing".
C. You left it at the default settings...
Re: (Score:2, Funny)
Last time I checked. . . (Score:5, Insightful)
If you had all your personal papers in a safe, would you leave it set to the factory combination?
Re: (Score:2, Funny)
Exactly. The first thing I did on my router was change the password. A few months later, my forgotten password now locks me out. Does anyone have a safety pin?
Re: (Score:2, Interesting)
If you really can't remember, there is nothing wrong with taping the password to the bottom of your router. If the attacker can gain physical access to your router you have a much bigger problem that wireless security.
You shouldn't do this at your workplace, but at home it is acceptable...
I don't do this, I know the (strong) password of my Access Point
Re: (Score:2)
FYI: The safety pin they mentioned is to enable them to get access to the hardware "reset to factory" button.
Re: (Score:3, Insightful)
You're right of course. But, part of the problem is simply consumer education.
It used to be that only people who knew a fair amount about computers used them. They were a self educating populace. The adoption of computers and home networks by a lot of people has actually happened faster than the corresponding education of people about
Re: (Score:3, Informative)
When I switched from DSL to Verizon's FIOS, I got an Actiontec MI424WR [actiontec.com] router. By default, it was configured with a randomly generated SSID and
Re: (Score:2)
Give that person a cigar!
The moment ease-of-use trumped security was the moment the rot set in. Some t
Re: (Score:2)
Um, why should they? Um, they don't worry about securing their TV, radio, cable box, cell phone, oven, toastor, land line phone, or lamps. How why should they have to actually think and do e
Re: (Score:2)
Re: (Score:2)
The consumer solution probably lies with the manufacturer, possibly via generating a random password as the last step before packaging the de
Re: (Score:3, Insightful)
Then hitting the reset on the router just caused this to happen again with a newly created password.
Viola, no more default passwords.
Re: (Score:2)
Whenever pressed, the button would allow the MAC Addr that had most recently displayed the web page to set a new password (Possibly could allow full access with just the button, forgoing passwords altogether, but that has some security holes if an attacker happened to be on your wireless at the same time--so does the password th
Re: (Score:2)
Re: (Score:2)
Yes, people do. Ever read Feynman's memoirs? He got a reputation in Los Alamos for
being a master safecracker simply because he knew the default combinations the
safes used there shipped with...and nobody ever changed them. In the middle of
the Manhattan Project, nobody ever changed the combinations on their safes.
Chris Mattern
Re: (Score:3, Funny)
President Skroob: Great. Now we can take every last breath of fresh air from planet Druidia. What's the combination?
Dark Helmet: 1 2 3 4 5.
President Skroob: 1 2 3 4 5? That's amazing! I've got the same combination on my luggage! Prepare Spaceball 1 for immediate departure!
Dark Helmet: Yes, sir!
President Skroob: And change
Legal issues (Score:5, Informative)
Right now she has a client that is being sued for quite an amount of money by the music industry for downloading lots of music through P2P services. He claims he never did this, that he never listens to music on his computer.
It turns out that he lives in an apartment block, knows very little about computers in general, but thought that this things with wireless network was really fancy. I think you can figure out the rest of that story, my sister has quite a few troubles convincing the music industry what is obvious, I don't know what the outcome of this case is and if it has been taken to court yet.
According to Danish law he probably has some responsibility and will, even if my sister successfully proves that he did not do the illegal downloading, still somehow get punished for this.
I think there are many interesting legal issues in this.
Re: (Score:2, Informative)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
The reason I don't know about the outcome of this case could be because it is somehow not public information, perhaps it will be at some point, I don't know.
Show your sister this article! (Score:4, Interesting)
Earlier this month the inability to prove who actually did the file sharing caused the RIAA to drop a case in Oklahoma and now it looks like the same defense has worked in a California case as well. In both cases, though, as soon as the RIAA realized the person was using this defense, they dropped the case, rather than lose it and set a precedent showing they really don't have the unequivocal evidence they claim they do.
Re: (Score:2)
In Denmark we have something called anti-piratgruppen instead of RIAA, but they do the same thing as far as I know. This could very well prove useful if my sister has not already found it, even if US and Danish law is probably pretty different.
Re: (Score:2)
I have law-student friends who claim that there are no provisions in the law that can make someone responsible for what other people does with their (legal) stuff, no matter how it's done.
Compare a bypasser grabbing a shovel from my driveway, smashing a kids face in with it. Am I responsible? Hardly.
Re: (Score:2)
not with my 2wire router (Score:5, Interesting)
Re: (Score:1, Informative)
no!! (Score:2)
Comcast (Score:4, Insightful)
Re: (Score:2)
Could some elaborate on this? My understanding was always that cable and DSL providers provide modems to their customers. Do cable ISPs now manufacture, sell, rebrand or distribute "routers", or is the poster talking about Linksys, Netgear et al. consumer NAT boxes purchased by the user?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Good point. The answer is: if my connection starts to not work anymore, they will not be able to tell me "hey, we don't support the OS you're using PLUS the router+modem you're using"... Another aspect is: router+cablemodems are not cheap and not guaranteed to work with "your ISP" (again, no support)... and, of course, Comcast has to do something so your new router+modem works (ie they should change the HWadress) and I'm
Re: (Score:2)
I knew better. When I finaly moved from dial-up to broadband, I specified modem only, no router. On dial-up, I already had a LAN and router including wireless. I was using an Actiontec Dual PC Modem as a narowband modem. I asked for self install, but since I didn't subscribe to TV already, they insisted they send out a guy to set it up. When he showed up, I simply said replace the narowband modem with the cable modem. He mentioned he needed to set up
Re: (Score:2)
I've done that now, and also changed the password to the maximum allowed by the router.
I am using Comcast, but the router is not their equipment. No problem with Comcast, really, and I am satisfied with their service.
Once, during high winds (Katrina) my cable line was brou
So, how do you tell your clueless neighbors? (Score:3, Interesting)
Like this.... (Score:5, Insightful)
[YOU] "Do you have a [brand] router?'
[NEIGHBOR] "Yes, I do."
[YOU] "My computer keeps detecting it, thinking it can log on - did you set a password, WEP ect.?"
[NEIGHBOR] "What's that?"
[YOU] "It how you keep anyone other than yourself from being able to access your internet connection,
if it's not secure, anyone within your routers range can log in....I can help you if you'd like"
The sequel (Score:5, Funny)
(Later)
[NEIGHBOR]
[COP] Sadly, this is what happens when you invite someone you hardly know into your house and put them in charge of configuring your security. How could you possibly have imagined that would be a good idea? But the people who sold you the router are just as much to blame. Nice work, selling a router that the customer then has to ask potentially untrustworthy third parties to configure because the defaults don't work and are hard to change.
[NEIGHBOR] An idiot is me.
[COP] Yes. Yes, an idiot is you.
The sequel to the sequel.... (Score:2)
[NEIGHBOR] Only the guy next door, and *he* says that he didn't see anyone tamper with it...I guess it's a mystery
{COP immediately goes next door}
I don't know about you, but I make an effort to get to know my neighbors, thus, the notion that I would actually suggest helping them with something is not automatically deemed a scam.
Re: (Score:2)
[NEIGHBOR]
[COP] Sadly, this is what happens when you invite someone you hardly know into your house and put them in charge of configuring your security. How could you possibly have imagined that would be a good idea? But the people who sold you the router are just as much to blame. Nice work, selling a router that the customer then has to ask potentia
Re: (Score:2)
I have one such neighbor, and I have considered logging into their wide-open AP and rebooting it or setting WEP keys or some such, but such measures would of course fail, since they are clueless.
Well, being clueless, they will ask their most computer-savvy neighbor for advice. That would be you. You come over and "fix" their AP, and in the course of fixing it "discover" that it is also insecure. Then you advise them on how to properly secure it.
Re: (Score:3, Insightful)
you mean like for example *their* printer?
I did that to some AF guys once. I printed a page with orders to call me in giant letters. They were pretty good natured about it and actually appreciated that I was helping them.
Re: (Score:2)
Another way is to point out gently that it's a problem. Except then, you have made it your problem; and you can expect to be treated like a free 24/7/52 helpdesk forever from then on. Or treated as though it was your fault that it wasn't secure.
Yet another way is to set up your a router of your own, with broadly the same settings as theirs, but with a proxy configured to do something like this [ex-parrot.com]. But don't switch it on just yet. Then, while their
Re: (Score:2)
Actually I have 6 access points in my range (apart from my own 2) and all but one have encryption enabled, most of them WEP. The 'open' one's SSID is 'default', that was a bit of a giveaway. I guess I'm probably in a relatively smart neighbourhood.
X.
The Ah-nold response (Score:2)
Ah, now if we could only invent a way of delivering a swift kick through the internet.
So let's set good passwords (Score:5, Funny)
A big part of the problem is poor documentation (Score:5, Informative)
I also needed to get this router configured on my Linux box...this required that I read some "outside documentation" - where I would learn of such things as passwords, WEP, etc.
Anyway, it turns out the Windows auto-install script set this thing up with no protection what-so-ever. It was only after I read the HOWTO's on the internet that I was able to go back and secure my router for both Linux and Windows.
I lived in a couple of neighborhoods since then and, when I fire up my laptop, there are usually one or two unsecured routers that get auto-detected.
I can only assume there are scores of "average users" with no idea they are sharing their internet access with their neighbors or anyone who "drives by".
Best security software in the world won't do much good if you don't tell the user what it is and how to use it.
Re: (Score:2, Informative)
Anyway, it turns out the Windows auto-install script set this thing up with no protection what-so-ever. It was only after I read the HOWTO's on the internet that I was able to go back and secure my router for both Linux and Windows.
I know it's always hip to bash Windows on slashdot, but to be fair: in Windows XP the applet that handles wireless connections says "unsecured wireless connection" right there in the dialog. The problem here is the software that comes with these access points: they are b
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
After 30 days the number of default confuguration routers in my neighborhood dropped significantly. I forced them all t
Re: (Score:2)
What home networking routers should do is, right out of the box, (a) have wireless off by default, and (b) when they plug their Ethernet cable in, all outgoing port 80 requests get redirected to an internal web server:
Welcome to the RouteCo Pornblaster 2000 wireless router!
Next >>
then (c) gets them to set a password and finally (d) asks them if they want to activate the wireless. Oh, and throw in some legal d
Re: (Score:2)
This sounds familiar. I just set up a "wireless gaming router" on my DSL router (outside the firewall and with appropriate filters to keep the wireless router from accessing the internal network) so that my neighbor would be able to check his email without going to the library, and during the installation process I found out that it can be configured over the wireless link, as I had forgotten to hook up
how nice of symantech to develop this (Score:2)
)80qws()8FAWEJ
SPAM
SPAM
SPAM
SPAM
SPAM
Re: (Score:2)
here's the link to the paper (Score:1)
(NO, it's not one of those malicious URL, it explains how do they work, really!)
This isn't about wireless access! (Score:5, Informative)
This attack also applies to non-wireless routers and routers with properly secured or disabled wireless LANs. The critical flaw is to leave a default password on the configuration interface. The interface is not safe from external attacks just because it's firewalled on the external interface.
What the Phudge? (Score:2)
Re: (Score:2)
It's part of a culture that goes back to The Beginning.
What's the saying from roots? If you don't know where you came from you wont know where you're going.
Re: (Score:2)
These days, it's just idiot reporters who don't bother to actually do their research, coupled with idiot kids who think that misspelling words makes them sound cool. A Hacker is somebody who takes thi
Enough with the goofy terms for this crap (Score:4, Insightful)
The security community is completely pathetic, the #1 motivation of all of this crap are consultants who want to go around and say that they coined the phrase "pharming", or were able to drum up panic over every obscure flaw in Powerpoint 97.
Re: (Score:2)
Re: (Score:2)
Hmmm, considering that these compromised routers will almost certainly end up somehow involved in promoting Ci/-\lis, v1@gRa, and so on, maybe I was right!
Re: (Score:2)
It's an attack where you don't attack the victims directly. Instead you prepare the land (manipulate DNS configurations) and later you harvest what you've sown. The name also expresses the view on the victims: They're seen as an exploitable resource.</blockquote>
That's pretty tenuous... I guess they're running out of words to prepend with "ph".
Seen this and it's scary (Score:5, Insightful)
In my street, there are at least three wireless networks with default passwords. When my friends come around with their wireless laptops, they get a good connection. It most definitely isn't through mine, because my LAN is all wired (in fact, it's still got one length of co-ax in it!) On two of them, the network name was the model of the router. One quick Google later and I had the default password. And it worked -- I had the configuration page up! I almost changed their network name to "uRpWn3d" and setting a new password, just for a laugh and maybe to teach them a lesson, but decided against it; there are ways of pointing out something loose that look less like vandalism than breaking it off.
The real, long-term solution is for routers to be designed not to route packets as long as the password is set to the factory default -- if the password hasn't been changed, then the router should not allow you to connect to anything except its own configuration page. If you do a full factory reset and find yourself able to connect to web sites straight away without deliberately changing the password, then that must mean one of your machines has already been compromised. Then it's better that you stay off the Net until your computers are fixed.
Re: (Score:2)
Imagine trying to convince someone that 1) to run wireless you have to BUY a router 2) even if I had a wireless router I would secure it properly 3) I know what I have in my own house.
Re: (Score:2)
Plenty of other ways to inject exploits like that once you can hijack DNS, none of them remotely traceable if done right.
I call Bull... (Score:2)
Re: (Score:2)
not me (Score:2)
I don't know if I can change the login name (need to check that).
I also added blocks to certain web sites to keep the kids out of trouble.
Things like this make me want to build my own router with an old computer running Linux or
'BSD. Only problem would be getting Roaring Penguin to work with Bellsouth (AT&T!) dsl.
(G-D PPPOE)!) Except that the Netgear box uses SO much less power than an old computer.
Anybody know of a goo
Re: (Score:2)
A Linksys WRT54GL, running OpenWRT [openwrt.org]. I'm in the midst of replacing my 486-based firewall and cheap 802.11 access point with it.
Drive-by pharming procedures (Score:2)
2) Stop. Park.
3) Milk cows.
4) Feed chickens.
5) Slop pigs.
6) Stack hay.
7) Profit.
Oh noes (Score:2)
Re: (Score:2)
Meanwhile, I finally told him the router's password, which has been the same for the past 5 years. Suffice to say, any household without a tech-viable consultant is potentially vulnerable.
Re:Moo (Score:4, Informative)
They can be configured that way, but usually by default, they are not. I know that Linksys has the option, but Wireless management of the router is not disabled by default.
Beside that, the title was a bit misleading with the term "drive-by". This exploit has nothing at all to do with a wireless LAN.
Basically:
Re: (Score:2)
The request to change the settings is coming from your PC. You just have to visit a malicious web page that has a bit of JavaScript that calls up another web page in an iframe
Now you are no longer using your ISP's n
Re: (Score:3, Interesting)
Re: (Score:2)
In a lot of situations one keeps their lock set to 10-20-30 and then sets in the new combination just before using it. After finishing the task with it then the combination is reset to 10-20-30.
This is especially true when transporting launch codes, missile computer tapes, etc. that require a high level of security.
Re: (Score:2)
Re: (Score:2)
Many (most) people set up thier computers on the LAN using DHCP as it is less difficult than setting up Static IP, manualy configuring a Gateway address and DNS server.
There are a few geeks like me who set everything manualy and a few OS'es that have some default DNS set up quite well such as Ubuntu.
We tend to be a little more immune to DNS server attacks because we have longer lists, so one server out is no
Re: (Score:2)
Er, yes, I'd think so - you'd have to add a per-unit provisioning step to the production line, and a new database (or new hooks into an existing one), and, hardest of all, some way of getting the password to actually match the serial number label.
Then, you'd have to have a back door, for the units that went out with the wrong password, resulting in the owners of their brand new doorstops phoning up for support. So, you'd also have the expense of more training for support, rejigging the