Using XSS & Google To Find Physical Location 77
wiredmikey sends along a brief (and quite poorly written) report from Security Week on Samy Kamkar's talk at Black Hat last week. In the video, which is amusing, he demonstrates how to obtain location information (within 30 feet, in the example he shows) of a user who does no more than visit a malicious website. The technique involves sniffing out the local router, breaking into it to obtain its MAC address, and sending that to Google to extract the router's location from Google's Street View database.
It's this: (Score:4, Funny)
Apple Computer Inc
1 Infinite Loop
Cupertino, CA 95014
Re: (Score:1)
They're using XXS to access the MAC address.
Way too many S sounds there.
Location is the least of your problems (Score:4, Insightful)
What scares me the most is that to get the location they demonstrate a plausible way to access the settings on your router (if you use the default credentials.) If I was evil (or more evil) I wouldn't care about the location, I would just changed the router's DNS settings and redirect all the traffic through a server of my choice.
Re: (Score:3, Insightful)
Based on my experience, at least 80% of the home routers in use still have the default credentials unchanged since they were unpacked. That's a lot of the population vulnerable.
Re: (Score:2)
In my experience, 100% of routers with default credentials are factory configured to allow access only to addresses within the private subnet used by the router.
Defeating that requires either:
1. Physically going to the location and connecting via wifi to obtain one of the private addresses needed to access the router. While this isn't so hard in a crowded neighborhood, it becomes very dangerous in rural areas where it's harder to remain unnoticed.
2. Compromising one of the machines within the private subne
Re: (Score:2)
INCORRECT:
Kamkar, by convincing the victim to visit his malicious Web site, used remote JavaScript and AJAX to acquire a routers MAC address. When the unsuspecting user visited his malicious Web site, JavaScript remotely scanned for the type of router used, accessed the routers MAC address and sent it directly to him. From there, he was able to utilize Google Street View data to determine the location of a router – in his case, accurate within 30 feet.
Of course the request comes from inside of the subnet. That request, however, is modified by the router before it is sent to the public internet. Certainly, the router knows the MAC address of the original request, but that MAC isn't sent with the request, it's associated with the request by the router.
This attack only targets a verizon fios router using default credentials! Additionally, it utilizes a data source which relates mac addresses to physical locations - which is hardly complete.
Bas
Re:Location is the least of your problems (Score:4, Informative)
Wrong [slashdot.org], wrong [wikipedia.org]. A default password means you ARE vulnerable. It's such a problem that ISPs are willing to do questionable things [slashdot.org] to fix it.
(it's a slight variant of your #2, though "compromising" in this case doesn't mean a full compromise, it means mildly abusing the DNS spec to work around XSS restrictions)
Re: (Score:2)
Based on my experience, at least 80% of the home routers in use still have the default credentials unchanged since they were unpacked. That's a lot of the population vulnerable.
I've got that problem too, but I left mine at default settings because A) I'm silly enough to assume my internal home network is "secure enough" from unauthorized access, and B) it's painfully hard to forget default passwords. That is, of course, unless you're in the majority population of router owners who use stock firmware (because then, of course, you can't remember "admin" to save your f*cking life).
All this talk and proof of concept though has me concerned enough though that I'll go change the creds
Stay classy kdawson (Score:2)
The technique involves sniffing out the local router, breaking into it to obtain its MAC accress, and sending that to Google to extract the router's location from Google's Street View database.
Re: (Score:1)
wiredmikey sends along a brief (and quite poorly written)... ...breaking into it to obtain its MAC accress
Don't be a hypocrite now :P
Not completely accurate (Score:4, Informative)
Re:Not completely accurate (Score:5, Interesting)
Inputting my friend's router's MAC address on his site (here [samy.pl]) results in a location circle about 3km wide and about 10km away from his house. Close, but not close enough.
Should I be worried that Google knows the correct location for a new WAP which I just turned on about a month ago in a small po-dunk town in the middle of nowhere?
I mean seriously--the town has a population of approximately 10,000. It's hardly Austin or New York. Maybe I just timed it correctly.
Re: (Score:2)
I suspect that the location information for many routers is not found via wardriving by google but instead by unwitting submission of the address from the computer by some software (perhaps one of the various google products, or maybe Flash or something) with the permission of the user. Of course, the user probably never read the EULA because nobody ever does.
There may be other ways, perhaps involving GPS-enabled cell devices using various third party software products, or even first party depending on the
Re:Not completely accurate (Score:4, Interesting)
I am pretty sure it is cell phones - I believe [citation needed] that the iPhone (for one) does this as part of the anonymized data sent back to Apple. Google's database is probably kept up to date in a similar fashion.
Re: (Score:3, Informative)
There may be other ways, perhaps involving GPS-enabled cell devices using various third party software products, or even first party depending on the party.
Google Maps on cell phones does that, AFAIK.
Re: (Score:2, Troll)
Re: (Score:2)
Re: (Score:2)
How on Earth are you going to get their IP address from a Facebook post?
Re: (Score:2)
Re:Not completely accurate (Score:5, Interesting)
Worried? Why would you worry about that?
It's public spectrum.
If you want to use it, you gotta play by the rules [gpoaccess.gov], just like everyone else -- including Google*.
If you don't want to, then don't. Nobody's holding a gun to your head and telling you that you must make WiFi available to yourself.
Just turn it off.
Alternatively, take the tinfoil hat off and get over it. This data is useful to folks, and it's all fair game.
For years, now, my first-gen iPod Touch has done a great job of finding where I am using nothing but Wifi signals, even in my own podunk town -- which was useful when I carried it everywhere to complement my (then) lousy cell phone. But by the time I visited Chicago a few months ago, my GPS-capable Droid did a fine job of figuring out where I was with startling accuracy, within a downtown hotel and without a GPS fix.
Meanwhile, I myself have uploaded a few tens-of-thousands of APs with GPS coordinates to Wigle [slashdot.org] during my daily wardriving escapades. I have no idea what gets done with that data, but I do enjoy collecting it, and I like looking at the maps it produces.
But, again. If you don't like the game, then don't play it. The price of copper is down right now, so Cat5e is cheap. So just cable your gear up, and nobody will be able to drive by and map it.
*: IIRC, Google got themselves in trouble recently for accidentally recording Wifi traffic when they thought they were only recording location data. Nobody accused them of this; they admitted it all on their own in a very altruist fashion. You've got far more devious organizations than Google to worry about, if you're still insistent on wearing that stupid tin foil hat.
Re: (Score:1)
Ugh. It seems that I missed a /i in there someplace. Please moderate accordingly.
Re: (Score:2)
I'm hesitant to reply to this, AC, because I suspect you'll never read it at this point.
That being what it is, let me just say three things:
First, I'm really not sure what you're incoherently rambling on about.
Second, cellular telephones were never covered under part 15 of the FCC rules.
Third, *shrug*
Re: (Score:2)
Well my router was located to within about 10 meters. On the country where I lived until around May 2009. I'm impressed.
Re: (Score:2)
Google Latitude (or Skyhook).
The MAC for my neighbor is still half of Germany away, but then, Latitude is almost non-existant in Germany.
Re: (Score:2)
Wow, I let my browser share my details to him, and it was accurate to within 500kM of my current location, scary stuff.
Although it took a good guess as to which of the 7 areas of mainland Australia I was on, it only narrowed it down to 3.
Good news for the anti-fraud workers. (Score:2, Interesting)
Re: (Score:2)
The police just send a warrant to the ISP and get the last 6+ months of activity as well as billing information. No need to bother with breaking into any routers.
Or more likely, the police just files the report of the crime and never investigates.
Re: (Score:2)
Sure, I do that, but the reality is that right now Danish ISP's are FORCED to keep the data. The ISP's have tried to convince the politicians that this is a bad idea, but so far no luck. The same is the case for many other countries, unfortunately.
Re: (Score:2)
Solution : Don't use WiFi ... There will be a physical connection to your router, use it and turn off WiFi
There is a huge amount of people using WiFi on their home router to a fixed PC 2 feet away ...and it's those that get hacked, hijacked, and complain about the connection failing ...
Get a cable plug it in and you are invisible to Google's WiFi snooping ...the nearest they can usually get then is your ISP (Mine is 100 miles away from me)
Re: (Score:1)
Not reliable (Score:3, Insightful)
Any technology that requires the local router to be easily and mechanically hackable is not a reliable one. The title on this post is thus terribly chosen.
On the internet... (Score:2)
Better Explanation (Score:5, Informative)
We've already seen attacks that allow web-sites to break into routers when the default password isn't change, and for example change their DNS servers to servers operated by the attacker. This is an attack that is also assuming the default router password (and address) and retrieving the WiFi mac address, which is then sent back using postback.
You then create a web-site, when someone visits it, it logs into their router, sends the mac address back to the site, which the owner can then search for on Google Maps for that WiFi network giving you a rough location of that person (without about two street blocks).
Re: (Score:1)
Awesome! (Score:1, Funny)
noscript saves the day, again. (Score:2)
So yeah, if you have noscript installed, this is not a threat to you.
Don't be evil? (Score:4, Insightful)
The fundamental question is: Should Google be snooping and publishing MAC locations at all?
Do I have the right to opt out of their system - albeit at the cost of not automatically getting the shortest rout to my nearest pizza place on my iPad without manually entering my address?
What happens when the first battered wife is tracked down and murdered by her husband at a woman's shelter because her hacker smart husband crafts an exploit?
Re: (Score:3, Informative)
The fundamental question is: Should Google be snooping and publishing MAC locations at all?
Did you know there's at least a dozen companies that do this? Did you know Skyhook did this for years before Google?
But I think you're biasing the question by starting out calling it 'snooping'.
Re: (Score:2)
Can't you just stop your router broadcasting its SSID?
That would prevent Google from picking your router up at all.
Let look at this in more detail... (Score:3, Interesting)
Ok a standard home router has 2 interfaces, one to the WAN (the ISP) the other to the LAN. Each of these has a unique MAC address.
The WAN is known by the ISP and hopefully is not used in this example as it would mean he has no clue. (Google would not know it I hope as it should only be know if you actually connect). It could be used for location services to some extent, but the wireless angle would be a red herring
The other MAC address is for the LAN. You do not need to crack the router to get it as the local machine must have it. Just do an arp -a at a command prompt.
Unless Java script is blocked from getting this info. (I do not do Java script coding at that level in Windows)
I also thought Google tossed encrypted packet, so only people who did not care would be vulnerable.
Re: (Score:3, Interesting)
3. Often the MAC address of the internal interfaces and external ones are either a) identical (yes, I've seen it happen) or b) directly related (i.e. add two to the last byte).
Re: (Score:3, Informative)
you sent a doc to Wikileaks? we send a Drone! (Score:4, Insightful)
so this is the real reason for WLAN sniffing of Google!
only NOW possible (Score:1)
This is only now possible as before google did not cache all the router info , of which they are also now in hot water for....many of the states in the US are joining together to review how google seemed to overlook some sort of privacy law to cultivate this data.
IPv6 killer app (Score:1)
If you use IPv6, the attacker may not even have to break into the access point to find your MAC address, because the IPv6 stateless autoconfiguration mechanism will helpfully embed your complete MAC address in your IPv6 address. Such is progress...
No more than visit a malicious website? (Score:2)
So leaving your router wide open is nothing more then visiting a website?
I propose a non-XSS version of this "no frills" attack: obtaining the location of a user who set chrome to tell everyone by default. Run for the hills.
Even wireless non-router APs. (Score:2)
Even wireless non-router APs are listed. It's not just wireless routers.
Correct me if I'm wrong, but ... (Score:2)
... this is only going to apply to people who have one of those routers that deliberately broadcast their MAC addresses over radio waves?
Or does the Google car also stop at your front door, open the letter box, feed a "snake camera" and a network jack in, hunt around, plug into a convenient socket, and then read the MAC address.
Silly Google - there's a port in the garden shed, and it's easy to lift the hinge pins!
Concerned about privacy? Don't use a wireless network. It's not rocket science.
Poor Google - fo