Article

Wi-Fi access points go nuclear

Victor R. Garza, Contributing Writer

Every hacker knows the value of using an insecure wireless access point [AP] to compromise a network, but that appears to have escaped the attention of the U.S. nuclear power plant at Comanche Peak.

    Requires Free Membership to View

For more information

This article originally appeared on SearchSecurity.com.
Hackers beetle and Bruce Potter of the self described "non-profit think-tank" Shmoo Group, launched into a Black Hat presentation on wireless security issues by showing an image of a Cisco-branded AP and the network subnet address in use by the plant.

Beetle went on to discuss the ease with which a malicious attacker could redirect a hapless user to a rogue AP instead of a legitimate one at a public hotspot. Any one of several different attacks could be used to either corrupt a network or take it over completely.

Bruce Potter then described the Hot Spot Defense Kit version 2 [HSDKv2] which looks for directed rogue AP attacks against wireless clients and presents the user with a simple green [secure] and red [insecure] indicators. He drove the point home by stating, "If you're in downtown Baltimore, and someone starts shooting, you tend to freak out, even if they're not shooting at you…wireless shouldn't be any different."

HSDKv2 will be a WiFi environmental monitor of sorts looking for a variety of different attacks, including those from Bluetooth devices. While still under development, HSDKv2 should be out in the near future. Beetle stated that the Shmoo Group wants to make it easier to use, because "if security software isn't usable, it's useless."

Shmoo Group member CowboyM demonstrated just that when he brought out the 802.11bloodhound, which looks like a futuristic handheld pistol. Used to either sniff or disrupt wireless traffic, the device consists of a PocketPC, amplifier, rheostat, battery and patch antenna. The device can pickup WiFi network traffic from several miles away and can easily overpower closer proximity WiFi APs.

Perhaps news of this device will prompt enterprises, as well as nuclear power plants, to revisit their use of wireless APs and make sure their networks are secured against such an easily exploitable threat.

About the author
Victor R. Garza is a technology/security consultant and lecturer at the Naval Postgraduate School in Monterey, Calif.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: