[86899] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Wifi Security

daemon@ATHENA.MIT.EDU (Jim Popovitch)
Mon Nov 21 14:31:33 2005

Date: Mon, 21 Nov 2005 14:30:53 -0500
From: Jim Popovitch <jimpop@yahoo.com>
To: Randy Bush <randy@psg.com>
Cc: Niels Bakker <niels=nanog@bakker.net>, nanog@merit.edu
In-Reply-To: <17282.7121.23051.255792@roam.psg.com>
Errors-To: owner-nanog@merit.edu


Randy Bush wrote:
>> As others pointed out (to me as well), for a _man in the middle_ attack 
>> (e.g. impersonating www.paypal.com) it is necessary to play ARP games or 
>> otherwise insert yourself in the flow of traffic.
> 
> not really.  you just need to be there first with a bogus, redirecting,
> dns response.

I wish I had a nickel (ok, a dollar) for every bogus laptop I've seen in 
hotels and airports that was setup for "co_presidents_club", 
"starbucks", "t-mobile" AND "tmobile", "corporate", etc.  I've often 
wondered if those users were really being malicious, plain stupid, or 
were carrying around a laptop "owned" by someone else.  Either way, 
there are PLENTY of systems out there pretending to be something they 
aren't.  I often try to connect to them and get some data, but most 
either won't give an IP, or if they do, they don't forward packets or 
respond with anything worthwhile.  I run a pretty tight system, so 
perhaps those faux APs are trying to detect other configs (Client for 
MS/Netware, F/P Sharing, SNMP, WINS, IPX, etc).

-Jim P.



home help back first fref pref prev next nref lref last post