Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

How Wi-Fi attackers are poisoning Web browsers

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
FarCenter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:05 PM
Original message
How Wi-Fi attackers are poisoning Web browsers
Black Hat presenter describes latest public Wi-Fi security threat
By Ellen Messmer, Network World
February 03, 2010 04:00 PM ET

Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to "poison" users' browser caches in order to present fake Web pages or even steal data at a later time.That's according to security researcher Mike Kershaw, developer of the Kismet wireless network detector and intrusion-detection system, who spoke at the Black Hat conference.

He said it's simple for an attacker over an 802.11 wireless network to take control of a Web browser cache by hijacking a common JavaScript file, for example.

"Once you've left Starbucks, you're owned. I own your cache-control header," he said. "You're still loading the cache JavaScript when you go back to work.

"Open networks have no client protection," said Kershaw, who also uses the handle Dragorn. "Nothing stops us from spoofing the and talking directly to the client," the user's Wi-Fi-enabled device.

<SNIP>http://www.networkworld.com/news/2010/020310-black-hat-wi-fi-attackers.html?source=NWWNLE_nlt_daily_am_2010-02-04
Printer Friendly | Permalink |  | Top
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:19 PM
Response to Original message
1. Huh? This makes little sense.
Edited on Thu Feb-04-10 12:22 PM by no limit
Yes, I guess they could get in to your cache but that's a side point from the real problem, that someone started a man in the middle attack on you. That means anything you send out over a non encrypted connection can be read and stored for later. Even data on a secure connection can be seen if the user ignores the warnings their browser puts up about invalid certificates.

And that presents a problem of getting infected with a virus as they can now direct you to infected web pages that try to exploit one of the many vulnerabilities in such programs as Adobe reader or Adobe Flash. But that has very little to do with your internet cache.

Sorry, I don't mean to be anal, but a lot of times these articles completely miss the point for some reason.
Printer Friendly | Permalink |  | Top
 
Better Today Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:23 PM
Response to Original message
2. Seems then it would be a good idea for everyone to know
how to clear their browser cache, to do it before and after every public wi-fi visit, and to not attend one's banking or sensitive personal browsing while at such places.
Printer Friendly | Permalink |  | Top
 
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:35 PM
Response to Reply #2
4. See, this is the problem. The cache is not the problem, clearing it wont do anything for you
These articles are extremely misleading.
Printer Friendly | Permalink |  | Top
 
Better Today Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:30 PM
Response to Reply #4
9. I actually see your point, but given that some will be swayed by
the article, it is a suggestion that should alleviate any worries about the article or your input, given most of us aren't able to verify the likelihood of either opinion unless and until it would potentially be too late.
Printer Friendly | Permalink |  | Top
 
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:37 PM
Response to Reply #9
11. But after reading this article you are left with a false sense of security
It implies that if you browse using a privacy mode on your browser you dont have to worry about it since cache isn't saved. Or that if you clear your cache you will be okay. It's simply not true. Once a man in the middle attack has been launched your cache is the least of your worries.
Printer Friendly | Permalink |  | Top
 
M155Y_A1CH Donating Member (921 posts) Send PM | Profile | Ignore Thu Feb-04-10 12:46 PM
Response to Reply #2
6. IE and Mozilla
The browsers I use both have settings to delete the cache every time you close the browser. If someone is worried about this go to Tools/Options and look for a way to set the cache to delete automatically. If you think you are being hacked just close the browser and the cache will clear.
Printer Friendly | Permalink |  | Top
 
Better Today Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:32 PM
Response to Reply #6
10. The default for Firefox isn't to clear the cache upon closing.
Everyone should check to see what it is set for and alter accordingly. Or leave it alone as a "setting" and just learn how to do an on the fly cache clear.

Printer Friendly | Permalink |  | Top
 
Edweird Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:27 PM
Response to Original message
3. Not Zone alarm , but Firefox keeps that under control. (D'oh!)
Edited on Thu Feb-04-10 01:13 PM by Edweird
Some public places with multiple access points (like the park near my house) appear to be a MITM attack, but I'm ok with that.

Edited to correct inexcusable stupidity on my part.
Printer Friendly | Permalink |  | Top
 
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 12:37 PM
Response to Reply #3
5. If there is a man in the middle attack zone alarm wont stop it
it might inform you of it but all your information will continue to be intercepted. I dont think zone alarm has the capability to know which is the correct mac address and somehow shape the traffic based on that.
Printer Friendly | Permalink |  | Top
 
Edweird Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:07 PM
Response to Reply #5
7. My bad. It's a firefox extension.
Edited on Thu Feb-04-10 01:11 PM by Edweird
D'oh.
I'm even a BT4 pre-final early adopter.
Printer Friendly | Permalink |  | Top
 
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:26 PM
Response to Reply #7
8. But that also wont help you. Your traffic will still be intercepted when a MITM attack is happening
If you know the mac address of the real modem you can configure a static arp table.
Printer Friendly | Permalink |  | Top
 
Edweird Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Feb-04-10 01:54 PM
Response to Reply #8
12. A MAC is the easiest thing to spoof. No matter what, the certs set off warnings.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu May 02nd 2024, 01:39 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC