tag:blogger.com,1999:blog-37798047.post1231906134988167383..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: The Ad-Hoc WiFi VirusDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-37798047.post-33701642100380031152007-09-07T12:26:00.000-04:002007-09-07T12:26:00.000-04:00i frequently perform wireless assessments for work...i frequently perform wireless assessments for work, and no matter what office you goto you will always find "Free Public Wifi" I have even go so far to bring a compact access point with me, and configure it to broadcast with that ssid to capture people. I think this is something Microsoft should address soon... you can see people sending beacons for what networks they wish to be on, all it takes is creating that network in an office building and you now have a dual homed box to attack.Unknownhttps://www.blogger.com/profile/03998475721352941286noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-79579738939191029592007-01-23T17:56:00.000-05:002007-01-23T17:56:00.000-05:00That totally reminds me of this great quote from t...That totally reminds me of this great quote from this great movie.<br /><br />"A few words here about following people. People know they're being followed when they turn around and see someone following them. They can't tell they're being followed if you get there first" -Darryl Zero, Zero Effect<br /><br />Isn't WiFi stalking probably the #2 best way to do penetration-testing? The number 1 method has still got to be throwing backdoored USB keys around the parking lot. Except that now a lot of people know about these.drehttps://www.blogger.com/profile/17414510788948258195noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-87410210797782514272007-01-23T15:44:00.000-05:002007-01-23T15:44:00.000-05:00We are looking at it from a slightly diffrent poin...We are looking at it from a slightly diffrent point of view.<br /><br />http://www.blackhat.com/html/bh-dc-07/bh-dc-07-speakers.html#Maynor<br /><br />You have a good cahnce of telling where a person has been with their laptop with this method.David Maynorhttps://www.blogger.com/profile/09921229607193067441noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-64428505989691080462007-01-23T14:54:00.000-05:002007-01-23T14:54:00.000-05:00Yes, but is it a vulnerability?
Hello, 169.254.0....Yes, but is it a vulnerability?<br /><br />Hello, 169.254.0.0/16.<br /><br />This is like a year old, there was an advisory awhile ago. I don't think Microsoft fixed it yet; please somebody correct me on that.<br />http://www.nmrc.org/pub/advise/20060114.txt<br /><br />I also found one interesting link in there - KARMA<br />http://www.theta44.org/karma/<br />which has an AP written for madwifi that will say hello to any SSID.<br /><br />This is obviously dangerous when combined with WiFi fingerprinting to get the make/model of the card and attack the driver directly with a kernel exploit (there were a few) or lorcon.<br />http://www.802.11mercenary.net/lorcon/<br /><br />Of course, you could always MITM and get on their machine very quickly through a browser exploit.drehttps://www.blogger.com/profile/17414510788948258195noreply@blogger.com