[MLB-WIRELESS] More on Wifi security
gabrielle harrison and Paul van den Bergen
gabpaul at melbpc.org.au
Mon Aug 14 14:51:49 EST 2006
yep, sounds about the size of it... It's the right guy (Johnny cache) at
least, and device implementation is the right subject.
the hype is (presumably) intentional as a mechanism to prod/publicity
stunt at Blackhat to get attention about a serious design flaw.
On Mon, 14 Aug 2006 14:36:02 +1000, Troy Mitchell <txrx at eridu.net> wrote:
> Looks like they are referring to this:
> (in a hyped-up mainsteam media kind of way..)
>
> http://www.defcon.org/html/defcon-14/dc-14-speakers.html#Cache
> Fun with 802.11 Device Drivers
> Johnny Cache
>
> Abstract:
> The 802.11 link-layer wireless protocol is widely known for its design
> flaws. Unauthenticated management packets, a ridiculous attempt at
> providing
> link layer confidentiality and authentication (WEP), and general vendor
> stupidity have all contributed to 802.11 being the most sensationalized
> protocol ever mentioned in the media.
>
> All of the above topics have been beaten to death. Instead this talk
> explores new advances not in design problems in 802.11, but in
> implementation issues. The two major advances in 802.11 security will be
> covered, device driver vulnerabilities and link layer fingerprinting
> techniques. 802.11 fingerprinting represents the first time that a
> link-layer protocol has been vulnerable to finger-printing attacks. These
> attacks can provide useful information to the attacker, allowing him to
> accurately target the latest weapon in any wireless hackers arsenal:
> 802.11
> device driver exploits.
>
> Bio:
> Johnny Cache is responsible for many wireless hacking tools. These
> include
> jc-wepcrack (a distributed wep-cracker) jc-aircrack (a complete aircrack
> re-write in C++), and also helped h1kari create pico-wepcrack (a FPGA
> accelerated WEP brute forcer). Cache is currently pursuing his Master's
> degree in computer security. He is also co-author of "Hacking Exposed
> Wireless". His latest accomplishments can be found in Airbase, available
> at
> www.802.11mercenary.net
>
>
>
> -----Original Message-----
> From: melbwireless-bounces at wireless.org.au
> [mailto:melbwireless-bounces at wireless.org.au] On Behalf Of Steven Haigh
> Sent: Monday, 14 August 2006 1:52 PM
> To: melbwireless at wireless.org.au
> Subject: Re: [MLB-WIRELESS] More on Wifi security
>
> On 14/08/2006, at 1:04 PM, gabrielle harrison and Paul van den Bergen
> wrote:
>> just when I thought it was safe again.
>>
>> warning - article short on detail.
>> http://www.theage.com.au/news/wireless--broadband/hacker-exposes-
>> security-flaw-in-wireless-computers/2006/08/03/1154198254214.htm
>
> Wow. I read two pages of text and think I became dumber in the
> process :p
>
> Does anyone have any real details on just what on earth they are
> talking about? Something about hacking the driver to take control of
> the machine?
>
--
Dr Paul van den Bergen
Chance favours the prepared mind
More information about the Melbwireless
mailing list