Archive

Archive for the ‘Wireless gadgets’ Category

Smart Mobile Devices — “Stress Test” for the WIPS of the Future

March 22nd, 2012

Traditionally, talking of wireless security in the enterprises we talked about embedded Centrio Wi-Fi, Linksys rogue APs, open source DoS tools, and compliance requirements (PCI, DoD, HIPAA). While these topics continue to be important today, the upcoming proliferation of the smart mobile devices is the new frontier for the enterprise wireless security to address. The inundation of smart mobile devices will result into new monitoring requirements, not hitherto discussed. These requirements would amount to ”stress test” for the WIPS and only the best of the breed can hold up. While the new monitoring requirements will be many and varied ranging from unauthorized BYOD to heightened rogue AP risk, in this post I wish to discuss some interesting and unique scenarios (numerous soft mobile hotspots, Nintendo chat blocking, wireless geo-fencing) I already encountered this year working with the customers.

Read more…

Wireless gadgets

Are Smartphones the New Platform for “Mobile Hacktivism”

May 9th, 2011

There’s been a lot of news in recent weeks surrounding the Sony PlayStation Network breaches.  One of the questions that I have received multiple times since this started is whether or not this was a wireless breach or if wireless was  in any way part of the Sony vulnerability.

From what we understand, no.  It sounds like web servers were compromised.  But could these types of attacks happen over Wi-Fi?  You bet.

“Hacktivists” essentially volunteer to participate in these coordinated attacks. The tools used are often easy to use and freely available.  They just need people willing to join the cause to create the distributed denial of service.   Firewalls are supposed to keep the “bad guys” out, but there is nothing stopping anyone from putting these same tools on a smartphone and carrying out these same attacks from INSIDE an organization, not just remotely from the Internet.

These same techniques used against Sony, MasterCard, and Visa as well as the type of attack that breached TJX can now be launched from personal smart devices (Iphones, Ipads, Androids, etc.) inside your network.   In fact, Gopinath K.N., Director of Engineering at AirTight Networks has demonstrated just this type of scenario at various security conferences and on-line presentations.  See his demo here.

Additionally, smartphone malware can be distributed in the form of an application easily downloaded from the Internet (think of all the gaming and social media apps available for iPhones and Androids). Its really no different than how PCs become infected with worms, viruses and malware by visiting untrusted sites and downloading insecure applications.

Once the malware is installed, if that compromised smart device attaches to the corporate network, the malware can be used to launch a stealthy attack from inside the corporate network – with or without the knowledge or consent of the smart device owner .  Sensitive data could even be sent off-site via the device’s own Wi-Fi or 3G radio.

Considering that smart devices and tablets now outnumber PCs in new sales, this may not be so far fetched.  A major difference between PC security and smart devices is that the tools to detect and defend PCs from these vulnerabilities is significantly more mature and widely deployed then smartphone security in practice today.  Organizations need to determine whether or not unauthorized smartphones are allowed to attach to their Wi-Fi  networks (guest and corporate), and how they will enforce wireless security policies to keep themselves secure.

Wireless gadgets

SIMFI: Convert your cell phone into a WiFi honeypot!

February 16th, 2010

My previous post “WiFi Hots(Honey)pots Go Mobile” (http://blog.airtightnetworks.com/wireless-security-mobile-hotspot/) talked about Palm Pre/Pixi Plus going the hot(honey)pot way.

SIMFI is equally cool – it can convert your cell phone into a hotspot. SIMFI is of the size of a SIM card and has WLAN modem built into it. It can be pretty much used with any phone. Check out http://www.techchee.com/2010/02/13/simfi-wifi-integrated-sim-card-turns-your-cellphone-into-a-wifi-hspa-router/ .

I am looking forward to get my hands onto one of these.

So, looks people don’t need to carry APs anymore to mess around with enterprise security :)

Wireless gadgets

WiFi Hots(Honey)pots Go Mobile

January 22nd, 2010

Are you already having trouble preventing your enterprise Wi-Fi clients from connecting to some of the existing public Wi-Fi networks (e.g., T-Mobile, Google WiFi)?

 

Mobile Hotspot with an option to create an Open Network

Mobile Hotspot with an option to create an Open Network

 

Guess what – the latest Palm Pre Plus or Pixi Plus can be converted into a cool mobile hotspot. One can easily roam around with this pocket hotspot. (http://www.nytimes.com/2010/01/21/technology/personaltech/21pogue.html)

It is amazing as to how some of these cool technological advances can create new avenues for attacks. Suppose an employee or a visitor wishes to sneak-in a hotspot or a honeypot AP into your enterprise. If you are paraniod, you can possibly think of frisking him for an AP (before allowing him into your premises). But, can you go to the extent of preventing him from carrying a Palm into your enterprise?

Wireless gadgets, Wireless security

How “soft APs” can create “soft spots” in your network security

November 13th, 2009

In several of my recent wireless scanning exercises, I have encountered soft APs much more often than before. In one case, it was an employee who returned from business trip who had used USB WiFi AP in hotel to share his Internet connection with fellow workers (well, they did not all want to pay $5 per hour, if they can get around by paying only once!) and did not care to remove it from laptop before connecting into enterprise network. In another case, it was an employee in no-WiFi organization who used to impress others by creating soft AP on his Window’s laptop for others to access. The moral of these stories is that the occurrence of rogue AP on the enterprise network in the form of soft AP has become more pronounced of late. I think the reasons behind this are the ease with which operating systems (notably Microsoft Windows) allow soft AP configuration on embedded WiFi interfaces as well as off-the-shelf availability of PCMCIA cards and USB sticks designed for soft AP operation. It is also worth noting that soft AP is also a perfect “solution” to put rogue AP on network evading wireside controls such as 802.1x, NACs and wireside-only rogue AP scanner.

So what is a soft AP? Soft access point (AP) is a laptop or other such wireless enabled device which performs traffic forwarding between its wired and wireless interfaces. If the wired interface of such device is connected into enterprise network, soft AP acts as rogue AP on the network. It can be accessed on the wireless side by unauthorized users who can then get bridged to wired enterprise network through the soft AP. Easiest way to create soft AP on Windows laptop is to enable bridging or ICS between its wired and wireless interfaces. Another easy way to create soft AP is to plug USB devices such as Windy31 in the laptop which then auto-configure rest of the things required for soft AP operation.

So it becomes imperative that protection from soft APs be an important consideration while evaluating WiFi security posture of enterprise networks.

Wireless gadgets, Wireless security , , , , ,

Using neighborhood wi-fi to get kids into the car

June 16th, 2009

My 12 yr old son was fiddling with his iTouch in the back seat of the car last week when it finally dawned on him that he could see several available wi-fi networks in our neighborhood from the front of the house . “Hey, I can connect to Marci’s wi-fi ! Can we sit in the driveway for a couple minutes so I can download some songs?” 

Hmm.. Maybe I can use this to my advantage to get the kids in the car so we can actually be someplace on time.  “Hey kids, better hurry, you only have 3 minutes to download songs before we go to the dentist.”

Wireless gadgets ,

Voice Mobility powered by Wi-Fi Telephony

June 15th, 2009

Wi-Fi telephony is the upcoming technology that can be set up on existing enterprise Wi-Fi network and empowers enterprises with voice mobility benefits in an easy, scalable and cost-effective way.

Increased deployment of superior Wi-Fi networks to achieve wireless data access and increased adoption of VoIP technologies to make cost-effective calls has led the concept of Wi-Fi telephony to emerge in the recent years.

With Wi-Fi telephony in place, voice mobility can be achieved in an easy to use and inexpensive way. Voice mobility in general refers to flexibility for users to make telephone calls from any place within a premise. Enterprise premises empowered with voice mobility have more productive employees, increased employee convenience and improved business process resulting in faster decision making, increased responsiveness and greater overall productivity and efficiency. Read more…

Wireless gadgets , ,

MiFi = WiFi on the move!

May 15th, 2009

Interesting gadget from Novatel/Verizon that lets you carry your WiFi hotspot with you. You can even share it with your friends. Check this out!

Wireless gadgets ,