Home > Best practices, Wireless security > Karmetasploit: Integrated Tools Lower Bar On Hacking Wireless Clients

Karmetasploit: Integrated Tools Lower Bar On Hacking Wireless Clients

Metasploit Framework integrated with KARMA! Metasploit is most potent security penetration and exploit development platform, while KARMA is a potent Evil Twin (Honeypot) tool with attracts unassuming wireless clients. With this integrated tool, it is all the more easier to establish wireless connectivity with probing wireless clients and “Metasploit” them.
http://trac.metasploit.com/wiki/Karmetasploit
http://blog.trailofbits.com/karma/

It has been consistently observed that wireless clients are at great risk of falling prey to Evil Twin because they keep probing for wireless networks in their preferred network list (PNL) all the time. Users often connect to wireless networks at various places and later forget to “clean up” the PNL. For example, the study performed by AirTight at airports worldwide showed large percentage of clients probing for undesirable SSIDs form their preferred network lists.
http://www.airtightnetworks.com/home/resources/knowledge-center/airport-scan.html
This finding was reinforced with the recent scan of financial districts.
http://www.airtightnetworks.com/home/resources/knowledge-center/financial-districts-scanning-report.html.

 

These realities and developments underscore need for protecting wireless enabled laptops from Evil Twin (Honeypot) and misassociations in general, i.e., wireless connections of clients to APs other than authorized APs.

 

Hemant Chaskar

Hemant Chaskar is Vice President for Technology and Innovation at AirTight. He oversees R&D and product strategy for AirTight Wi-Fi and WIPS; and also performs roles in technical marketing, business development, and customer facing activities. Hemant has worked for more than 14 years in the networking, wireless and security industry, with 9 years in Wi-Fi. He holds several patents in these technology areas and has Ph.D. in Electrical Engineering from the University of Illinois at Urbana-Champaign. Follow on Twitter @CHemantC.

Twitter 

Best practices, Wireless security , , , , , ,

Comments

  1. June 4th, 2009 at 17:52 | #1

    Hi, cool post. I have been wondering about this topic,so thanks for writing.

  2. June 2nd, 2009 at 08:36 | #2

    Hi, cool post. I have been wondering about this topic,so thanks for writing.

  1. No trackbacks yet.

Your email address will not be published. Required fields are marked *