Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет lepestriny ([info]lepestriny)
@ 2011-01-09 18:49:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
"Киберанархизм в действии"
Security researchers from Berlin-based firm, Critical Engineering, uncover the technology behind a small, seemingly harmless device that's causing havoc at hotspots throughout Europe.


With such cheap components Kotla and his team were eager to find out just how the device worked. Plugging in cables to the TX, RX and GND pins they were able to communicate with the device using a Sparkfun USB Serial TTL module and a client-side program called minicom.

When plugged in the device boots up automatically, looking for an open wireless network or any network for which it already has a password - something often given for the price of a coffee. It then reverse SSH tunnels (using SSH keys) to a foreign server, allowing a remote user on that server to SSH back into the machine from afar, issuing commands as they see fit.

The device then performs a sophisticated modification of the Address Resolution Protocol (ARP) Table on both the hotspot hardware and the clients associated with it. These include iPhones, Android devices and laptop computers.

The ARP table on a computer network is special list cached by all devices on a network. Vital for network function, it couples actual hardware addresses with the network address issued by the access point. The table is updated by responses to ARP requests, special packets sent by devices on every Local Area Network. By responding to these requests with false mapping, the client can be tricked to believe it is conversing with the router -and vice versa- when in fact all traffic is passing through the rogue device.

The device becomes the puppet master of the local network, able to intercept and modify all content..



http://newstweek.com/2011-01-07-device-distorts-news-on-wireless-neworks
via [info]digital_books@lj