Episode78

From Paul's Security Weekly
Jump to: navigation, search

Episode Media

mp3

Tech Segment: Kismet Drone on OpenWrt Kamikaze Using Madwifi

Last week we detailed how to setup kismet drone running on the older version of OpenWrt called "Whiterussian". This week I think I have it stable enough to detail how this setup will work on Kamikaze using Madwifi with an Atheros chipset. Why? Well, this solves three critical problems we have when running this using a the Broadcom chipset found in the WRT54G:

  • We only see traffic in the 2.4GHz band using 802.11b/g
  • We can not obtain signal strength information
  • Channel hopping must be done with an add-on shell script and not done by the chipset

We solved these problems by using the following setup:

  • Asus WL-500G Premium
  • EnGenius 300mw Atheros mini-pci card
  • OpenWrt Kamikaze, Latest build as of 7/27/07
  • Kismet-devel, build 2163 compiled with the above

Once you've gotten the above installed you will need to install the compiled version of kismet that I did yesterday :)

ipkg install http://pauldotcom.com/kismet-drone_2163-1_mipsel.ipk

Now you will need to put your card into monitor mode:

wlanconfig wifi0 create wlandev wifi0 wlanmode monitor

Now, I do hope to integrate this into OpenWrt, as in working on getting the development version of kismet into the official package tree and using the /etc/confg/wireless configuration file to setup monitor mode. Once you've done that, you will need to edit /etc/kismet/kismet_drone.conf:

source=madwifi_g,wifi0,wireless

Startup Kismet Drone and you're off and running! I compiled the development version of kismet client for OS X and it works like a champ, for the most part. I still get an error stating "Arguement list too long", which relates to some problems that Kismet has with madwifi-ng. I did see some fixes for madwifi-ng go into the latest trunk for kamikaze, which I have not had a chance to test out. So, I am hoping that this setup will become more stable. I also need to test 802.11 packet capture as well. I found a command, iwpriv ath0 mode 1, which claims to put the adapater in 802.11a *only* mode. But still have some work to do to make certain I am getting all 802.11a/b/g.

Stories For Discussion

DNS Pinning: What's all the buzz about? - [PaulDotCom] - Many have been talking about DNS pinning, and esp Anti DNS Pinning which circumvents browser protections for script code to access web sites it did not originate from. It will be covered at Black Hat in a few people's talks, see article.

Data sharing? Sometimes too much! - [Larry] - Sure, sometimes data sharing between partners can be a great thing for business. However, what happens when your partner doesn't take securing the data as serious as you do? This is why agreements are great. Make sure that agreement gives you the ability to audit their practices, has accountability, and sever-ability on breach...

Buffer Overflow Strikes tcpdump - [PaulDotCom] - A message to all users of Backtrack and other CD ISOs, you need to update. If there is no patch available, don't use this software. This appears to be a very easy vulnerability to exploit, "Based on an unfiltered integer overflow in the print-bgp.c file, specially crafted border gateway protocol (BGP) packets may cause a buffer overflow in a snprintf() function". How long has that vulnerability been present? Looks like its not the first time the BGP handling code has been exploited. Yikes...

TOR Jihad! - [Larry] - We always hear about using hacker tools for good. Keep in mind that it is a two way street, as apparently some Jihadists have some tutorials on using TOR (a tool for good) in order to hide their activities.

Bulletproof Hosting? - [PaulDotCom] - Can't Google do something about this? There has to be a way for Google to come up with a SPAM rating, I mean come on, they produce some awesome stuff like Google Maps, but then let silly things like this get through. I'm not saying filter it, but a rating system of some kind or warning would be nice. Then again, false positives would really piss ppl off.

Spoofing TCP/IP Fingerprints with Windows - [Larry] Security Cloak is a tool for changing TCP/IP timestamp and window options for TCP/IP in the windows registry. I can think of a number of times where this may be useful.

Social Networking Sites Leak Data - [PaulDotCom] - Well duh, if you but your birthday on MySpace! This is stuff that we as security professionals already know, but its part of our duty to inform everyone else. So the next time your sister or friend talks about how they put their cell phone number on myspace, don't let them!

Hacking Without Exploits - [Larry] - HDM's talk at BlackHat and DEFCON. I'm going to try to check it out, so I'll have the skinny. But, in a nutshell, HDM will be talking about a bunch of things that he fells pen-testers miss, and are hard to test with automated tools, given the variations in client site configurations...

Anti-Botnet Technology? - [PaulDotCom] - The web site claims all sorts of good stuff, but how does it work? Where is the research to back this up? Sometimes I believe products do more to give people a false sense of security than they to do actually protecting people from threats. How does this protect you any better than Spybot, Ad-Aware, and Free-AVG combination?

Wireless Arp Storm Vulns for Cisco - [Larry] - Instead of pwning the iPhone, the iPhone pwns j00! Wow, what a stupid bug for DoS. You'd think that Cisco's engineers would have thought about and tested this functionality...given the nature of the bug, and the nature of wireless clients.

BIND vulnerabilities, time to upgrade! - [PaulDotCom] BIND vulnerabilities releated to cache poisoning attacks. A good time to talk about recursive queries too!

Its the Pwnie Awards! - [PaulDotCom] - Nominees for awards that include " Best Client-Side Bug" "Most Over-hyped Bug" and "best song"?