Updated: 7/14/02; 10:09:25 PM.
The Daily Blog
Network Computing Site News and Stuff
        

Wednesday, April 17, 2002

War Driving, Coming to a Neighborhood Near You

If you don't already subscribe to our weekly mobile newsletter, you should take a quick read through the following article by Dave Molta (our editor at large for the newsletter). In it he outlines some methods used by war drivers to pinpoint wireless access points.

Hackers are on the warpath again. Some call today's tactics war driving. Others call these efforts Net stumbling. Whatever the moniker, it's coming to a city near you. And maybe even to your neighborhood.

But what exactly is going on? What exactly is war driving? It's a variation of war dialing, an old hacker tactic that dates back to the good old days when analog modems were king. Hackers would develop scripts that dialed all the possible numbers in an exchange to determine which ones were attached to a modem. Once the hot phone numbers were discovered, a series of known hacks would be applied in an effort to break into whatever was attached to a modem.

War driving simply reflects the times. It involves a search for 802.11 wireless networks. While it's only been around for a year or so, here's how war driving usually works: Most war drivers cruise around metropolitan areas in their cars with wireless-equipped notebook computers and high-gain antennas capable of detecting signals at long range. Recently, however, some war drivers have begun to step over the legal line a bit by using RF amplifiers.

Most war drivers are not sinister in nature. They're usually just a little over- curious. Many are security consultants trying to garner some media attention. That's not so bad, is it? Maybe not, but would you feel a little differently if the war drivers were mapping your neighborhood and then publishing the results on the Internet? Thanks to a software product called Netstumbler, a war driver equipped with a portable GPS device can now pinpoint the exact location of access points, which then can be easily transcribed onto a map.

Netstumbler not only allows hackers to identify the geographic coordinates for access points, it also determines whether any security provisions have been implemented as well as pinpoints the 802.11 service set identifier that is configured on each access point and is normally broadcast periodically using beacons.

In his project in the Research Triangle Park area of North Carolina, Alan Clegg found that only a very small proportion of access points in residential neighborhoods employ 802.11 WEP (wired equivalent privacy), a technology that provides privacy by encrypting data streams and prevents clients who don't know the right WEP key from associating with the access point. In areas with more businesses, Clegg found a greater percentage of locations have WEP enabled.

If you've followed the wireless LAN business for a while, you probably are aware of the fact that WEP has been successfully hacked. In fact, security experts refer to it as "totally insecure." And they are correct, to the extent that available public-domain software will allow a hacker to capture your WEP keys by mounting a passive attack. However, the hacker does need to capture a significant amount of data to successfully compromise the system. For that reason, most security analysts recommend that WEP be used to provide a first line of defense, despite its penetrability if an attacker is motivated. How many hackers do you think are willing to park their cars outside your business with a directional antenna poking out of the sunroof for a half-hour collecting enough data to crack WEP?

Should you be concerned? Yes. Some users dismiss the security threat by asserting that the only consequence is another user sharing their Internet connections. However, since the attack effectively takes place inside your network, any local LAN services -- including file shares -- are also exposed.

Are there steps you can take to further protect yourself? Yes, to a limited extent. If you're a home- or small-office user, you probably can't really afford to implement a robust security overlay. But you can at least add MAC-address restrictions, provided your access point supports that capability, which most do. Since wireless traffic can be captured using a wireless protocol analyzer and MAC addresses can be spoofed, you're still not totally secure; but at least you have a deterrent. And given the number of wireless networks that are totally open, you don't need much of a deterrent to get a war driver to continue driving down the road.

If you're working in an enterprise setting, you may find these war driving tools useful for auditing your company's wireless security policy (you do have one, don't you?). Rogue access points (usually low-cost, wireless NAT gateways) are being installed in many offices, and because these connections are usually inside the enterprise firewall, they represent a significant security threat. Given the technology's appeal, I'm glad I don't have to be the one pulling the plugs on peoples' wireless connections. But if I had to, I'd certainly do it.



Posted by Brad Shimmin at 4:38:06 PM   comment on this post  >>[]


© Copyright 2002 CMP Media LLC.
 
April 2002
Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30        
Mar   May



site surf