[LINK] The Degree of Peril in an Insecure Wifi Network
Roger Clarke
Roger.Clarke at xamax.com.au
Mon Jul 18 13:16:34 AEST 2011
Good points, thanks Paul.
But:
(1) I have my firewalls configured on the individual devices within
the subnet,
which reduces the risk. But, agreed, this means more is visible
- and I guess
maybe a lot of people *don't* configure firewall functionality
on their devices)
(2) this attack pattern doesn't scale. It's suitable for anonymous
access (although
maybe not if you're using your next-door neighbour's Wifi!), and
for planting
evidence with the intention of embarrassing and inconveniencing
an opponent.
But if you want lots of service or you want to attack lots of
targets, you'd
be better off operating over the Internet rather than doing
everything from
the (dis)comfort of your car
On 16/07/2011 11:16 AM, Roger Clarke wrote:
>> ''All of the detrimental effects of being hacked will then follow,
>> except the hacker has been given an easy and exploitable way into the
>> network,'' Dr Gregory said.
>> [Isn't Gregory confusing rather separate things here? Is it
>> significantly easier to break into a device via a wifi network than
>> over the Internet connection? And even if it is, does that approach
>> scale sufficiently to make it worth a miscreant's while using this
>> approach rather than mounting the attack over the Internet?]
At 12:48 +1000 18/7/11, Paul Brooks wrote:
>Yes. Over the WIFI link the attacker is coming from inside the
>firewall/NAT device,
>whereas over the Internet the attacker is coming from outside the
>firewall/NAT device.
>Most devices - of all operating systems - provide significantly
>greater numbers of
>exploitable open ports and services visible to other devices on 'the
>local LAN', and
>far greater level of trust, to devices with IP addresses in the same
>subnet. They
>don't also have to worry about bypassing the one-way-valve of an
>intermediate firewall
>which helps reduce the visibility of much of the exploitable
>openings of the devices
>inside, especially if they don't communicate with the open Internet.
>(Which avenue would be easier to compromise my ethernet-connected HP
>printer, DVD
>player, or IP-connected television - each of which only communicates
>with other
>devices inside my network?)
>
>> [I couldn't quickly locate any sources on the extent to which legal
>> compulsion exists to secure a wife network. Does anyone know the
>> story?
>Not in Australia, but in Germany earlier this year....
>http://www.infosecurity-magazine.com/view/9457/german-courts-may-fine-users-for-unsecured-wlans/
--
Roger Clarke http://www.rogerclarke.com/
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
Visiting Professor in the Cyberspace Law & Policy Centre Uni of NSW
Visiting Professor in Computer Science Australian National University
More information about the Link
mailing list