| ▲ | The Nearest Neighbor Attack(volexity.com) |
| 50 points by throwaway99210 3 days ago | 15 comments |
| |
|
| ▲ | Rygian an hour ago | parent | next [-] |
| > Volexity now determined the attacker was connecting to the network via wireless credentials they had brute-forced from an Internet-facing service. However, it was not clear where the attacker was physically that allowed them to connect to the Enterprise Wi-Fi to begin with. Further analysis of data available from Organization A’s wireless controller showed which specific wireless access points the attacker was connecting to and overlayed them on a map that had a layout of the building and specific floors. This is the kind of hackery I'd enjoy seeing in a blockbuster movie. |
|
| ▲ | kmeisthax 6 hours ago | parent | prev | next [-] |
| So, as I understand it, you 0wn a machine in one organization, then use it to tunnel over to Wi-Fi in the building next door, 0wn another machine there, rinse and repeat until you've created the world's least consensual mesh network? |
| |
| ▲ | _nalply 6 hours ago | parent | next [-] | | They are exploiting that Wifi didn't have 2fa, because they couldn't overcome 2fa. A company accross the street had a machine that both was accessible by ethernet and wifi and they used that as a bridge. Conclusions: 1. Anything that doesn't have 2fa is leaking like a sieve. 2. The targeted company needs to implement 2fa for their Wifi as well. Not mentioned, but I assume that their 2fa is using specialised hardware gadgets like Yubikey and not texts or totp, because else they could target the cell phones, and like everything else they are leaking, or they are attacking the cell phone base stations. Final conclusion: A network is as strong as the weakest link. In that case Wifi was not protected by strong 2fa and could be used to breach. | | |
| ▲ | eru 3 hours ago | parent | next [-] | | > A network is as strong as the weakest link. Depends on how you look at it. We have end-to-end security with things like https, so we don't need to worry about the links in the middle. | |
| ▲ | Sesse__ 3 hours ago | parent | prev [-] | | > Final conclusion: A network is as strong as the weakest link. Final conclusion: Do not trust a device just because it happens to be on your local network. |
| |
| ▲ | thrdbndndn 3 hours ago | parent | prev | next [-] | | why do you type 0wn (zero) instead of own? | | | |
| ▲ | mandevil 6 hours ago | parent | prev [-] | | From thousands of kilometers away, to make attribution/legal issues even more complex. |
|
|
| ▲ | meandmycode an hour ago | parent | prev | next [-] |
| Anybody else get a feeling it was Volexity that did all this research? Interesting story none the less |
|
| ▲ | _hl_ 2 hours ago | parent | prev [-] |
| What’s wrong with the tried-and-tested technique of flying a guy or girl over there to drop a small gadget in WiFi proximity? |
| |
| ▲ | voidUpdate 30 minutes ago | parent [-] | | Russia is quite far away to send a plane small enough to fly low over the building and drop a device onto the roof, and I don't think you're allowed to throw things out of an airliner window anyway | | |
| ▲ | _hl_ 24 minutes ago | parent [-] | | I mean a normal passenger on a normal plane making a normal trip to an office building and finding a hidden location where to tape a small box with an arduino in it. Maybe even on the outside so you can use solar power? Though it only needs to last long enough to compromise a machine inside the network. This would be nothing new, I remember ages ago in the days of WEP that you could buy a small box that would collect enough handshakes to let you crack the WEP password. |
|
|