Articles
Pages
Products
Research Papers
Blogs
Search Engines
Events
Webinar, Seminar, Live Classes
Thursday, 17 November 2016 07:04

Hacker shows how easy it is to take over a city’s public Wi-Fi network

By: 

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.

On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn't seen before. What made it unusual was that it was in an area with no buildings.

It turned out that the hotspot he saw, advertised as "FREE_TLV," was part of the citywide free Wi-Fi network set up by the local administration of Tel Aviv, Israel. This made Neiderman wonder: How secure is it?

For the next few weeks, finding a way to compromise this network became a side project to do in his free time. First he connected to the network through one of the access points spread around the city and checked what his new IP (Internet Protocol) address was. This is usually the public address assigned to the router through which all Wi-Fi clients access the internet.

He then disconnected and scanned that IP address from the internet for open ports. He found that the device was serving a web-based login interface over port 443 (HTTPS).

This interface displayed the manufacturer's name -- Peplink -- but not other information about the device type or model. An analysis of the web interface didn't reveal any basic vulnerabilities either, such as SQL injection, default or weak log-in credentials or authentication bypass flaws.

He realized that a more thorough analysis of the device's actual firmware was required. Identifying the device and finding the exact firmware to download from the manufacturer's website was not easy, because Peplink creates and sells many types of networking devices for various industries. However, he eventually pinned it down to firmware version 5 for Peplink's Balance 380 high-end load balancing router.

The firmware used basic XOR-based encryption to make it harder for third-parties to reverse-engineer the firmware's file system, but this was relatively easy to bypass. Once everything was unpacked and loaded into an emulator, Neiderman was able to access the CGI (Common Gateway Interface) scripts that made up the router's web interface.

It didn't take long until the researcher found a buffer overflow vulnerability in the CGI script that handled the log-out process. The flaw could be exploited by sending a very long session cookie to the script and successful exploitation resulted in arbitrary code execution and full control over the device.

Neiderman presented his findings and reverse-engineering efforts Thursday at the DefCamp security conference in Bucharest, Romania. He declined to say whether he actually tested his exploit on the live Peplink Balance routers used to operate Tel Aviv's free Wi-Fi network, because that could land him in legal trouble.

However, when he reported the flaw to Peplink the company confirmed and patched it in a subsequent firmware update, so the firmware on FREE_TLV's routers was certainly vulnerable when Neiderman found the flaw.

While finding vulnerabilities in routers is not uncommon, this case stands out because it shows that skilled hackers could potentially attack thousands or tens of thousands of users by compromising large public Wi-Fi networks like those run by municipalities.

By controlling a router, attackers can snoop on all unencrypted user traffic that passes through it and capture sensitive information. They can also launch active attacks, like redirecting users to rogue web servers when they're trying to access legitimate websites or injecting malicious code into non-HTTPS web pages.

Large networks are typically standardized and use the same type of equipment throughout to allow for easier management. A vulnerability that allows a compromise of one of the network's access points is likely to allow the compromise of all of them.

Attacks like these are why users are strongly encouraged to use a VPN (Virtual Private Network) service when they're accessing the internet over public or untrusted Wi-Fi networks.

Neiderman said that he was impressed with how Peplink responded to his report and how the company handled the vulnerability. He stressed that this attack was also possible because of the insecure way in which the network's routers had been deployed. Their administration interfaces shouldn't have been exposed to the Internet.

Source : pcworld.com

6 comments

  • Comment Link Royal Sunday, 24 February 2019 12:46 posted by Royal

    Thee Commercial Roofing Dallaѕ Ϝort Worth сompanies ѡho will Ƅe still operational amidst ⅼors of competition utilize ɡreatest skкill
    аnd expeгience.There can bеe kinds of stuffs hich you can install with you roof.
    Recently, one of the larger ones wɑs exрeriencing difficulty with аll the roofing systеm.

  • Comment Link Desiree Monday, 31 December 2018 21:16 posted by Desiree

    Hey, Stеvee at Brіdgеs.
    Seriouѕly “Hacker shows how easy it is to take over a city’s
    public Wi-Fi network” is reɑlly an intriguing topic
    Merrely wanted to say that I like yⲟur boog post.

  • Comment Link Sherlyn Sunday, 16 December 2018 06:21 posted by Sherlyn

    What's սp, Steve with Bridgeѕ.
    Truly “Hacker sһows how easy itt is to
    take over a city’s public Wi-Fi network” is really аn intriguimg sսbject
    I jusst wɑnt to sharе that I like your site.

Leave a comment

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.
Please wait
online research banner

airs logo

AIRS is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Subscribe to AIRS Newsletter

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media