Pringles: the latest hacker tool
#1
A very old thread....
ive found it in sm


CategoryConfusedecurity_news>attacks

Pringles: the latest hacker tool
By James Middleton(08-03-2002)

"An empty Pringles tube is all wireless hackers need"

Security experts have demonstrated that even an empty
Pringles tin can be used to help hackers break into insecure
wireless networks.

Wireless hacking and 'war driving' has been a focus point
in the security community for well over a year now, with
innumerable experts warning that a wireless network opens
a huge back door into systems.

It has been a well documented fact that armed with a
wireless-equipped laptop and antenna, hackers have no shortage
of victims around London.

But security firm I-sec recently demonstrated that using an
empty Pringles tube as an antenna could boost the hacker's chance
of picking up a wireless signal by as much as 15 per cent.

Apparently the hollow tube shape combined with a tinfoil lining
makes the empty crisps tin ideal for concentrating a signal.

During a half-hour drive around the centre of London, almost 60
wireless networks were picked up. Around 40 of these had no security
- a hacker would be able to use the company's bandwidth any way he
liked, as well as browse the internal network.

Although wireless protocols have some inherent security vulnerabilities
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.vnunet.com/News/1120758
anyway, many companies are not even applying trivial security measures.


Breaches could be avoided by changing default user names and passwords
on wireless access points, and moving the access points away from the
outside walls of buildings.

Many wireless products come with built-in encryption capabilities, but
these are often switched off by default and left that way after installation.

According to I-sec, the face of the Pringle man might not be the only
household item in a hacker's arsenal. Objects from coffee tins to old
satellite dishes have also been used to pick up wireless signals.
回复


跳转到:


正在阅读该主题的用户: 1位游客
您的访问已通过Cloudflare保护,访问自美国/loc=US。