This 12yrs Old Boy
-
I have been seeing this on Twitter about this 12yrs old hacker who can supposedly get one's WIFI password and screen shows what appears ifconfig print out. Sure, I don't broadcast SSID, yet curious how "poison" can implanted to affect WIFI and Bluetooth.
-
@nollipfsense you meant the stock image on your screen cap? I wouldn't read into that one iota.
-
@nollipfsense said in This 12yrs Old Boy:
Sure, I don't broadcast SSID
That has zero to do with anything.. That hides your wifi from the 84 year old grandma across the street..
-
@rcoleman-netgate I took a screen shot of the video ad on Twitter and of course it's hyped up to get clicks and seems to be promoting Cisco devices.
-
@johnpoz It in response to the kids statement that he doesn't join a WIFI he doesn't know but yes I know there are tools to discover hidden WIFI SSID.
-
@nollipfsense said in This 12yrs Old Boy:
the kids statement that he doesn't join a WIFI he doesn't know
huh?? What does that have to do with anything? So he doesn't join the wifi network at starbucks - what does that with you not broadcasting a SSID?
-
@johnpoz Nothing as I by practice don't broadcast SSID regardless. However, yes I know it's an ad with hype, yet still curious as how he could reveal the password if true. He mentioned poison, not sure if that's a tool as in the video demo, he revealed the interviewer's Twitter login password. Any insight of possible methodology you could share?
-
@nollipfsense said in This 12yrs Old Boy:
by practice don't broadcast SSID regardless
Which is completely utterly a waste of time, and back in the day listed in the top 6 dumbest ways to "secure" a wifi.. Broadcasting your ssid in no way shape or form ads any sort of security.. But what it does do it make it harder for you to join your own network. Depending it could be even making your network more known, because devices always broadcasting for it..
https://www.zdnet.com/home-and-office/networking/the-six-dumbest-ways-to-secure-a-wireless-lan/
"SSID hiding: There is no such thing as "SSID hiding". You're only hiding SSID beaconing on the Access Point. There are 4 other mechanisms that also broadcast the SSID over the 2.4 or 5 GHz spectrum. The 4 mechanisms are; probe requests, probe responses, association requests, and re-association requests. Essentially, youre talking about hiding 1 of 5 SSID broadcast mechanisms. Nothing is hidden and all youve achieved is cause problems for Wi-Fi roaming when a client jumps from AP to AP. Hidden SSIDs also makes wireless LANs less user friendly. "
That 12 year old kid news nonsense was from what 2018? Your just now finding it.. Its a simple poison attack.. Im on the same wifi network as you - I tell you via an arp poison/spoof - hey I am the AP, or I am your destination or gateway.. send traffic to me to get to where your going, Look I can ask you for passwords, or I could do a mitm on where your trying to go, all kinds of things.. This is nothing new, this isn't some crazy new exploit to wifi or really any network..
A normal good wifi network would be isolated so clients can not even talk to each other, or send arp traffic, etc. So some other client on the same wifi network as you, wouldn't be able to talk to you.. This is L2 isolation..
-
mostly they are copying pros bugs and doing nothing new, sooner or later it will be fixed for sure
-
@mcdvoiceo1 said in This 12yrs Old Boy:
sooner or later it will be fixed for sure
what will they fix, arp spoofing? How are they going to do that - the are already protections against it. static arp, or just plain L2 isolation for devices that shouldn't be talking to each other - like in the case of some public hotspot wifi network.. Your say a hotel in room 32 - in what scenario would you need to be able to see traffic to from room 46? On a switch I can do port security so a specific mac can only be on a specific port, etc.. So bad guy can not plug in and say he is the same mac..
So you have in your arp cache the mac aa:bb:cc:00::00:01 for IP 192.168.1.1 your gateway..
Now that expires, and you arp hey 192.168.1.1 what is your mac, and some bad device answers hey the mac for 192.168.1.1 is aa:bb:cc:00:00:42
How is the client going to know that is not legit? And now he starts sending all traffic meant for the gateway to the bad guy..
None of that stuff that kid was doing back in 2018 was new, or really any sort of new exploit or scare -- what made it slow news day news is he was 12.. And users are completely and utterly clueless to how any of their magic boxes work or talk to each other - so sure scare them and throw out some terms they have no clue to what they mean.. Its like watching star trek and they make up technobabble terms.. Can hack any of your password? Click bait scare tactics for the sheeple.
-
@johnpoz said in This 12yrs Old Boy:
That 12 year old kid news nonsense was from what 2018? Your just now finding it.
As I stated in the first post, it's an ad currently running on Twitter and no, I didn't hear of it back in 2018. Here's the ad link:
https://twitter.com/CNET/status/1582763509623836673
-
@nollipfsense said in This 12yrs Old Boy:
https://twitter.com/CNET/status/1582763509623836673
I watched 22 seconds of this.
it's not a hack of the your WAP password.It's decrypting the traffic after getting in. Which is usually due to poor SSID deployment, using weak passwords, etc.
I was asked last year (and still haven't completed) by a higher up here at Netgate to write a blog post about securing your home WiFi and why firmware updates are important for all devices... I should get back to that.
The issue here is manufacturers are building sub-par, poorly secured devices and selling them to consumers as a solution. Weak encryption is just that – weak.
I've been doing WiFi design for more than a decade and these are the things I design against.