<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
<title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
That's a frightening device. I can't believe a company actually
produces it and sells it, even if they do claim to be a "penetration
testing firm".<br>
<br>
I'd also like to add that one important security procedure involves
setting a password on your personal wireless network at home, if you
have one. The fact that the default is to leave it wide open is
downright criminal. Yes, you have to type in a password to connect to
your own network - but so does the guy who just pulled up in front of
your house that wants to use your network to surf for child porn.<br>
<br>
If you don't secure your own network, then you may not have the legal
right to file charges if some stranger connects to it. The issue seems
to be a gray area in the law right now. Worse yet, if somebody
connects to your system and does something illegal and it is traced
back to your access point, you may be the one going to trial.
Basically, if your network is unsecured, it is broadcasting a signal
which translates to "Come connect to me! My address is..." The person
in the area, maybe even a neighbor, might connect to your access point
accidentally because many systems are configured to connect to the
strongest signal they see automatically. So I definitely *don't*
recommend delivering a payload to them to disable their system if all
you see is a connection that has been made. I still don't condone
electronic vigilantiism even if they do something malicious, that's
what the police and the courts are for. <br>
<br>
Definitely be careful at public hotspots, as well.<br>
<br>
Paul<br>
<br>
Art Deco wrote:
<blockquote cite="mid003601c74ae6$b81c62b0$6401a8c0@opalpeakkiosk"
type="cite">
<meta http-equiv="Content-Type" content="text/html; ">
<meta content="MSHTML 6.00.5730.11" name="GENERATOR">
<style></style>
<div><strong>New (and Old) Threats to On-Line Computers</strong></div>
<div> </div>
<div>Below the line are links to descriptions of a new device
implementing an old method of attack on computers connected by a
wireless method of one type.</div>
<div> </div>
<div>The cautious will read this material carefully. Although the
device described is relatively new, the method used itself is not new
and the method can be extended beyond simple Wi-Fi connections.</div>
<div> </div>
<div>There are several individuals in this area using laptops and
special software to attempt to snoop and/or to implant snooping/remote
broadcasting of the material on your personal computer and the
real-time data streams occurring while you are connected to email and
the web. Hardly a week goes by when my computer is not subjected to an
attempt of this kind.</div>
<div> </div>
<div>A prior V 2020 discussion suggested some ways to help fend off
these kinds of attacks:</div>
<div> </div>
<div>Anti-Virus software</div>
<div>Spyware Detection and Removal software</div>
<div>First class professional grade firewall software</div>
<div>An intervening router with firewall capability</div>
<div> </div>
<div>It is important to check your firewall logs daily to see if
attacks have been detected. If your firewall can be set to immediately
notify you of an attempted attack:</div>
<div> </div>
<div>1. Disconnect entirely from any connection you are using the
moment the notification occurs.</div>
<div>2. Look for unfamiliar vehicles in your area, take license
numbers. If a license number occurs more than once after an attempted
attack or there is a speedy decampment, notify law enforcement.</div>
<div> </div>
<div>This should be a no-brainer: Do not tell anyone which
anti-virus, spyware detection, or firewall software or hardware you are
using.</div>
<div> </div>
<div>There is another remedy which is drastic, very effective, very
expensive, and whose legality may be suspect: a device which uploads a
poison pill to the attacker's computer. This pill works in the target
computer's background. First it erases the boot-strap tracks, then
erases the various parts of the directories on all disc drives, then
all the data on all the disc drives surfaces. The latter takes a lot
of time so that the attacker may be able to stop that part before it is
complete. For some computers, the software can also cause some
permanent hardware damage, mainly to the disc drives. At any rate the
attacker will need to spend a great deal of time making their computer
functional again. In addition, this device and associated software
records a number of identifying characteristics of the attacker's
computer so that information may to used to arrest and to convict the
attacker may be gathered.</div>
<div> </div>
<div> </div>
<div>Since the legality of this device may be suspect, please do not
ask me for details. There are various search engines which can be of
assistance should you be interested.</div>
<div><br>
Art Deco (Wayne A. Fox)<br>
<a href="mailto:deco@moscow.com">deco@moscow.com</a><br>
</div>
<div> </div>
<div> </div>
<div>______________________________________________________</div>
<div>Silica--a wireless hacking tool <br>
<br>
Photos: The scariest item at RSA 2007 is Silica, a portable hacking<br>
device <br>
that can search for and join Wi-Fi access points, scan for open ports,<br>
and <br>
launch code execution exploits. <br>
<a
href="http://ct.zdnet.com/clicks?t=29190355-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190355-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</a><br>
<br>
WiFi hacking with a handheld<br>
<a
href="http://ct.zdnet.com/clicks?t=29190356-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190356-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</a><br>
<br>
Focus: RSA 2007 security<br>
<a
href="http://ct.zdnet.com/clicks?t=29190357-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0">http://ct.zdnet.com/clicks?t=29190357-a10e1a02c3a4463047d2ade5662a85e8-bf&s=5&fs=0</a><br>
<br>
</div>
<pre wrap="">
<hr size="4" width="90%">
=======================================================
List services made available by First Step Internet,
serving the communities of the Palouse since 1994.
<a class="moz-txt-link-freetext" href="http://www.fsr.net">http://www.fsr.net</a>
<a class="moz-txt-link-freetext" href="mailto:Vision2020@moscow.com">mailto:Vision2020@moscow.com</a>
=======================================================</pre>
</blockquote>
<br>
</body>
</html>