WEP Cracking for Mac OS X 29
Randar the Lava Liza writes "Finally there is a tool to put default Apple AirPort hardware into monitoring mode for wireless security analysis. KisMAC is a variant of Kismet that runs natively on Mac OS X. It requires a special driver to be installed to run the AirPort hardware in monitoring mode, and has built-in WEP cracking tools once enough weak packets have been sniffed."
Great (Score:1, Troll)
Andy
Re:Great (Score:5, Insightful)
Re:Great (Score:3, Insightful)
In this particular case, it could be used to see how exposed the rest of the internal network is to a lousy security scheme (WEP).
Besides, these tools already exist on other platforms, so it's not like the blackhats suddenly have something they didn't have before to make our lives miserable.
Re:Great (Score:2, Insightful)
Re:Great (Score:1)
Besides, these tools already exist on other platforms, so it's not like the blackhats suddenly have something they didn't have before to make our lives miserable.
Now they can do it with style. The TiBooks are very C00L
-S
Re:Great (Score:5, Informative)
MacOS X Server 10.1 used netinfo for authentication of client machines. The way it worked is that password hashes were stored in netinfo and netinfo was readable to the world (eg, it posted /etc/passwd on the Internet).
The bosses would not believe this was a problem until I showed them how I could download all the password hashes from any arbitrary machine on the Internet and subsequently ran a cracker which found a large number of weak passwords.
In fact, they failed to see the scope of the problem (it was completely debilitating) as they only saw me typing a bunch of commands and their eyes glazed over. If there were some point-and-click Mac toy that would download the hashes, run Crack in the background and report results, it may have convinced them of just how serious a problem it was. In fact, I considered writing such a GUI tool because I'm genuinely concerned about shops that buy MacOS X Server and don't have a *nix admin.
Similarly, some people still don't understand that WEP is 100% useless (you can break it from a Palm for God's sake). I recommend completely turning off WEP so your users understand that any traffic going over wireless is world-readable. This may convince them to avoid plain-text password protocols and check that when they type their credit card numbers the site is using strong SSL. I've seen people send their credit card numbers over email, so this is absolutely necessary.
WEP crackers are not in any way "hacker" or "cracker" tools, and I doubt they are widely used for illegitimage purposes - I would venture that many more people use netstumbler and airsnort to convince others that WEP is useless. Lowering the bar so there's some point-and-click tool that your grandmother can download is a good thing, since there is nothing "hard" about cracking WEP and people need to understand that.
Good/Bad (Score:4, Interesting)
At least I have been waiting for one. There is definate (legal) use for this, when you have to test you company's / other network. And specially if you have to prove the vulnerability to your boss.
I know it's been available for ages to Linux platform, but as a TiBook user I had to use someone elses laptop for this. Now it's finally available for OS X...
OK, I know you can use it for criminal activity too. But, as it is available on other platforms already I don't see the problem with it becoming available for new ones too...
Apple Laptops are not ideal for WiFi hacking (Score:3, Interesting)
Re:Apple Laptops are not ideal for WiFi hacking (Score:1)
Do WiFi sniffers use extra big external antennas?
Re:Apple Laptops are not ideal for WiFi hacking (Score:1)
Re:Apple Laptops are not ideal for WiFi hacking (Score:1)
Re:Apple Laptops are not ideal for WiFi hacking (Score:2)
If I heavily get into 802.11b I'll likely look for an easier way. However by then cracking tools will be available for 3rd party cards like the EnGenius Senao or whatever.
Re:Apple Laptops are not ideal for WiFi hacking (Score:2, Informative)
bah! (Score:1)
Actually, this is a good thing, I can finally convince my employer that maybe it's not such a good idea, as anyone with a mac can login.
Re:Is all WEP protection useless? (Score:1)
A line I've heard repeated a few times recently is that turning WEP on is basically enough to indicate to people that your network is private. Honest, courteous, people will understand that and keep out. Anyone who's determined to break in, though, will have a fairly easy time of it.
What I'm curious about is whether or not anyone has come up with a wireless access point that integrates something more robust on top of WEP, in a consumer-friendly, easy-to-use way.
Re:bah! (Score:3, Informative)
If you want the binary, you can grab it from my box here [ofdoom.com] - I didn't save any of the web pages.
Re:bah! (Score:1)
VersionTracker has it:
1 99&db=mac [versiontracker.com]
http://www.versiontracker.com/moreinfo.fcgi?id=17
-Bearded Yak
Re:bah! (Score:1)
Kismac not related to kismet (Score:5, Informative)
For those interested, Kismet SHOULD have native OSX support, also using the viha drivers, in the 2.8 release. Stay tuned to the development changelogs. Anyone interested in furthering development (I don't have an OSX box) are welcome to drop by in #kismet on openprojects.net
-dragorn
Fuck Yeah! (Score:4, Interesting)
Since reading the story yesterday, I've already found a number of non-broadcast networks in my area that MacStumbler couldn't see.
The Viha driver removes your network interface, though, so ifconfig en1 says interface en1 does not exist and you can't sniff with ethereal et al while scanning. KisMAC dumps pcap files though, so you can examine your captured data after the fact with the tool of your choice.
Thanks much to the ViHa people for writing this awesome driver!
Re:Fuck Yeah! (Score:1)