Wi-Fi Exploits Coming to Metasploit 50
bucksDrop writes "Eweek.com is reporting that the Metasploit Project will add 802.11 (Wi-Fi) exploits to a new version of its point-and-click attack tool. Metasploit 3 will integrate kernel-mode payloads to allow users to use existing user-mode payloads for both kernel and non-kernel exploits. Metasploit is collaborating with Jon 'Johnny Cache' Ellch and implementing it by wrapping the LORCON library."
Thanks Guys (Score:4, Insightful)
No really, I appreciate all the work that goes into putting this together. I'm sure privately distributed cracking tools already have some of this functionality. Maybe this will get OS vendors to pay a little more attention to wireless security. Wireless is not likely to be widely exploited mechanism for a worm, but it is still something that needs more attention.
This begs the question... (Score:2, Interesting)
Re:You must be a perscriber (Score:4, Insightful)
So I guess "loose" and "lose" are now synonymous..
I just really don't agree. I'm not the kind who generally goes off on people for misusing words as long as I can understand what they're trying to say, but at the same time, words have meanings. The fact that people have no idea how to properly use those words should not change what the words mean. It should just make us exceptionally sad at the state of affairs our communications skills are in.
Incidentally, this is coming from somebody who misused the phrase "begs the question" dozens of times in his life. The difference being, when it was pointed out to me (I forget if somebody said something or I just came across the correct usage one day), I actually made a mental note of it and I have used it properly since then. It wasn't hard. Neither, as my little joke intimated, is using "lose" and "loose" properly. It just takes a little conscious effort at first, and then it will become second nature.
Personally I think we should be getting people to do that rather than pandering to them and altering the meaning of words and phrases once we reach some ignorance threshold.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
If the masses are allowed to dictate whatever meaning they choose for words or phrases they hear, they will slowly erode the vast variety of meanings that can be conveyed through speech and writing
It's not a matter of choice. Languages change over time - they always have and always will. You can argue that this is a bad thing, and you might even be right - but I guarantee you can't stop it.
If you don't like it - tough! Suck it up and stop whining.
Re: (Score:2)
p.s did you get them legos for cheap?
(Oh thank god FF2.0 marks "legos" as a spelling mistake and incase you missed it, I thoroughly agree with your post)
Re: (Score:1)
Based on your reasoning, you never should have come to use the word pandering in this manner.
The origins of pandering:
Re: (Score:2)
Language defined by misuse. Usually done by lackwits in a misguided attempt to sound sophisticated, but ironically it demonstrates instead only their lack of language skills.
These things grate like fingernails on the chalkboard of my soul. Mostly they make me very sad.
Re:This begs the question... (Score:4, Insightful)
Why don't hardware vendors simply release the source to their drivers so problems like this can be squashed quickly?
Some of them probably will, but a lot of hardware vendors are reflexively secretive. Others, use the drivers to work around bugs in their products or are embarrassed of the shoddy quality of their code. I'd love the believe that the industry will start to demand open source drivers, but realistically, it is more likely that the OS developer community will have to account for untrusted hardware drivers by seriously re-architecting the way the kernel interacts with drivers.
Re: (Score:1)
Re: (Score:2)
Why would any hardware vondor[sic] release open source drivers? So that the competition can look at them?
Why would IBM contribute to an open source OS? So the competition can look at it? IBM is not in the business of selling OS's and by contributing to open source they get both other companies and the open source community to share the labor costs and make a better solution for both IBM and others. Likewise, hardware vendors are not in the business of selling drivers and those drivers could benefit signi
Re: (Score:3, Informative)
Re: (Score:2)
This is the main reason put forward by the makers for not releasing completely open drivers. If they did their gear couldn't be certified.
Re: (Score:3, Insightful)
15-20 years ago, it is was the design of the hardware that was where the value was. Today, it is mostly the software running the hardware.
An open driver just means that they are giving away whatever va
Re: (Score:1)
Wireless Weapons of Mass Destruction [netstumbler.org]
Re: (Score:2)
Except make you look a little silly.
Math problem (Score:3, Funny)
F=9.8
i=2673.7
What is Wi-Fi?
Re: (Score:3, Funny)
Re: (Score:1, Funny)
Re:Math problem (Score:5, Funny)
With Metasploit you can make i = 4456.66
Re: (Score:1)
Re:Math problem (Score:5, Funny)
My God! That'd be like 9/11 times 4.8921! We can't allow this to happen!
-Grym
Re: (Score:3, Informative)
Wi-Fi = i(W-F) = 3673.7 ( 0.3) = 802.11
Re: (Score:2)
So..... (Score:3, Funny)
I'm sure... (Score:2)
*blinkblink*
WTF, mate?
Script Kiddies tools for a wide open network (Score:2)
I've played around with metasploit in the past, especially their VNC payloads. The tool seems to have a high likelihood of abuse, compared to a lot of the other security tools (starting from nmap,nessus and all). Except for a couple of courtesy terminals, the tool basically gets you in and gives you a general feeling of being in control.
Canned scripts hardly ever teach you anything, especially when they work out of the box. Making them writing your own exploits is the easiest way to get a script kiddie
So where is the code? Right here. (Score:5, Informative)
$ http://www.802.11mercenary.net/lorcon/ [11mercenary.net]
Grab the latest version of metasploit 3:
$ svn co http://metasploit.com/svn/framework3/trunk/ [metasploit.com]
Compile the Metasploit Lorcon wrapper:
$ cd trunk/external/msflorcon
$ make
Plug in a support network card (I use a WPN511 with the madwifi-old driver in Gentoo)
Load the Metasploit Console (as root, since it needs raw WiFi access)
# trunk/msfconsole
Play with some of the demo modules
This is an example of sending fake beacon requests to flood the Windows Wireless Network Browser:
msf > use auxiliary/dos/wireless/fakeap
msf auxiliary(fakeap) > show options
Module options:
CHANNEL 11 yes The default channel number
DRIVER madwifi yes The name of the wireless driver for lorcon
INTERFACE ath0 yes The name of the wireless interface
Type the "run" command, or use "set VARIABLE VALUE" to change these options.
msf auxiliary(fakeap) >run
Re: (Score:3, Funny)
Re: (Score:1)
At least now we can know... (Score:1)
This explains my recent Trojan infection (Score:2)
How is this a good thing? (Score:2)
Re: (Score:1)
Just pretending that the problem doesn't exist, doesn't make the problem go away.