SlideShare ist ein Scribd-Unternehmen logo
1 von 42
HACKING THE FRIENDLY SKIES
HELLO… ,[object Object],[object Object],[object Object]
DISCLAIMER: WHY NOT T O DO THIS ,[object Object],[object Object]
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BACKGROUND
HOW THIS STARTED ,[object Object],[object Object],[object Object],[object Object],[object Object]
THERE IS NO IN-FLIGHT HOTSPOT ,[object Object],[object Object],[object Object]
AIRLINE BACKGROUND ,[object Object],[object Object],[object Object]
ATTACKING
SECOND WARNING ,[object Object],[object Object],[object Object]
CONTRIBUTING FACTORS ,[object Object],[object Object],[object Object]
IPV4 LINK-LOCAL ADDRESSES ,[object Object],[object Object],[object Object]
MICROSOFT IMPLEMENTATION OF RFC 3927 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE MAGICALLY APPEARING SSID ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAGICALLY APPEARING NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WARNING FROM RFC 3927 ,[object Object],NOTE: There are certain kinds of local links,  such as wireless LANs , that provide no physical security. Because of the existence of these links it would be very unwise for an implementer to assume that when a device is communicating only on the local link it can dispense with normal security precautions. Failure to implement appropriate security measures could expose users to considerable risks.
AUTHORS OF RFC 3927 ,[object Object],Network Working Group  S. Cheshire Request for Comments: 3927  Apple Computer Category: Standards Track  B. Aboba Microsoft Corporation E. Guttman Sun Microsystems March 2005
ATTACK TIME ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACK TIME ON SHORT FLIGHTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ATTACK TIME USING KARMA ,[object Object],[object Object],[object Object],[object Object],[object Object]
DON’T FORGET TO SNIFF ,[object Object]
EVIL FAKE AP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ADD HONEYPOT TECHNOLOGY ,[object Object],[object Object],[object Object],[object Object]
IDLE HANDS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COLLECTED DATA
ATLANTA, GA MIDWEEK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CHARLOTTE, NC MIDWEEK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TOORCON 7 RETURN FLIGHT, MONDAY MORNING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SJC - DFW, TUESDAY AFTERNOON ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BEST TARGET LOCATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONTRIBUTING FACTORS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS
WHY THIS HAPPENS ,[object Object],[object Object],[object Object],[object Object]
WHAT’S BAD ,[object Object],[object Object],[object Object],[object Object]
WHAT’S GOOD ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QUICK WIFI DETECTION FOR PASSENGERS AND FLIGHT CREWS ,[object Object],[object Object]
THE FUTURE
FCC VS. FAA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFLIGHT BROADBAND BASICS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFLIGHT BROADBAND ADOPTERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFLIGHT BROADBAND ISSUES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ADDITIONAL INFLIGHT ISSUES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt? (9)

Thin Clients for Corporate
Thin Clients for CorporateThin Clients for Corporate
Thin Clients for Corporate
 
All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.All your Bluetooth is belong to us - the rest too.
All your Bluetooth is belong to us - the rest too.
 
Ex.no1
Ex.no1Ex.no1
Ex.no1
 
Don't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFiDon't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFi
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
No More Fraud Cluecon2014
No More Fraud Cluecon2014No More Fraud Cluecon2014
No More Fraud Cluecon2014
 
No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014
 
02 asterisk - the future of telecommunications
02   asterisk - the future of telecommunications02   asterisk - the future of telecommunications
02 asterisk - the future of telecommunications
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 

Ähnlich wie Wireless Cyber Warfare

IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast EngineersKit Peters
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones HijackingPriyanka Aash
 
Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!Jon Spriggs
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksMartin Holovský
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment Sergey Gordeychik
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network TrafficRio Ap
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ipKumar
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshopAli Nezhad
 

Ähnlich wie Wireless Cyber Warfare (20)

IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast Engineers
 
Networking question
Networking questionNetworking question
Networking question
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
R bernardino hand_in_assignment_week_1
R bernardino hand_in_assignment_week_1R bernardino hand_in_assignment_week_1
R bernardino hand_in_assignment_week_1
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
Routing_Article
Routing_ArticleRouting_Article
Routing_Article
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshop
 

Wireless Cyber Warfare