Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Apr 2004
Posts: 298
Phatal Offline OP
UGN News Staff
OP Offline
UGN News Staff
Joined: Apr 2004
Posts: 298
A newly-discovered vulnerability in the 802.11 wireless standard allows attackers to jam wireless networks within a radius of one kilometre using off-the-shelf equipment.

Affecting various hardware implementations of the IEEE 802.11 wireless networking standard -- including widely used 802.11b devices -- the flaw was found in the collision avoidance routines used to prevent multiple devices from transmitting at the same moment.

"When under attack, the device behaves as if the channel is always busy, preventing the transmission of any data over the wireless network," a security advisory released by AusCERT reads.

The weakness allows miscreants to take down networks within five seconds, according to
researchers at Australia's Queensland University of Technology's Information Security Research Centre (ISRC), which discovered the vulnerability.

ISRC's leader of network and systems security research, Associate Professor Mark Looi, whose PhD students, Christian Wullems, Kevin Tham and Jason Smith discovered the flaw, said any organization that relies heavily on wireless infrastructure should take the threat seriously.

"Anyone who's relying on the availability of a wireless network should really consider that their wireless network can be knocked offline at any time," said Looi. "They need to very seriously evaluate that network and decide if it's possible to move away from wireless technology."

While previous denial of service attacks against wireless networks have required specialised hardware and relied on high-power antennas, the new attack will make knocking a wireless network off the air an option for a "semi-skilled" attacker using standard hardware.

"An attacker using a low-powered, portable device such as an electronic PDA and a commonly available wireless networking card may cause significant disruption to all WLAN traffic within range, in a manner that makes identification... of the attacker difficult," The AusCERT advisory read.

Because the flaw is in the 802.11 protocol itself, the vulnerability cannot be mitigated through the use of software or encryption schemes. Replacing wireless devices with those not affected by the flaw seems the only option, said Looi.

"Mitigation strategies are few and far between," Looi said "Organisations could deploy wireless networks that don't use this technology, [but] it will be a very expensive exercise."

The flaw is only present in devices using a Direct Sequence Spread Spectrum (DSSS) physical layer, including IEEE 802.11, 802.11b and 802.11g wireless devices operating at low speed. 802.11a and 802.11g wireless devices configured to operate at speeds above 20Mbps are not affected by the glitch,

AusCERT senior security analyst Jamie Gillespie does not anticipate the wide exploitation of the vulnerability.

"For the average corporate user, we're not expecting to see ongoing denial of service attacks. However, if you have remote equipment that is only connected through wireless it is possible that the connection could be disrupted," Gillespie said. "Some critical infrastructure providers may not deploy wireless... but if any do then they should be looking at mitigation strategies."

The lack of a "measurable result" during an attack is likely to render the average attacker bored, Gillespie added.

Unlike flaws discovered in the WEP encryption scheme, the newly-disclosed vulnerability will not allow an attacker to snoop on network communications.

The ISRC findings will be presented to the Institute of Electrical and Electronic Engineers (IEEE) Wireless Telecommunication Symposium in California on Friday.

You can view the original article here...
http://securityfocus.com/news/8575

Joined: Nov 2003
Posts: 69
UGN Poser
Offline
UGN Poser
Joined: Nov 2003
Posts: 69
Hey, I found a product thats already on the market. Its easy to get and probaly a little cheaper too...

http://www.walmart.com/catalog/product.gsp?produ...4%3A90546%3A90425%3A90762
wink


"Even the on highest throne, one still sits on their [censored]"
Joined: Feb 2002
Posts: 7,203
Likes: 11
Community Owner
Offline
Community Owner
Joined: Feb 2002
Posts: 7,203
Likes: 11
Cordless phones do too wink .. It's fun to call weeve :x


Donate to UGN Security here.
UGN Security, Back of the Web, and VNC Web Services Owner
Joined: May 2004
Posts: 9
B
Junior Member
Offline
Junior Member
B
Joined: May 2004
Posts: 9
Hi im new to UGN. Great site u guys got here.

I have picked up signals from cordless phones before but i find its not very frequent. is there a way to better the range or something of the like to pick up more signals more often?


trust no-one
Joined: Feb 2002
Posts: 7,203
Likes: 11
Community Owner
Offline
Community Owner
Joined: Feb 2002
Posts: 7,203
Likes: 11
Old police scanners can be modified to pickup 900mhz phones. Listening in on 2.4ghz phones is rare as most are encrypted or change channels every 10 seconds (or both).


Donate to UGN Security here.
UGN Security, Back of the Web, and VNC Web Services Owner
Joined: Nov 2003
Posts: 69
UGN Poser
Offline
UGN Poser
Joined: Nov 2003
Posts: 69
wow... this is off topic. Anywase, old tvs with analog tuners can pick them up(900mhz phones)too. Its in the UHF range, I want to say around 50-80 but honestly I don't rember.

...No wait, on the really old cordless phones.

here- go learn somthing
http://home.howstuffworks.com/cordless-telephone3.htm wink


"Even the on highest throne, one still sits on their [censored]"

Link Copied to Clipboard
Member Spotlight
Posts: 35
Joined: August 2003
Forum Statistics
Forums41
Topics33,840
Posts68,858
Average Daily Posts0
Members2,176
Most Online3,253
Jan 13th, 2020
Latest Postings
Where and how do you torrent?
by danni75 - 03/01/24 05:58 AM
Animation,
by JohanKaariainen - 08/15/19 01:18 AM
Blackbeard.....
by Gremelin - 10/03/18 07:02 PM
my old account still exists!
by Crime - 08/10/18 02:47 PM
Okay WTF?
by HenryMiring - 09/27/17 01:45 AM
The History Thread...
by Gremelin - 08/11/17 12:11 PM
My friend NEEDS your HELP!
by Lena01 - 07/21/17 12:06 AM
I'm having fun with this guy.
by gabithompson730 - 07/20/17 01:50 AM
I want to upgrade my phone
by gabithompson730 - 07/20/17 01:49 AM
Doom 3
by Cyrez - 09/11/14 08:58 PM
Amazon Gift Card Generator/KeyGen?te
by Gecko666 - 08/22/14 09:21 AM
AIM scene 99-03
by lavos - 09/02/13 08:06 AM
Planetside 2
by Crime - 03/04/13 07:10 AM
Beta Testers Wanted
by Crime - 03/04/13 06:55 AM
Hello Everyone
by Gremelin - 02/12/12 06:01 PM
Tracfone ESN Generator
by Zanvin Green - 01/18/12 01:31 PM
Python 3 issue
by Testing - 12/17/11 09:28 PM
tracfone airtime
by Drache86 - 07/30/11 03:37 AM
Backdoors and the Infinite
by ZeroCoolStar - 07/10/11 03:52 AM
HackThisZIne #12 Releaseed!
by Pipat2 - 04/28/11 09:20 PM
gang wars? l33t-wars?
by Gremelin - 04/28/11 05:56 AM
Consolidate Forums
by diggin2deep - 04/21/11 10:02 AM
LAN Hacking Noob
by Gremelin - 03/12/11 12:42 AM
Top Posters
UGN Security 41,392
Gremelin 7,203
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Top Likes Received
Ghost 2
Crime 1
Ice 1
Dartur 1
Cyrez 1
Powered by UBB.threads™ PHP Forum Software 7.7.5