Protecting your privacy at the local coffee shop
Results 1 to 9 of 9

Thread: Protecting your privacy at the local coffee shop

  1. #1
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897

    Protecting your privacy at the local coffee shop

    Caffeinated Computer Crackers:
    Coffee and Confidential Computer Communications

    Pretty version here: http://www.irongeek.com/i.php?page=security/coffeecrack

    Coffee houses have become more and more popular recently among college students, especially shops that offer free Internet access to their patrons. Customers bring their laptops to these open Wi-Fi (802.11a,b,g,n) hotspots to surf the web and communicate with distant friends, but few realize that what they do on these public Wi-Fi hotspots may be viewed by other voyeuristic coffee connoisseurs.

    The focus of this article is on keeping others from intentionally violating your privacy while you use your laptop at a local coffee house, but most of the principles also apply to other wireless networks you may encounter. I’m going to try to be less technical here than I have been in other articles, but some things can only be simplified so much before they no longer contain any useful information. If you run into a term you do not understand try searching for it with Google or at Wikipedia.org. If all else fails, show this article to one of your more computer literate friends, buy them a coffee, and ask them to help you out.

    By their very nature wireless networks at coffee shops and other hotspots are meant to be easily connected to. The security options built into most wireless routers and access points, such as WEP and WPA, are normally disabled to facilitate this ease of connection. It’s also possible that your computer might encounter malware like worms or viruses that find their way onto your laptop via vulnerable services or open files shares. Before you go to your local shop make sure your Operating System patches are up-to-date and that you have enabled your local firewall.

    Open file shares

    One of the first things you should be aware of is open file shares. I’m just going to cover Microsoft Windows computers since they are the most common, but similar problems can exist for OS X and Linux systems too. While at a local hotspot some deviant folks may run a tool like Softperfect’s NetScan to find all open Windows file shares on the local network and see which ones they can read or write to. Less technical attackers may just look in “Network Places” and see what shows up. This could be kind of embarrassing if someone happens to find a little file share on your box that has some oh-so-private pictures. Another threat is that other computers on the hotspot’s network infected with malware could be looking for a place to spread to and happen to find shares on your laptop with write permissions.

    The quickest way to find out what file shares may be available to outsiders is to go to the run bar, type “compmgmt.msc”, hit enter and check under the “Shared Folders” section to see what’s there. If you see any shares without a $ on the end of their names (normally these are just “hidden” admin shares that only system administrators can get to) you may want to check the permissions on them. However, even if you find these shares, they may not be available to everyone. A local firewall may be in place that will block access to them unless the firewall is configured to allow “File and Printer Sharing”. A more thorough way to find out what shares you may have open is to have a friend take his Windows laptop, go to the run bar and type in something along the lines of:

    \\your-computer-name

    Obviously, change the “your-computer-name” to whatever your laptops name is. You can find your computer’s name by right-clicking on “My Computer”, choosing “Properties” and then selecting the “Computer Name” tab. Your safest bet is to turn off file sharing if you don’t use it. Click Start->Control Panel->Network Connections, then right click on your wireless connection, choose properties and uncheck “File and Printer Sharing for Microsoft Networks” to disable it.

    For more information on rogue file share visit this URL:
    http://www.irongeek.com/i.php?page=s...oguefileshares

    Sniffers

    Probably the biggest threat when using open Wi-Fi networks at coffee shops are deviant users running sniffers on the network. Pay special attention to this section if you’re interested in avoiding identity theft where attackers use your credentials to access bank, credit and other sorts of personal accounts. Sniffers (also known as Network Analyzers) are a category of software that can look at network traffic, decode it, and give meaningful information about what kind of data is crossing a network. While sniffers have a lot of legitimate uses they are also useful tools for deviant computer users since they can be used to pull plain text passwords off a network, watch instant message conversations (AIM, Yahoo, MSN, etc), read e-mail messages or view web sites that other hotspot users are visiting. A few popular general purpose sniffers are NAI Sniffer (commercial), Ethereal (an Open Source GUI Sniffer for Linux, Windows and other platforms), TCPDump (Open Source command line sniffer for *nix – any Unix like operating system like Linux or FreeBSD-) and its Windows version called WinDump. A bigger concern for users on open wireless networks would be special purpose sniffers like Cain, Ettercap and the Dsniff package that allow users to easily parse out passwords from network traffic.

    Since people have a tendency to ignore threats until they have been directly confronted with them I’m going to explain the background of some of the common attacks. Test these on your own home network if you like, BUT NOT ON SOMEONE ELSE’S! There are a few ways attackers can sniff a wireless network, depending on their hardware. Computers on a wireless LAN act a lot like they are on an Ethernet LAN using hubs. Every computer on the LAN can see the traffic destined to others but normally they just choose to ignore it. (In reality it’s a little more complicated than that, but I want this to be an article and not a book on the intricacies of 802.11 networks) However, if a network card is put into what is known as promiscuous mode, it will not ignore traffic going to other computers and will instead look at it, allowing the user of the computer running the sniffer to see the data traveling to other computers attached to the same access point. Promiscuous mode works on pretty much any wired network card in Windows and Linux (or other Unix like Operating System), but not all wireless cards support it properly (like Intel’s Centrino 802.11g chipset know as IPW2200). If the sniffer’s card does support promiscuous mode it will have to be attached to the wireless networks WAP (Wireless Access Point) to be able to see anything.

    If the attacker is using Linux (or another Unix like Operating System) the attacker may be able to use what is known as monitor mode if their card supports it. In monitor mode, the wireless network card listens to the raw packets in the radio waves without ever having to attach to a WAP. The nice thing about monitor mode from the attacker’s perspective is that they leave no logs of their activities since they don’t have to attach to the WAP and don’t have to send any packets on the network.

    A third way is to use what is known as ARP poisoning to route traffic through the attackers laptop, allowing them to see all of the traffic passed as well as giving them a chance to modify it (I’ve seen an Ettercap script that was programmed to replace the images in web page with the image from lemonparty.org. If you don’t know what that is don’t ask). Tools like Arpspoof, Ettercap and Cain all have ARP poisoning functionality built in. The downside to ARP poisoning from the attackers perspective is that it’s noisy (Intrusion Detection Systems [IDS] packages and ARPWatch can easily detect it) and has a tendency to screw up a network if it’s not done right or if someone decides to ARP poison the entire network at one time. ARP poisoning’s advantages for the attacker are that it can done in both Windows and *nix and it allows what is know as a Man-in-the-middle (MITM) attack. A Man-in-the-middle attack is where an attacker gets two or more other network members to send traffic through his computer first, then passes it on to its intended recipients. Man-in-the-middle attacks allow the attacker to “proxy” some protocols that are normally encrypted and secure (like SSL/TLS or SSH) and sniff the connection by pretending to be someone they’re not. Depending on the protocol, the user may get a warning message letting them know that the keys have changed. For example, if someone MITMs an SSL connection the user might see a message pop up from their browser something like:

    Firefox:
    Website Certified by an Unknown Authority
    Unable to verify the identity of server as a trusted site

    Microsoft Internet Explorer:
    Security Alert
    Information you exchange with this site cannot be viewed of changed by others. However, there is a problem with the sites security certificate.



    Notice the message from Microsoft is dead wrong. Another way you might notice that an ARP poisoning attack is going on would be if the network slows down to a crawl and you have intermittent networking problems. However there is no guarantee that an ARP poisoning attack will noticeably affect a network from a usability stand point. The most sure fire way to detect one is with an IDS in the right location on the network (Unfortunately, it’s doubtful you have one running on your laptop).

    A fourth way is for the attacker to set up their own laptop as a rogue access point using a tool like Hotspotter or Karma, wait for victims to unwittingly attach to it, and sniff to their little heart’s content.

    Giving a sniffer congestion

    The best way to defend against sniffers is three fold. First, don’t visit anything important while on a coffee shop’s Wi-Fi. This includes your email, financial institutions (credit card company and bank user information pages) or any place where you have to submit confidential information like your social security or credit card numbers. Do your online shopping at home.

    Second, when possible only use encrypted protocols (https, SSH, etc) when you are on a public network. For example, if you have to access a web page with confidential information make sure that the URL is preceded by https://. This indicates that the site is using SSL/TLS and that the data being transmitted between you and the server is encrypted (in theory, someone could be pulling a MITM attack as explained above). Not all protocols support encryption so you may want to look into using a service that allows you to “tunnel” through unsecured networks. Tunneling works by encrypting all of the data you are sending and routing it to an intermediate server (the exit point) on a network you trust (more or less) where it is unencrypted and sent on to its intended destination. A few examples of these systems are VPNs, Tor, Hamachi or SSH tunneling (all of which are topics too involved to cover here, but a quick Google search should tell you what you need to know). Using Torpark (a portable version of the Firefox web browser which can be run off of a USB thumbdrive) is a convenient way to use the Tor encrypted proxy network for those too lazy to set it up on their own Windows based laptop. For those that don’t want to touch an icky Microsoft Windows box try the OpenBSD based Anonym.OS LiveCD. I feel I should also make you aware that while the previously mentioned technologies will protect you from attackers at your local hotspot, deviant computer users at the exit point of the encrypted tunnel may still be able to sniff your data.

    And finally, use different passwords for different sites. To illustrate why it’s a bad idea to use the same password everywhere, let me give you a little theoretical scenario. Let’s say you use the same password on a social network site like MySpace or Facebook (which don’t use SSL for encryption, and trust me, they are easy to sniff with Cain or Ethereal) as you do on your bank’s web page (which more than likely does use SSL). If someone sniffs your Facebook or MySpace password they may then try to use it on your bank’s website, or maybe see if you use the same password for your email account.

    For further information on sniffers visit:
    http://www.irongeek.com/i.php?page=s...ntrotoSniffers
    http://www.irongeek.com/i.php?page=security/arpspoof

    With a little work and knowledge you can stay relatively safe on open Wi-Fi networks at coffee houses and other hotspots. If this article has you paranoid, or scratching you head like a monkey doing a math problem, ask a geeky friend for help. Enjoy your caffeine buzz.


    Tools:

    Softperfect’s NetScan
    http://www.softperfect.com/

    Ethereal
    http://www.ethereal.com/

    Cain
    http://www.oxid.it/cain.html

    Dsniff
    http://www.monkey.org/~dugsong/dsniff/

    Ettercap
    http://ettercap.sourceforge.net/

    TCPDump
    http://www.tcpdump.org/

    Hotspotter
    http://www.remote-exploit.org/

    Karma
    http://www.theta44.org/karma/

    Tor
    http://tor.eff.org/

    Hamachi
    http://www.hamachi.cc/

    Torpark
    http://www.freehaven.net/~arrakis/torpark.html

    Anonym.OS
    http://theory.kaos.to/projects.html

  2. #2
    The Prancing Pirate
    Join Date
    Jul 2004
    Posts
    548
    Hasn't changed much since the last time I saw it, but it's still a great article for caffeinated newbies! And I know alliteration is popular these days, but... never mind.

    You might want to check the thread's title though -
    Protecting your privacy at the local coffee shop
    Cheers,

    -jk
    TAZForum <---- click

  3. #3
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    Originally posted here by J_K9
    You might want to check the thread's title though -
    I figured I should give it a more descriptive title for those doing searches.

  4. #4
    Senior Member treanglin's Avatar
    Join Date
    Dec 2003
    Posts
    110
    Dude you always have the best post...I'm so jealous.

    I was on the Remote Exploit website the other day looking for the latest iso of Auditor and , to my suprise, they have changed it on me. I also went to the tutorial section and Right there was a flash tutorial from Irongeek. I was like..."thats the same guy who post on that message board that I goto sometimes".

    I'm so jealous.
    "Do you know why the system is slow?" they ask

    "It's probably something to do with..." I look up today's excuse ".. clock speed"
    -BOFH

  5. #5
    Howdy.

    great work Irongeek. 10/10 potatoes for this installment. i enjoyed reading it thoroughly.


    cheers
    front2back

  6. #6
    Senior Member
    Join Date
    Dec 2003
    Location
    Pacific Northwest
    Posts
    1,675
    Great Info Irongeek,

    I'd probably use a liveCD like: Anonym.OS liveCD if I went to one

    Found the same thoughts in the article provided by SarinMage

    cheers
    Connection refused, try again later.

  7. #7
    The Prancing Pirate
    Join Date
    Jul 2004
    Posts
    548
    Originally posted here by Irongeek
    I figured I should give it a more descriptive title for those doing searches.
    Aye - I don't know that many people who would search for "Caffeinated Computer Crackers: Coffee and Confidential Computer Communications" when looking for a coffee house privacy article!

    However, I was referring to the lack of an "r" in the thread's title. It should be 'your' instead of 'you'...
    TAZForum <---- click

  8. #8
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    Oops, thanks for letting me know. Maybe one of the moderators could put the r in for me. Seems I can't edit the topic title a this point.

  9. #9
    Senior Member JonnyFrond's Avatar
    Join Date
    Jan 2006
    Posts
    238
    Allow me to help polish your ego god forbid should it ever oxidise. A fine fine article, just what I needed, did you write it for me, that was kind

    I pick up 2 other networks where I live and just using simple commands in dos and seeing what info could be gleaned was quite scary. I was able to log straight into their wireless router, and I am sure with a little bit of googling, I could have found the default admin password, and caused some havok.

    Thankfully, I don't have that malicious streak inside me to want to do something just because I can.

    But basically, that means the average householder knows jack about what is going on outside of their own walls, and will only find out when the bank statements say empty. And to be honest even then they will not know. A common way that people use bank details is to take out a figure like £12.99 from maybe 1000 bank accounts, this way the punter will just think that it was a charge of some kind, and the fraudster will net £12,990 not bad for an hour or so's work.

    Criminals are not mugs, often they are highly intelligent people who can't get passed their own impulsive feelings, a great example of this is the story of Gary Gilmore who had an IQ of 130, and kept begging the authorities for some way of dealing with his problem, not just going to prison. He finally had to fight for the right to be executed and was the first one to be after the reinstatement of the capital punishment in the US in 1976.

    I am not trying to glorify criminality in any way, but I am very much on the side of you have to stand up for yourself and take your head out of the sand. Ignorance does not stand in a court of law, and neither should it. If we don't stand up and protect our selves as the first line of defence, then why should we expect others to do it for us.

    A great post Iron Geek.


    Jonny Soap Box Frond
    Sarcasm is a way of life

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides