Wireless Laptops Hacked at Black Hat

By Deborah Gage  |  Posted 2006-08-03 Email Print this article Print
 
 
 
 
 
 
 

Researchers at the Black Hat security conference seized control of an Apple MacBook, by exploiting buggy code—and a similar problem affects laptops with Intel's wireless chips.

LAS VEGAS—Every year, security researchers and hackers at the Black Hat conference in Las Vegas compete to reveal new and scary vulnerabilities. Hundreds of them, almost all men, are running around Caesar's Palace this week in black T-shirts, the traditional dress of a hacker—eating, drinking, partying and hacking.

The most alarming news to surface Wednesday: evidence that ordinary wireless laptops may be easily commandeered.

Check The Washington Post's security blog for a video shown Wednesday by two researchers who seized control of an Apple MacBook by exploiting buggy code in its wireless device driver. The Mac doesn't even have to be connected to the Internet for the attack to work: Its wireless card just needs to be seeking a connection. The attack also bypasses encryption, if there is any.

Separately, Intel announced Wednesday that the same thing is possible on a PC and issued patches for flaws in three of its drivers—two Windows drivers for Centrino wireless chips and one driver for the Intel ProSet management software. Apple had not issued patches at presstime.

Equally worrisome was the Black Hat session about security flaws in common enterprise management software. According to the presenters—Dave Goldsmith and Tom Ptacek from Matasano Security, a consulting firm in New York—some of the flaws go back to at least 1993.

Goldsmith and Ptacek said companies have done a decent job securing their networks from external threats, with devices like firewalls that protect the perimeter of their networks, but ignore threats on the inside. These threats originate in applications that sit behind the firewall and were never designed to be secure.

Enterprise management software works like a lot like a botnet, Ptacek said, with agents and command and control channels that "dramatically ease the burden of managing tens of thousands of machines." The software is easily exploited because it is buggy and, in some cases, poorly documented or designed, he added, but its reach could give a hacker power over an entire enterprise.

For example, by triggering a buffer overflow in either an agent or a server, an attacker could take control of the system. At a minimum, Ptacek recommends disabling these systems' Web-based management consoles, which may be vulnerable to attacks from the outside.

One reason for such a precaution is that patches from vendors for these flaws are running nine to 12 months behind, he said. Matasano has a backlog of more than 30 vulnerabilities waiting for patches from vendors.

Click here for Deborah Gage's Baseline Security blog.



 
 
 
 
Senior Writer
debbie_gage@ziffdavisenterprise.com
Based in Silicon Valley, Debbie was a founding member of Ziff Davis Media's Sm@rt Partner, where she developed investigative projects and wrote a column on start-ups. She has covered the high-tech industry since 1994 and has also worked for Minnesota Public Radio, covering state politics. She has written freelance op-ed pieces on public education for the San Jose Mercury News, and has also won several national awards for her work co-producing a documentary. She has a B.A. from Minnesota State University.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters