• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • Daily Security Bytes
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

You Won’t Believe How Many People Connected to Our Rogue AP At This Year’s RSA Conference

February 24, 2017 By The Editor

privacy suits spying

We did it again! If you recall last year at the RSA Conference, our team set up a fake Wi-Fi Access Point (AP) and used an old Wi-Fi attack for a simulated hacking attempt to see how many clients we could trick in to connecting to it. This year we repeated the same experiment and our Director of Strategic Alliances Ryan Orsi wrote an article about the results for Help Net Security. But don’t worry, just like last year, we did not carry out the hack or interfere in anyone’s Wi-Fi connection.

We were interested in evaluating attendee behavior – has the security community gotten better about Wi-Fi security since last year? Unfortunately, according to our little research project, no, they have not. 

So, how did we run the test? Once again, we set up a rogue AP in our booth at RSA and had it broadcast eight globally common SSID names. And, we had a Pineapple Tetra configured to perform an old-school Karma attack. The Tetra listened for SSID beacon requests in the air from nearby smart and wearable devices. A full Karma attack would then broadcast these SSIDs and trick those nearby devices into connecting. This set-up allowed us to simulate a very nice man-in-the-middle attack. For security reasons, we did not broadcast the sniffed SSIDs or allow any client device to associate with the Tetra.   

Here’s an excerpt from the article discussing the results:

Anecdotally, we tricked 2,043 more clients into connecting to our rogue AP than last year. Our WIPS sensor showed us that 8,206 unique Wi-Fi clients dwelled around our booth for at least a minute or two. The Tetra saw and captured beacon requests from these visitors resulting in 8,653 unique SSIDs captured. Lastly, using the same eight common SSIDs as last year, we managed to trick 4,499 Wi-Fi clients into connecting to our rogue AP, which harmlessly served them speedy Internet while their owners enjoyed live demos. 

Read the full article at Help Net Security for more analysis and to get great tips on securely offering Wi-Fi. And, read more about public Wi-Fi security on Secplicity.

Share This:

Related

Filed Under: Editorial Articles, Featured Tagged With: Hacking

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • USA’s Answer to GDPR
  • Rolling PWN

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Private Sector Offensive Actors
  • USA’s Answer to GDPR
  • Rolling PWN
  • Over a Billion Records Leaked in Shanghai National Police Database Hack
  • LockBit Ransomware Group Introduces Bug Bounties and More
View All

Search

Archives

Copyright © 2022 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use