SlideShare a Scribd company logo
Wi-Fi Hotspot Security
   Jim Geovedi <jim@geovedi.com>
Information

• The printable version of this presentation is less
  cooler than the original version and also it’s already
  modified.
Wireless Hotspot Security
Wireless Hotspot Security
Wireless Hotspot Security
How To Use Hotspot

• Getting access
• Visit hotspot with wireless device
• Associate and get network configuration
• Open web browser and get redirected to login page
• Authenticate
• ... welcome to the Internet!
Getting Access

• Buy prepaid card
• Registration with Credit card
• Use now pay later (e.g. charge in your hotel room at
  INCREDIBLE price)
• Send text message (SMS) and get login information
• Social engineering
• Hacking (sniffing, bruteforcing, etc.)
Hacking The Hotspot
Motivations

• If you are bored
• If you want to do something bad
  (e.g. spamming, hacking, etc.)
• If you don’t have money or lazy
  to pay but need Internet
  connection

  will hack for bandwidth
Critical Points

• Network configuration
• Authentication methods
• 3rd party interfaces
• Misunderstanding the trust
Network Configuration

• IP address
• Transparent SMTP
• Network segregation
Authentication Methods

• Web Hacking Kungfu
 • SQL injection
 • Cross site scripting
• Piggyjacking
3rd Party Interfaces

• Integrated with other system:
 • Payment Management System
 • ISP’s billing system
Misunderstanding Trust

• Unfiltered protocol or port tunneling
 • DNS (e.g. nstx, ozyman-dns, tunnelx)
 • UDP
 • ICMP
• Demo account (e.g. free access for 30min]
• Rogue 802.11 APs
Rogue 802.11 APs


                  Real AP



Rogue AP




           User
Once you’re in the middle...

• Capture (sniff) and manipulate the traffic
• Hack the client
 • Automated attack tools
 • FISHNet — where we can control client in a
    fishbowl environment
FISHNet

• Taking advantage of suspected client behavior
 • zero configuration
 • automatic update system
 • network services
• Fake services traps, exploiting clients, and create
  backdoor
Analysis On
Some Hotspot Gateway
      Products
Product N

• Widely deployed at big hotels
• Vulnerabilities:
 • Can bill the Internet access to someone’s room
 • Disclose the list of hotel guests to the Internet
 • Heavily depend on MAC address for identification.
    Easy to do piggyjacking
Product I

• Vulnerabilities:
 • Easy to bypass login by changing billing_method_id
    equal to 1 (one) — used by PMS
 • Only filter port 80... you can SSH to outside host
    and setup tunnel
 • Administration page is vulnerable to SQL Injection
    attacks
Product A

• Vulnerabilities:
 • You can do SQL injection in login page
 • You can manipulate the cookies
 • No network segregation
Defense Strategies

• Local AP awareness
• Customer education
• One-time authentication mechanism
• Do regular security assessment

• Write better code
• Don’t charge for hotspot access!

More Related Content

PDF
Wireless Hotspot: The Hackers Playground
DOC
Psdot 19 four factor password authentication
PDF
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
PDF
AI & NLP pada @begobet
PDF
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
PDF
Hacking Cracking 2008
PDF
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
PDF
Satellite Telephony Security
Wireless Hotspot: The Hackers Playground
Psdot 19 four factor password authentication
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
AI & NLP pada @begobet
Leonardo Nve Egea - Playing in a Satellite Environment 1.2
Hacking Cracking 2008
Adam Laurie - $atellite Hacking for Fun & Pr0fit!
Satellite Telephony Security

Viewers also liked (16)

PDF
Warezzman - DVB-Satellite Hacking
PDF
IDS & Log Management
PDF
Hacking Satellite: A New Universe to Discover
PDF
Is Cyber-offence the New Cyber-defence?
PDF
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
PDF
Professional Hackers
PDF
Satellite Hacking — Intro by Indianz (2012)
PDF
The 21st Century Bank Job
PDF
Hacking a Bird in the Sky: Hijacking VSAT Connection
PDF
Hacking Trust
PDF
Waluku: Answering Astronomy Questions through Social Media
PDF
Internet Worms
PDF
Hacking a Bird in the Sky: The Revenge of Angry Birds
PDF
Cheating the 10,000 hour rule
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
Warezzman - DVB-Satellite Hacking
IDS & Log Management
Hacking Satellite: A New Universe to Discover
Is Cyber-offence the New Cyber-defence?
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship
Professional Hackers
Satellite Hacking — Intro by Indianz (2012)
The 21st Century Bank Job
Hacking a Bird in the Sky: Hijacking VSAT Connection
Hacking Trust
Waluku: Answering Astronomy Questions through Social Media
Internet Worms
Hacking a Bird in the Sky: The Revenge of Angry Birds
Cheating the 10,000 hour rule
Cloud Security - Security Aspects of Cloud Computing
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks
Ad

Similar to Wireless Hotspot Security (20)

PPT
Cybercrime
PDF
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
PDF
CNIT 129S: Securing Web Applications Ch 1-2
PDF
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
PDF
How to hack a telecom and stay alive
PDF
Sergey Gordeychik - How to hack a telecom and stay alive
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PPTX
How to Hack a Telecom and Stay Alive
PPT
Online bankingsecurity
PDF
idsecconf2010-hacking priv8 network
PDF
y3dips hacking priv8 network
PPT
Web authentication
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
Redesigning Password Authentication for the Modern Web
PPT
Internet Security
PDF
Digital skimming root_conf_ppt
PDF
Ch 7: Attacking Session Management
PPT
Isys20261 lecture 09
PDF
CNIT 129S Ch 7: Attacking Session Management
PDF
Workshop on Network Security
Cybercrime
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
CNIT 129S: Securing Web Applications Ch 1-2
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to Hack a Telecom and Stay Alive
Online bankingsecurity
idsecconf2010-hacking priv8 network
y3dips hacking priv8 network
Web authentication
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Redesigning Password Authentication for the Modern Web
Internet Security
Digital skimming root_conf_ppt
Ch 7: Attacking Session Management
Isys20261 lecture 09
CNIT 129S Ch 7: Attacking Session Management
Workshop on Network Security
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
August Patch Tuesday
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
Programs and apps: productivity, graphics, security and other tools
A novel scalable deep ensemble learning framework for big data classification...
Unlocking AI with Model Context Protocol (MCP)
Chapter 5: Probability Theory and Statistics
Group 1 Presentation -Planning and Decision Making .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
DP Operators-handbook-extract for the Mautical Institute
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Mushroom cultivation and it's methods.pdf
Getting Started with Data Integration: FME Form 101
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
Heart disease approach using modified random forest and particle swarm optimi...

Wireless Hotspot Security

  • 1. Wi-Fi Hotspot Security Jim Geovedi <jim@geovedi.com>
  • 2. Information • The printable version of this presentation is less cooler than the original version and also it’s already modified.
  • 6. How To Use Hotspot • Getting access • Visit hotspot with wireless device • Associate and get network configuration • Open web browser and get redirected to login page • Authenticate • ... welcome to the Internet!
  • 7. Getting Access • Buy prepaid card • Registration with Credit card • Use now pay later (e.g. charge in your hotel room at INCREDIBLE price) • Send text message (SMS) and get login information • Social engineering • Hacking (sniffing, bruteforcing, etc.)
  • 9. Motivations • If you are bored • If you want to do something bad (e.g. spamming, hacking, etc.) • If you don’t have money or lazy to pay but need Internet connection will hack for bandwidth
  • 10. Critical Points • Network configuration • Authentication methods • 3rd party interfaces • Misunderstanding the trust
  • 11. Network Configuration • IP address • Transparent SMTP • Network segregation
  • 12. Authentication Methods • Web Hacking Kungfu • SQL injection • Cross site scripting • Piggyjacking
  • 13. 3rd Party Interfaces • Integrated with other system: • Payment Management System • ISP’s billing system
  • 14. Misunderstanding Trust • Unfiltered protocol or port tunneling • DNS (e.g. nstx, ozyman-dns, tunnelx) • UDP • ICMP • Demo account (e.g. free access for 30min] • Rogue 802.11 APs
  • 15. Rogue 802.11 APs Real AP Rogue AP User
  • 16. Once you’re in the middle... • Capture (sniff) and manipulate the traffic • Hack the client • Automated attack tools • FISHNet — where we can control client in a fishbowl environment
  • 17. FISHNet • Taking advantage of suspected client behavior • zero configuration • automatic update system • network services • Fake services traps, exploiting clients, and create backdoor
  • 18. Analysis On Some Hotspot Gateway Products
  • 19. Product N • Widely deployed at big hotels • Vulnerabilities: • Can bill the Internet access to someone’s room • Disclose the list of hotel guests to the Internet • Heavily depend on MAC address for identification. Easy to do piggyjacking
  • 20. Product I • Vulnerabilities: • Easy to bypass login by changing billing_method_id equal to 1 (one) — used by PMS • Only filter port 80... you can SSH to outside host and setup tunnel • Administration page is vulnerable to SQL Injection attacks
  • 21. Product A • Vulnerabilities: • You can do SQL injection in login page • You can manipulate the cookies • No network segregation
  • 22. Defense Strategies • Local AP awareness • Customer education • One-time authentication mechanism • Do regular security assessment • Write better code • Don’t charge for hotspot access!