The Glade 4.0
https://gladerebooted.net/

One thing we can all be happy about today
https://gladerebooted.net/viewtopic.php?f=2&t=6715
Page 1 of 1

Author:  Darkroland [ Wed Jul 13, 2011 10:34 am ]
Post subject:  One thing we can all be happy about today

is the fact that we don't live next to this guy.

http://www.wired.com/threatlevel/2011/07/hacking-neighbor-from-hell/

Quote:
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term Tuesday for unleashing a vendetta of cyberterror that turned his neighbors’ lives into a living nightmare.

Barry Ardolf, 46, repeatedly hacked into his next-door neighbors’ Wi-Fi network in 2009, and used it to try and frame them for child pornography, sexual harassment, various kinds of professional misconduct and to send threatening e-mail to politicians, including Vice President Joe Biden.

His motive was to get back at his new neighbors after they told the police he’d kissed their 4-year-old son on the lips.

“Barry Ardolf has demonstrated by his conduct that he is a dangerous man. When he became angry at his neighbors, he vented his anger in a bizarre and calculated campaign of terror against them,” (.pdf) prosecutor Timothy Rank said in a court filing. “And he did not wage this campaign in the light of day, but rather used his computer hacking skills to strike at his victims while hiding in the shadows.

“Over months and months, he inflicted unfathomable psychic damage, making the victims feel vulnerable in their own home, while avoiding detection.”

Ardolf’s attorney, Kevin O’Brien, said in a telephone interview that “it was a lengthy sentence for a first time offender.” The defendant also forfeited his house and computer gear.

Ardolf had no criminal record, but an investigation revealed that he’d also hijacked the Wi-Fi of other neighbors, and terrorized them as well.

A father of two, Ardolf had turned down a 2-year plea agreement last year to charges related to the Biden e-mail. After that, the authorities piled on more charges, including identity theft and two kiddie-porn accusations carrying lifetime sex-offender registration requirements. He pleaded guilty to them all last year.

The bizarre tale began in 2009 when Matt and Bethany Kostolnik moved in the house next door to Ardolf, who at the time was a Medronic computer technician living in the Minneapolis suburb of Blaine. On their first day at their new home, the Kostolnik’s then-4-year-old son wandered near Ardolf’s house. While carrying him back next door, Ardolf allegedly kissed the boy on the lips.

“We’ve just moved next door to a pedophile,” Mrs. Kostolnik told her husband.


The couple reported Ardolf to the police, angering their creepy new neighbor. ”I decided to ‘get even’ by launching computer attacks against him,” Ardolf later wrote in a letter to the judge.

Rank, the prosecutor, put it not so mildly:

“It was apparently this incident which caused the defendant to begin a calculated campaign to terrorize his neighbors, doing whatever he could to destroy the careers and professional reputations of Matt and Bethany Kostolnik, to damage the Kostolniks’ marriage, and to generally wreak havoc on their lives,” he said.

Ardolf downloaded Wi-Fi hacking software and spent two weeks cracking the Kostolnik’s WEP encryption. Then he used their own Wi-Fi network to create a fake MySpace page for the husband, where he posted a picture of a pubescent girl having sex with two young boys. Under the “about me” section, he wrote:

“I bet my coworker that since I’m a lawyer and a darn great one that I could get away with putting up porn on my site here. I bet that all I have to do is say that there is plausible deniability since anybody could have put this on my site. Like someone hacked my page and added porn without my knowledge. This is reasonable doubt. I’m a darn good lawyer and I can get away with doing anything!”

He then e-mailed the same child porn to one of the husband’s co-workers, and sent flirtatious e-mail to women in Mr. Kostolnik’s office. “You are such a fox,” read one of the e-mails. He sent the message’s through the husband’s genuine e-mail account.

After the husband explained to his law office superiors that he had no idea what was happening, his bosses hired a law firm that examined his network and discovered that an “unknown” device had access to it. With Kostolnik’s permission, they installed a packet sniffer on his network to try and get to the bottom of the incidents.

Then, in May 2009,the Secret Service showed up at Kostolnik’s office to ask about several threatening e-mails sent from his Yahoo account, and traced to his IP address, that were addressed to Biden and other politicians. The subject line of one e-mail read: “This is a terrorist threat! Take this seriously.”

“I swear to God I’m going to kill you!,” part of the message to Biden said.

A forensics computer investigator working for Kostolnik’s law firm examined the packet logs, and found the e-mail sessions sending the threats. In the data surrounding the threatening traffic, they found traffic containing Ardolf’s name and Comcast account .

The FBI got a search warrant for Ardolf’s house and computer, and found reams of evidence, including copies of data swiped from the Kostolniks’ computer, and hacking manuals with titles such as “Cracking WEP Using Backtrack: A Beginner’s Guide;” “Tutorial: Simple WEP Crack Aircrack-ng” and “Cracking WEP with BackTrack 3 – Step by Step instructions.” They also found handwritten notes laying out Ardolf’s revenge plans, and a cache of snail mail that Ardolf had apparently stolen from the Kostolniks’ mail box and stashed under his bed.

“One of the manuals had Ardolf’s handwriting on it and another had the unique identifying ID for the Kostolniks’ router typed into it,” Rank, the prosector, wrote.

Also discovered in Ardolf’s possession was the pornographic image posted on MySpace and sent to the husband’s co-worker, and evidence that he’d secretly staged a similar harassment campaign against a neighbor at Ardolf’s previous home in Brooklyn Park, another Minneapolis suburb. Among other things, he sent that family a snail-mail message consisting of a one-page, color print-out of the family’s “TurboTax” return with personally identifying information, in addition to several skull images.

“I told you about a year ago that you should be very afraid. I can destroy you at will, you sorry *** excuse for a human,” the letter said.

The Brooklyn Park family told the FBI they believed Ardolf was upset that their personal care attendants, who looked after their two disabled twin daughters, parked their car in front of his house.

Author:  Midgen [ Wed Jul 13, 2011 10:49 am ]
Post subject: 

Wow, what a loser...

And I don't know why, but this line made me chuckle...

Quote:
unfathomable psychic damage

Author:  Aizle [ Wed Jul 13, 2011 12:01 pm ]
Post subject: 

Wow.

Blaine is one of the northern suburbs of the city I live near. (I'm in the SW suburbs)

Author:  Lonedar [ Wed Jul 13, 2011 12:43 pm ]
Post subject: 

I'm not quite as annoyed at my neighbor's failure to routinely mow his lawn anymore.

Author:  Stathol [ Wed Jul 13, 2011 1:35 pm ]
Post subject:  Re: One thing we can all be happy about today

Well, someone has to say it ...

Quote:
Ardolf downloaded Wi-Fi hacking software and spent two weeks cracking the Kostolnik’s WEP encryption.


Don't use WEP.

Don't use WEP.

DON'T. USE. WEP.

Author:  Ranelagh [ Wed Jul 13, 2011 3:52 pm ]
Post subject: 

So what should one use?

Author:  Aizle [ Wed Jul 13, 2011 3:55 pm ]
Post subject:  Re:

Ranelagh wrote:
So what should one use?


WPA or WPA-2

You should also setup your wireless router to NOT broadcast it's SSID.

Author:  Stathol [ Wed Jul 13, 2011 5:42 pm ]
Post subject:  Re: One thing we can all be happy about today

SSID hiding is security theater. Arguably, it even weakens your security if you have any mobile wifi devices (ex. cell phone, laptop, etc.) that ever leave your house. It pretty much boils down to this: who is SSID-hiding going to stop? Clueless casual snoopers? Even WEP accomplishes this on its own, and WPA(2) certainly does. Determined crackers? The same tools used to crack WEP are also used to probe hidden SSIDs, so no. Basically it accomplishes nothing.

Author:  Darkroland [ Wed Jul 13, 2011 10:33 pm ]
Post subject:  Re: One thing we can all be happy about today

Haha, "Security Theater", I like that.

Author:  Lenas [ Wed Jul 13, 2011 10:59 pm ]
Post subject: 

How easy it is to access a router using MAC filtering?

Author:  Hokanu [ Wed Jul 13, 2011 11:05 pm ]
Post subject: 

WPA+MAC filtering?

Edit: Lenas beat me to it.

Author:  Lenas [ Wed Jul 13, 2011 11:07 pm ]
Post subject: 

Some quick Googlin' makes it seem very clear that the only real way to go is WPA2.

Author:  Stathol [ Wed Jul 13, 2011 11:46 pm ]
Post subject:  Re: One thing we can all be happy about today

Pretty much.

As to MAC filtering, spoofing a MAC address is pretty much trivial.

Author:  Lenas [ Wed Jul 13, 2011 11:46 pm ]
Post subject: 

Guess I'll reconfigure my network tonight... AGAIN.

Author:  darksiege [ Thu Jul 14, 2011 12:58 am ]
Post subject: 

I used to use WPA2 + MAC Filtering + not broadcasting my SSID, then my iPod started to freak out and not be able to connect to the network. So with my new router I just use WPA2.

Author:  Kaffis Mark V [ Thu Jul 14, 2011 12:00 pm ]
Post subject: 

Lots of things that stay on get fussy with unbroadcast SSIDs. Different devices/drivers have different ideas about when they should attempt to join remembered hidden SSID networks. I found that it played havoc with my laptop when I would sleep it away from the house and then wake it at home. It would never connect, until I restarted, because apparently the wireless driver didn't think that turning off wireless and turning it back on meant it was a good time to try again.

So, yeah. WPA2 + MAC filtering is what I do now. Sure, the MAC filtering isn't a big obstacle, but it's not inconvenient for me and it's just that extra thin layer.

Author:  Aizle [ Thu Jul 14, 2011 12:09 pm ]
Post subject:  Re: One thing we can all be happy about today

Stathol wrote:
SSID hiding is security theater. Arguably, it even weakens your security if you have any mobile wifi devices (ex. cell phone, laptop, etc.) that ever leave your house.


Can you expound on that?

Author:  Aizle [ Thu Jul 14, 2011 12:10 pm ]
Post subject:  Re:

Kaffis Mark V wrote:
Lots of things that stay on get fussy with unbroadcast SSIDs. Different devices/drivers have different ideas about when they should attempt to join remembered hidden SSID networks. I found that it played havoc with my laptop when I would sleep it away from the house and then wake it at home. It would never connect, until I restarted, because apparently the wireless driver didn't think that turning off wireless and turning it back on meant it was a good time to try again.


Odd. Never had a problem with it.

Author:  Lenas [ Thu Jul 14, 2011 1:10 pm ]
Post subject:  Re: One thing we can all be happy about today

Aizle wrote:
Stathol wrote:
SSID hiding is security theater. Arguably, it even weakens your security if you have any mobile wifi devices (ex. cell phone, laptop, etc.) that ever leave your house.


Can you expound on that?


It's because the device send out a signal searching for the SSID, and those devices are not secured.

Author:  Stathol [ Thu Jul 14, 2011 2:07 pm ]
Post subject:  Re: One thing we can all be happy about today

Wireless security in a nutshell:

WEP and WPA(1) both use the RC4 stream cipher for the underlying encryption. RC4 is no longer considered "strong", but only in the sense that distributed computing and/or massive super computers might eventually crack it. That said, there is a known-plaintext attack against RC4 (and therefore against both WEP and WPA) that would theoretically allow reading data from very short packets containing mostly known text. Moreover, due to a weakness in WPA's integrity algo (WEP's is even worse), it is theoretically possible to inject data undetected into said very small packets. There's no direct vulnerability here, but it could allow some indirect attacks against the network, at least if it connects to the internet. Either way, this is a very sophisticated attack that would be beyond the reach of even amateur crackers (let alone script kiddies) even supposing that you had the right tools (which as I understand it are not yet complete).

Where WEP horribly fails compared to WPA is that it uses a highly flawed method to derive the RC4 traffic keys from the WEP key. In short, it allows an attacker to fully reverse the WEP key just by sniffing traffic over a relatively short amount of time (usually just a few minutes). WPA replaces that flawed method with TKIP, for which there are not any known attacks.

WEP's authentication schemes -- Open System and Pre Shared Key -- are both also quite flawed. PSK moreso than open system. This is mostly moot, though, since both auth methods merely require knowledge of the WEP key, which can be trivially cracked, per above. In contrast, WPA uses the same auth methods as WPA2: WPA-Personal and WPA-Enterprise. More on that later.

WPA2 uses CCMP, which is entirely different from both WPA and WEP. CCMP is based on AES-128 encryption, and is very strong. The message integrity method is also improved over TKIP, preventing the sort of injection attack theoretically possible with WPA. There are some theoretical crypto attacks against AES in general, but nothing that would allow actual cracking except maybe by three-letter agencies (who knows?)

For authentication, WPA and WPA2 both allow for either WPA-Personal, or WPA-Enterprise.

WPA-Personal uses a single 256-bit key shared with all devices to authenticate them. The key can be entered directly in hex, or generated by a hashing algo from a password. The strength of this system depends on the strength of the password and the trustworthiness of the users. Weak passwords can be bruteforced -- very quickly if you use a common SSID name, which enables the use of rainbow tables. Dishonest or incompetent users can of course leak the key.

WPA-Enterprise is basically just EAP authentication with a RADIUS server. Since RADIUS is open-ended, you could be authenticating against just about anything using just about any kind of credentials. It could use something as simple as user/pass auth or something as complicated as two-factor auth using a smart card/RSA frob/biometrics.

So depending on how you personally implement them, both WPA-Personal and WPA-Enterprise can be anywhere from extremely weak to extremely strong.

In the end analysis:

  • If WPA2 is available, use that. If your router supports "mixed mode" (a.k.a. CCMP +TKIP, AES + TKIP, WPA + WPA2), only clients which actually use WPA/TKIP will be vulnerable to the theoretical injection attack, so it's not really dangerous to leave on. However, if you aren't using it, go ahead and disable it.
  • If only WPA is available, don't freak. Practically speaking, you're still secure against all but sophisticated crackers, and even then there are a lot of mitigating factors about what harm could actually be acomplished. Either way, no sensitive traffic can be decrypted, nor can your network be used by an unauthorized attacker. Upgrade to WPA2 when you can, but don't feel like you have to rush out and do it now.
  • If only WEP is available, buy a new router. Do it right now. WEP is completely, 100% insecure no matter what you do.
  • MAC filtering is largely pointless. WPA/WPA2 are all vastly greater barriers to unauthorized access than MAC filtering. And as for WEP, it's a given that anyone who can crack WEP can also get around MAC filtering.
  • SSID hiding is also mostly pointless. It's trivial to reveal hidden SSIDs with common tools and no knowledge. Moreover, when you take a device out of range of your hidden SSID, it will constantly try to reconnect to it. That is, it can't tell if an AP with that SSID is in range or not precisely because the AP doesn't broadcast its SSID. This matters because every time it does so, it broadcasts the name of your SSID to everyone within earshot. In a sense, this is worse than having your AP broadcast a SSID, since your AP at least stays in once place and can thus only be heard by people near your house. Your laptop or cellphone goes all over the place. Admittedly, this is a minor point and would only matter with a determined hacker, but the tools for doing this exist and don't require any particularly special knowledge to use.

Author:  Diamondeye [ Thu Jul 14, 2011 2:50 pm ]
Post subject: 

I'm glad to know that. After reading this, I checked my router and thankfully its set to WPA/WPA-2. I'm not sure if, or how, I could set it to WPA-2 only but at least I'm not using WEP.

Author:  Lonedar [ Thu Jul 14, 2011 3:37 pm ]
Post subject:  Re: One thing we can all be happy about today

Stathol wrote:
Really smart stuff


Thanks for this. I will be doing a bit of minor router configuring tonight.

Page 1 of 1 All times are UTC - 6 hours [ DST ]
Powered by phpBB® Forum Software © phpBB Group
https://www.phpbb.com/