The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   The Coat Room (http://hintsforums.macworld.com/forumdisplay.php?f=8)
-   -   Hacker Conference: Remotely Hijacking a Macbook in 60 Seconds on Stage (http://hintsforums.macworld.com/showthread.php?t=58970)

tlarkin 08-02-2006 11:44 PM

I am going to guess that it is, since the airport cards are broadcom chipsets, just like most of the consumer wifi cards and routers out there are based off broadcom chips

The third party they refer too, is probably across and in all platforms in one shapre or another.

How many "3rd party" devices work with macbooks?

I am sure its probably not a lot, and I am also sure they probably all have technology based off the same chipset.

Remember they really tried to standardize wireless networking, so there are standards across the board. This probably effects every computer user out there.

MBHockey 08-03-2006 06:39 AM

That does make sense...it's more of a shock i guess if they can say, "hey, this effects every computer user with a wireless card"

I still think he should have clarified if it affects a stock MacBook though...the fact that it is left out i find quite curious, since he seems very anti-Mac.

bramley 08-03-2006 06:54 AM

When I first read the article, I was left with the impression that the exploit would work on a MacBook where the card was on.
Quote:

Originally Posted by Washington Post
It is, they said, enough for a vulnerable machine to have its wireless card active for such an attack to be successful.

By active, I'm assuming that the card is set to transmit/receive instead of passive i.e listen only.

Having seen the video I see that the exploit did not force association with the computer masquerading as the access point. The exploit was executed only once the MacBook had automatically associated with the AP and it appeared to be used to bypass the firewall.

So why didn't they demonstrate forcing an association if they have this ability? Either we haven't been told the full story, or WP hasn't quite got its facts right.

Going just by the video, it would seem that setting the MacBook not to automatically connect would prevent the exploit from being executed. Setting your computer not to connect to any old network it sees seems a standard bit of security to me.

MBHockey 08-03-2006 10:26 AM

According to this guy, who spoke with Maynor for over an hour, the default MacBook wireless driver/card is susceptible to the same exploit, and they used a 3rd party card/driver at the request of Apple.

http://blog.washingtonpost.com/secur...book_post.html

voldenuit 08-03-2006 12:39 PM

Quote:

Originally Posted by MBHockey
According to this guy, who spoke with Maynor for over an hour, the default MacBook wireless driver/card is susceptible to the same exploit, and they used a 3rd party card/driver at the request of Apple.

http://blog.washingtonpost.com/secur...book_post.html

The whole story sounds weirder at every turn.

If Apple had really successfully "leaned" on them, they'd have used a Dell portable as the "victim" as well, preferably running Vista.
How do you fit together that the guys first publicly state something to the effect:
"Apple zealots are arrogant bastards and we're so gonna 0wn their ass",
and then, because Apple asked nicely, will do everything they can to embarass them a tiny little bit less ?
Hello ? Reality check ?

Hopefully we'll get some more hard facts on this story - as is, it's just deliberately vague and scary with next to none useful details on what is and how it is at risk.
The published part of the demo is about as content-free as it possibly gets. We don't even know how he got his root-shell on the MacBook once the exploit was successful.

Regardless of the real gravity of the exploit, the PR the authors make around it is anything but serious - let's wait and see.

lyndonl 08-03-2006 02:28 PM

yip sounds dodgy to me
check out the Daring Fireball write up
he brings up valid points as usual
http://daringfireball.net/2006/08/krebs_followup

blubbernaut 08-03-2006 09:51 PM

Some more interesting investigation over at the.taoofmac.com

yellow 08-18-2006 02:38 PM

Update: They admit that their little "mac hacking" didn't even use Apple drivers. It was all 3rd party drivers just hanging off a Mac. FUDtards. :rolleyes:

http://www.macworld.com/news/2006/08...hack/index.php

Smugness renewed.

tlarkin 08-18-2006 06:42 PM

Quote:

Originally Posted by yellow
Update: They admit that their little "mac hacking" didn't even use Apple drivers. It was all 3rd party drivers just hanging off a Mac. FUDtards. :rolleyes:

http://www.macworld.com/news/2006/08...hack/index.php

Smugness renewed.

Umm, it was my understanding apple doesn't write their own drivers, they use thirdy party drivers themselves....

Is this correct?

They admitted in the video they were using a third party wifi device, and only the airport card uses airport drivers.

However, it was also my understanding like every wifi card out there uses some of the same basic level of drivers hence the standardization of wifi networks...

This is just what I got out of it, I could be wrong...

hayne 08-18-2006 09:45 PM

Quote:

Originally Posted by tlarkin
However, it was also my understanding like every wifi card out there uses some of the same basic level of drivers hence the standardization of wifi networks...

No - the standardization of WiFi networks comes from the fact that they all adhere to an IEEE standard: http://grouper.ieee.org/groups/802/11/

tlarkin 08-19-2006 01:49 PM

Quote:

Originally Posted by hayne
No - the standardization of WiFi networks comes from the fact that they all adhere to an IEEE standard: http://grouper.ieee.org/groups/802/11/


okay but apple does not write their own drivers a third party does correct? that is what I have read online referring to this "hacking fiasco"

voldenuit 08-24-2006 08:29 AM

There are a lot of comments still being written about this story, here's one with lots of links to others:

http://wifinetnews.com/archives/006880.html

It's really bizarre how neither the "researchers" nor anybody else have been able to come up with a consistent, confirmable story.

Unless important details have not been disclosed for valid reasons, David Maynor and Jon Ellch may very well be dead meat in the security community after this stunt which looks more and more like nothing but press-whoring rather than serious research.

tlarkin 08-24-2006 09:40 AM

Quote:

Originally Posted by voldenuit (Post 317101)
There are a lot of comments still being written about this story, here's one with lots of links to others:

http://wifinetnews.com/archives/006880.html

It's really bizarre how neither the "researchers" nor anybody else have been able to come up with a consistent, confirmable story.

Unless important details have not been disclosed for valid reasons, David Maynor and Jon Ellch may very well be dead meat in the security community after this stunt which looks more and more like nothing but press-whoring rather than serious research.

sounds like a bunch of hearsay and speculation to me....On everyone's end. Nothing can be proved or disproved, and like any company apple, atheros, MS, or anyone is going to come out and openly admit a security flaw with out the express documentation of the exploit, and proof that there is one. Even with said proof some companies would just sweep it under their rugs, and never look at it again once fixed, and of course never admit to it even existing.

I am kind of tired about this whole hacking the wifi driver vulnurability thing now. One good thing will come of it though, the devs will now test more thoroughly exploits in their drivers for security. Well, hopefully they will.

bramley 09-22-2006 05:29 AM

Apple issues security update with regard to wifi security.

Notes are here: http://docs.info.apple.com/article.html?artnum=304420

I guess this is in response to the above hack. Note all Macs are in some way vulnerable.

[EDIT I should add that I've installed the update (via SU) and haven't seen any problems]
[FURTHER EDIT I see that the documentation actually states that no known exploits exist for each of the problems described - so that could mean that the original subject of this thread may not have been patched - assuming the exploit was genuine]

MBHockey 09-22-2006 09:04 AM

Yeah, I believe Apple stated they released fixes for stuff they had found internally...and that SecureWorks never provided proof to them that they had something to fix.

bramley 09-22-2006 10:17 AM

Quote:

Originally Posted by MBHockey (Post 323345)
Yeah, I believe Apple stated they released fixes for stuff they had found internally...and that SecureWorks never provided proof to them that they had something to fix.

I've found an article that says much the same thing: http://wifinetnews.com/archives/cat_security.html

I guess the general thrust of the hackers claims has been proven but the specifics are still unclear.

cwtnospam 09-22-2006 11:16 AM

I think John Gruber made it pretty clear that Secure Works was disingenuous at best:
http://daringfireball.net/2006/08/curious_case


All times are GMT -5. The time now is 04:10 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.