Home / Security / Demonstracija krađe username-a i password-a na javnoj wireless mreži

Demonstracija krađe username-a i password-a na javnoj wireless mreži

Ovo je nastavak na članak koji vam se mnogo dopao i još jedan prikaz kako bukvalno neko ko nije hacker može da nanese veliku štetu vašoj firmi.  Uz ovaj članak, naučićete odakle preti opasnost i kako da se zaštitite od toga.

Pre nego što krenete dalje, ako niste pročitali obavezno pročitajte prvi deo ove priče – hakovanje fejsa i instagrama uz ispijanje kafe!

Članak je priča sa terena našeg prijatelja Vlade, on će vam preneti svoje utiske, a mi ćemo malo analizirati, šta je problem i koje je rešenje!

 


Korišćenje javnih mreža u poslovne svrhe zna da bude mnogo opasno iz tog razloga što zlonamerni napadač može doći do krucijalnih stvari koje mogu oštetiti vašu firmu.

Citat:

Aplikacija koju sam koristio u ovom slučaju se zove ` Intercepter-NG `.
Začudio sam se čto ima da se skine regularno na android marketu!

Da bi aplikacija radila, potrebno je da Android bude rutovan i da se ima instaliran skup Unix alata poznatih kao ` busybox`.

Aplikacije je sniffer koja može da presreće sledece protokole : ICQ\IRC\AIM\FTP\IMAP\POP3\SMTP\LDAP\BNC\SOCKS\HTTP\WWW\NNTP\CVS\TELNET\MRA\DC++\VNC\MYSQL\ORACLE\NTLM.

Primer koji sam uradio je presretanje poslovnog saobracaja jedne firme, gde sam došao do informacija o username-u i password-u njihovog e-maila.

Demonstracija hakovanja e-mail-a

Slika početka presretanja >

intercepter-NG

 

Slika nadgledanja saobraćaja >

intercepter-NG - sniffovanje

Pojavljivanje šifre u saobraćaju >

intercepter-NG- prikaz username i password

Pronalaženje username-a i passworda >

intercepter-NG- prikaz username i password2

Šteta može biti ogromna, zato što uvidom u poslovnu komunikaciju firme, napadač može doći do mnogo bitnih informacija i naneti veliku štetu!

Šta se vidi na slikama i kako je ukraden password?!

Poslednja slika prikazuje rezultat snimanja mrežnog saobraćaja na javnoj wireless mreži. Gde se pojavljuje username i password u čitljivom obliku!

Šta je javna wireless mreža?!

Pa ništa drugo, nego otvorena wireless mreža u kafiću, školi, bolnici… Gde su svi korisnici zakačeni na isti Access Point i gde su svi u istoj mreži. Ako je mreža zaštićena passwordom, to ne znači da ste zaštićeni od ovakvog napada.

Šta je napadač dobio?

Ukradeni su kredencijali (username i password) za pristup korporativnom e-mail nalogu. Pomoću tih podataka u mogućnosti ste da se ulogujete kao oštećeni i čitate poverljive informacije koje se šalju e-mail porukama. Ne samo da možete da čitate, već možete da šaljete poruke i tako sakrijete svoj identitet.

Šta je oštećeni radio?

Sa slika se uz pomoć mrežnih alata  može vidieti da je u pitanu plesk05.orion.rs [77.105.36.15] i protokol POP3 (protokol za prijem mailova)

Plesk predstavlja web/mail server za .aspx stranice – U pitanju je Windows hosting server Orion Telekom-a.

Username je namerno izbrisan sa slike da ne bi bilo zloupotreba, a on je obicno u obliku [email protected].

Žrtva ovog napada se zakačila na otvoreni wireless i samo je pokrenula neki e-mail client (Outlook Express…), kako bi proverila poštu. Korišćeni e-mail klijent je podešen tako da se da se autentikacija vrši pomoću clear text passworda.

Kako se zaštiti od ovih napada?

Sve ovo je napisano samo iz jednog razloga! Želimo da probudimo svest naših čitalaca o tome kako mala nepažnja može imati velike posledice. Nikada ne znate ko je sve od korisnika povezan na istu mrežu, nemate pojma šta sve izlažete riziku. Prevencija i edukacija je najbolja zaštita.

  1.  Izbegavajte korišćenje javnih wireless mreža, posebno u poslovne svrhe – možda neko snima saobraćaj! Napomena, ako je wifi zašticen WPA passwordom, to ne znači da ste zaštićeni, ukoliko je i napadač već zakačen na taj wireless.
  2. Ne logujte se na stranice koje nisu HTTPS. Pri autentikaciji, kod obicnih stranica HTTP, salje se clear text i snimanjem mrežnog saobraćaja je moguće dobiti čitljive podatke. Na pr: Facebook, Google su HTTPS i delom su zaštićeni, ali moguće je i probiti njih, ali to ne može baš svaki klinac sa Android aplikacijom.
  3. U okviru e-mail klijenta ne koristiti clear text autentikaciju. Ovo zavisi i od podešavanja samog servera, tako da ako je admin u firmi tako podesio server, krađa podataka je delom i njegova zasluga.
  4. U okviru Access Point uređaja, uključiti AP Isolation ili Client isolation.
  5. Na PC-u isključiti File Sharing.
  6. Po mogućstvu, koristiti VPN saobraćaj koji je kripotovan, mada, pri uspostavljanju konekcije, moguće je ukrasti „kredencijale“.
  7. Obavezna upotreba Antivirus i Firewall-a.
  8. Čitajte ovaj blog i saznajte na koje načine možete biti hakovani, samim tim znate kad preuzimate rizik! Ne tražimo ništa za uzvrat, eventualno Like ili Share, ako ste naučili nešto novo i korisno. Lep primer su kolege iz Eunet-a.

Napomena

Sve što je napisano u ovom članku je isključivo u edukativne svrhe. Podsetićemo vas koji je naš moto.

Cilj nam je da sve, što se u Srbiji na žalost još uvek debelo naplaćuje od strane raznih majstora, približimo prosečnoj osobi sa ovih prostora na jednostavan, razumljiv i prihvatljiv način. Ne tražimo ništa za uzvrat. Dovoljno je da se ponovo vratite na ovu adresu, naučite kako da sami sebi rešite problem i sigurnije zagazite u IT svet.

 

 

About Miloš

Ljubitelj računarskih mreža i interneta. Voljan da pomogne drugima :) Zaljubljenik u sve što ima veze sa mrežama, komunikacijama i bezbednošću na mreži. Cisco i MikroTik sertifikovani inženjer. Obožava digitalnu fotografiju.

91 comments

  1. WOW just what I was searching for. Came here by searching for bokep indo

  2. Amazing! This blog looks exactly like my old one!
    It’s on a totally different topic but it has pretty much the same page layout and design. Wonderful choice
    of colors!

  3. Hello my loved one! I want to say that this article is amazing, great
    written and include almost all vital infos. I’d like to look extra posts like this .

  4. I’ve learn a few excellent stuff here. Definitely value bookmarking for revisiting.
    I wonder how so much attempt you set to create this sort of wonderful informative site.

  5. Hi there, You’ve done a fantastic job. I’ll definitely digg it and personally recommend to my friends.
    I am sure they will be benefited from this website.

  6. This is the perfect site for everyone who hopes to
    find out about this topic. You understand so much its almost hard to argue with you (not that I
    really will need to…HaHa). You certainly put a brand
    new spin on a subject which has been discussed for ages.
    Excellent stuff, just excellent!

  7. My developer is trying to persuade me to move to .net from PHP.
    I have always disliked the idea because of the costs.
    But he’s tryiong none the less. I’ve been using WordPress on several websites for about a year and am concerned about switching to another
    platform. I have heard good things about blogengine.net.
    Is there a way I can import all my wordpress posts into it?
    Any kind of help would be really appreciated!

  8. Hi fantastic website! Does running a blog such as this take a massive amount work?
    I’ve absolutely no understanding of computer programming but I had been hoping to start my
    own blog soon. Anyways, should you have any ideas or tips for
    new blog owners please share. I know this
    is off subject however I just had to ask. Cheers!

  9. This article will assist the internet people for setting up new weblog or even a weblog from
    start to end.

  10. Its like you read my mind! You appear to know so much about this, like
    you wrote the book in it or something. I think that you can do with
    a few pics to drive the message home a little bit, but other than that, this is wonderful blog.
    An excellent read. I’ll definitely be back.

  11. Wonderful blog! I found it while browsing on Yahoo News.
    Do you have any suggestions on how to get listed in Yahoo News?

    I’ve been trying for a while but I never seem to get there!

    Thanks

  12. Currently it appears like Drupal is the top blogging platform out there right
    now. (from what I’ve read) Is that what you are using on your blog?

  13. Hello there, I found your site by the use of Google
    even as searching for a similar topic, your web site got here up, it
    appears to be like great. I’ve bookmarked it in my google bookmarks.

    Hi there, simply became aware of your weblog via Google, and located
    that it’s truly informative. I’m gonna be careful for brussels.

    I’ll appreciate should you proceed this in future. A lot of other folks will likely be benefited out of your writing.
    Cheers!

  14. It’s appropriate time to make a few plans for the longer term and it is time to be happy.
    I have read this submit and if I could I want to suggest you few attention-grabbing issues
    or advice. Perhaps you could write subsequent articles referring to this article.
    I want to read even more things about it!

  15. Thanks for every other fantastic post. The place else may anyone
    get that type of information in such an ideal approach of writing?
    I’ve a presentation subsequent week, and I am at the
    look for such info.

  16. It is appropriate time to make some plans for the future and it’s time
    to be happy. I have read this post and if I could I desire to suggest you few interesting things or suggestions.
    Perhaps you could write next articles referring to this
    article. I want to read even more things about it!

  17. If you would like to improve your know-how only keep visiting this
    web page and be updated with the newest news update posted here.

  18. I am not sure where you’re getting your info, but great topic.
    I needs to spend some time learning more or understanding more.
    Thanks for magnificent info I was looking for this information for my mission.

  19. When someone writes an piece of writing he/she keeps the image of a user in his/her brain that how a user
    can understand it. Thus that’s why this post is outstdanding.

    Thanks!

  20. I always emailed this weblog post page to all my friends,
    for the reason that if like to read it next my links will too.

  21. This is my first time pay a visit at here and i am truly pleassant to
    read all at single place.

  22. I always used to study paragraph in news papers but now
    as I am a user of web therefore from now I am using net for posts, thanks to
    web.

  23. Wow, fantastic blog structure! How long have you been blogging for?
    you made running a blog look easy. The overall look of
    your web site is great, let alone the content material!
    You can see similar here dobry sklep

  24. Wow, marvelous blog layout! How lengthy have you ever been blogging for?
    you made running a blog look easy. The total look of your site is
    wonderful, let alone the content material! You can see
    similar here sklep online

  25. Za android preporucujem wifi protector. Automatski prekida wifi kad vas neko snifuje i registruje njegovu/njenu mac adresu. Takodje preporucujem program vpn hot spot shield. Odlican, besplatan i ima ga za win, mac, ios i android platforme. Ukoliko platite ukidaju dosadne reklame. Moj mali doprinos dobrom blogu. Poz.

  26. Zato je kod mene u objektima gde sam ja postavljao WiFi uključena opcija AP isolation.

    • Bachi, slazem se da je pri podizanju „pravog“ hotspota to nezaobilazna opcija i rešava ovaj problem, pošto će klijenti biti izolovani jedni od drugih, odnosno, sami u svom VLAN-u. Ali veruj mi da je to retkost kod nas. Vlasnici tih objekata su u fazonu, daj samo da ima wireless.

  27. @ Milos

    dSploit radi 100%

    Testirao svaku funkciju.
    posveti mu malo paznje 😀

  28. Pratite blog.
    Bice jos iznenadjenja. 😀

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Scroll To Top