Earthweb.com Practically Networked Home Earthweb developer.com HardwareCentral earthwebdeveloper CrossNodes Datamation
Welcome to PractiallyNetworked
Product Reviews

 • Routers
 • Hubs/Switches
 • Wireless Gateway
 • Wireless AP
 • Wireless NIC
 • Network Storage
 • Print Servers
 • Bluetooth Adapters
Troubleshooting
& Tutorials

 • Networking
 • Internet Sharing
 • Security
 • Backgrounders
 • Troubleshooting
    Guides

 • PracNet How To's
User Opinions
Practicallynetworked Glossary

 Find a Network Term  
 
Forums
About
Jobs
Home

  Most Popular Tutorials

• Microsoft Vista Home Networking Setup and Options
The most daunting part of upgrading to Windows Vista may be trying to figure out where in the layers of menus the networking and file-sharing options are hidden.

• Do It Yourself: Roll Your Own Network Cables
It may not be something you do everyday, but having the supplies and know-how to whip up a network cable on the spot can be very handy.

• Tips for Securing Your Home Router
Seemingly minor and easily overlooked settings can still have profound security implications. Here are some steps you can take to make sure your wired or wireless home router and by extension, your network is as secure as possible.

  Most Popular Reviews

• Microsoft Windows Home Server
If you have a home network, you'll welcome the easy file sharing, remote access and the image-based backup features of Windows Home Server.

• Iomega StorCenter Network Hard Drive
Iomega's fourth generation StorCenter Network Hard Drive brings many of the features found in higher-end storage devices down to an attractive price.

• MikroTik's The Dude
This free tool delivers many of the same capabilities that you'd find in pricey network monitoring tools. As long as you don't mind tinkering, The Dude is a decent network utility that should be worth the download.



Protect Yourself From Coffee Shop Wi-Fi Attacks

By Kenneth van Wyk

The world just got a bit riskier for mobile Internet users. You see, there's this perfect storm of risks lined up to make our lives a little more dangerous. Here's why, and here's what we can do to fight back.

In the last couple years, a new breed of mobile user has sprung up. Thanks in large part to the iPhone (and the iPhone-wannabees), the world now has a lot more mobile devices hungry for a live (and free) Wi-Fi connection. Sure, we've been using Wi-Fi for years, but at least for many of us, what was once the casual and even occasional laptop login has become a more convenient and far more frequent quick check for e-mail, stock reports, headlines, etc.

We're using our hyper-mobile devices all the time now. Standing in line at the coffee shop, we quickly fire up our pocket-sized devices to see what's going on in the world.

Now, here's where the risk storm comes in.

When you point your Wi-Fi interface at a local wireless access point (WAP ), you're implicitly trusting it. Say, for example, you're in your favorite coffee shop and turn on your mobile device and see there's a Wi-Fi net present-say, something like "Acme-wireless." You see it's not using WEP , so you blindly and courageously take the leap of faith and connect to it.

What's That Term?

Not sure what a particular networking term means? Check out our searchable glossary.
 

Once on the wireless, you bring up your browser and try to connect to a Web site. Looks fine, so you login to the site, perhaps providing your login credentials (or a browser-stored cookie containing your login credentials). Away you go-and away your login credentials go. You've just fallen for the oldest trick in the book, the dreaded "man in the middle attack," and your attacker now has your credentials/cookie.

How could that have happened, you ask? Well, when you signed onto "Acme-wireless," you trusted that it was indeed "Acme-wireless" and that it is operated by an honest business. The only proof you had that it was indeed "Acme-wireless" was that it said so.

You've been duped.

Yes, it's easy to do. It would be absolutely simple to configure a laptop PC to masquerade as "Acme-wireless" and then to collect login credentials from unsuspecting mobile users seeking a free Wi-Fi fix. After all, the Wi-Fi standard provides no mechanism for the user to authenticate the server. None. Nada. Zip.

And that's just one kind of Wi-Fi-based attack. It gets worse. When you connect over Wi-Fi, a lot of relatively sensitive information (e.g., passwords, session IDs, cookies) is routinely passed unencrypted and is thus open to being trivially sniffed by anyone else on the same Wi-Fi site. That person sitting next to you in the coffee shop could well be running a sniffing tool like Wireshark and collecting anything sensitive that your browser or email client emits.

Now, combine all that with the fact that our hyper-mobile devices are getting smaller and smaller, while at the same time becoming more and more capable as powerful computing devices. Further, we're starting to trust them more and more for connecting to sensitive network services, including financial services and such. That is to say that they are without a doubt becoming serious targets by the miscreants of the world who want to liberate your money from your wallet.

How can we protect ourselves? Fortunately, there are a few relatively simple things we can do to make things safer.

Start by being a little paranoid. If it seems too good to be true, it probably is, right? Additionally, here are a few more things you can start doing today to improve your wireless risk exposure:

Be Familiar
When you're in a location you haven't been to before and you want to use their Wi-Fi, look (or ask) for instructions on how to connect to their SSIDs. This is no guarantee, of course, but it's a good start, as you're more likely to find legitimate WAPs this way.

Wi-Fi Credentials
If you use a Wi-Fi service that requires you to enter your account information before you can connect, double check that you're actually connected to your provider before entering the information. More than likely, the login screen that your browser automatically takes you to will be SSL encrypted over HTTPS. Take a moment to view the SSL certificate—if your mobile device lets you—and the URL to double check that you're talking to your Wi-Fi provider and not a rogue web site set up to collect your credentials. That is, don't trust the login page until you know it is legitimate.

VPN
Once connected to the Wi-Fi, invoke a secure VPN connection. Strong VPNs should be IPsec -based, but even PPTP will suffice. The point is to encrypt all of your traffic that goes through the local Wi-Fi, even if the Web pages and other network content are not otherwise encrypting. This will prevent the sniffer-in-the-coffee-shop attack from successfully stealing your sensitive data. If your company doesn't have a VPN to use, consider using a public VPN service.

SSL
Especially if you didn't heed my warning regarding VPN usage above, you really want to ensure all your sensitive information is being encrypted while it transits the local Wi-Fi net. That typically means SSL. To the extent possible, make sure all applications that send and receive sensitive information, login credentials, etc., are configured to use SSL for all sessions. And, as in the case of the Wi-Fi provider login page, take a moment to check SSL server certificate validity whenever you connect to an SSL-based service.

Free Public Wi-Fi
It's not uncommon to see a Wi-Fi connection dubbed "Free Public Wifi." It is in fact neither. Instead, it's due to a Windows bug and should simply be avoided.

These tips are just a starting point, of course. The main message is to be a little apprehensive when using your hyper-mobile device. A little bit of mistrust here will go a long way to protecting you.

Article courtesy of Datamation


For more help, check out the PracticallyNetworked Forums.

Add to del.icio.us | DiggThis




Earthwebnews.com Earthweb developer.com HardwareCentral earthwebdeveloper CrossNodes Datamation


Home | Networking | Backgrounders | Internet Sharing | Security | HowTo | Troubleshooting | Reviews | News | About | Jobs | Tools | Forums