[ISN] Students to study Valley's vulnerability to hackers
InfoSec News
isn at c4i.org
Tue Mar 8 02:19:31 EST 2005
http://www.eastvalleytribune.com/index.php?sty=37537
EMILY BEHRENDT
March 7, 2005
The Tempe-based University of Advancing Technology will be
"wardriving" around Valley neighborhoods this year. Although it
sounds hostile, it's actually for the benefit of Valley residents.
Wardriving is a term for finding unsecured wireless access points,
which are locations where an outsider could hack into a home computer
system because the wireless signal extends beyond the walls of the
house. Any laptop that comes in range of the signal would be able to
connect to the home computers and potentially create all kinds of
mischief, including identify theft or other Internet crimes.
Most people who have wireless computer networks inside their homes are
not even aware they are at risk, said Raymond Todd Blackwood, IT
manager for the university.
The school's students have begun working on a research project to find
home computers that are vulnerable and try to increase awareness of
the problem in the community.
"What we are not doing is, we are not connecting at all," Blackwood
said. "All we are doing is looking for those signals being broadcast."
For the project, the Valley has been split into four grids, with
Central Avenue and Camelback Road dividing the quadrants. The students
are responsible for covering their assigned area within four weeks,
and their data are collected monthly. Their findings are then put into
a database, and the unsecured access points are plotted on a map.
When the students wardrive, they use an IBM laptop running the Linux
operating system, a program called Kismet and a global positioning
system locator. The locator is a hand-held device that plugs into the
laptop through a serial port and logs the specific coordinates.
The students drive around neighborhoods, apartment complexes and
business areas, and the Kismet program will tell them when a wireless
frequency is present.
"This would kind of be equivalent to a person walking around and
checking to make sure people's front doors are locked," Blackwood
said.
During the first two weeks of the project, students discovered 16,000
unsecured access points, and they had only covered one third of the
Valley.
The students will collect the data every month for one year. Once all
the data are collected and logged, the school will determine the
highest concentrations of unsecured wireless access points.
They will then launch a campaign in those neighborhoods to educate
people about the potential risks.
"We want to know how popular wireless is, and how much do people know
about it." Blackwood said, "We are trying to provide clear, easy to
understand information, and increase sophistication and awareness in
the community."
Securing a network is simple. Under the network settings, there is a
button to "enable wireless encryption protocol."
Simply clicking that button will encrypt the signal and secure the
network, Blackwood said. The default option leaves the network
unsecured.
More information about the ISN
mailing list