Gray Hat Hacking 114
Gray Hat Hacking 114
86
off but still wants to use the U3 features. Alternatively, you can place on the USB device
a document file with an appealing name that contains an exploit, in an attempt to en-
tice the target to open it. As with most gray hat attacks, this one is limited only by your
imagination.
The Meeting
The goal of this attack is to place an unauthorized wireless access point (WAP) on the
corporate network.
This attack requires face-to-face contact with the target. A pretext for a meeting is
required, such as a desire to purchase goods or services on a level that requires a face-
to-face meeting. Set the meeting time for just after lunch and arrive about 30 to 45
minutes before your meeting, with the goal of catching your victim away at lunch. Ex-
plain to the receptionist that you have a meeting scheduled after lunch but were in the
area on other business and decided to come early. Ask whether it is okay to wait for the
person to return from lunch. Have an accomplice phone you shortly after you enter the
building, act slightly flustered after you answer your phone, and ask the receptionist if
there is some place you can take your call privately. Most likely you’ll be offered a con-
ference room. Once inside the conference room, close the door, find a wall jack, and
install your wireless access point. Have some Velcro or double-sided sticky tape handy
to secure it out of view (behind a piece of furniture, for instance) and a good length of
cable to wire it into the network. If you have time, you may also want to clone the MAC
address of a computer in the room and then wire that computer into your access point
in the event they’re using port-level access control. This ruse should provide enough
time to set up the access point. Be prepared to stay in the room until you receive con-
firmation from your team that the access point is working and they have access to the
network. Once you receive notification that they have access, inform the receptionist
that an emergency has arisen and that you’ll call to reschedule your appointment.
The beauty of this attack is that it is often successful and usually only exposes one
team member to a single target employee, a receptionist in most cases. It’s low tech and
inexpensive as well.
In our example, we’re going to use a Linksys Wireless Access Point and configure it
for MAC cloning. For this example, you’ll need
Have the WAP ready with double-sided tape already stuck to the desired mounting
surface. You’ll want to be prepared for unexpected configuration problems such as a
long distance between the network wall jack or power outlet and a suitable hiding
place. A few simple tools such as a screwdriver, utility knife, and duct tape will help you
deal with unexpected challenges. It’s also wise to have any adapters you may need. De-
pending on which area of the country you’re working in, some older buildings may not
have grounded outlets, in which case you’ll need an adaptor. In addition to physical