Data Leaks: A Frappuccino and Your Customer's Bank Accounts To Go - ITS Tactical

Data Leaks: A Frappuccino and Your Customer’s Bank Accounts To Go

By Jason Robert

2 of 4 in the series Data Leaks

Last week we kicked off a four-part series on Data Leaks with a lead article about vehicular data leaks. In today’s article, we’ll be diving into the realm of free WiFi.

This series is designed to look at how ordinary things we take for granted encroach on our perception of privacy. This series isn’t about ridiculously risky, yet highly popular, opt-in social networks–like blippy, a web site that divulges recent shopping details via sharing credit-card bills among friends.

If any member of this site participates in, stay put–the black rendition van is on its way to your location at this very moment to knock some sense into you.

Instead, the Data Leaks series focuses on unexpected data leaks; ways you might be leaking the personally identifiable information that data thieves profit from. This week’s article leaves the car in the garage and focuses on the coffee joint around the corner where you login to pay your bills each month.

Free WiFi

Free WiFi Hotspots are all the rage these days. Access to free WiFi isn’t yet ubiquitous, but it is visibly on the horizon. From McDonald’s to Starbucks, airports and barbershops, companies have realized that giving their waiting customers something to do for free provides a better customer experience. Odds are if you’re reading this article, you’ve likely plopped open your laptop at some point in time and connected to a WiFi access point at one of these places.

It is imperative to understand that the focus here is on WiFi and that the data leaks discussed here affect all of the widely popular 802.11 variants: a, b, g, and n. In no way are these leaks the responsibility of the aforementioned illustrative vendors who are innocently working to create a better customer experience. The fault lies directly with the technology vendors who still can’t seem to wrap their arms around the fact that security matters. (I’ll avoid getting on a soapbox here and leave it at that…)

During the National Defense Industrial Association (NDIA) conference held last week at Naval Surface Warfare Center-Crane, VADM McRaven issued a challenge to the industry: give me WiFi solutions that meet or exceed CNSS Policy No. 15 Fact Sheet No. 1. There is a reason why military commanders aren’t walking around with iPads on their base sharing classified systems: All present WiFi security schemes are effectively broken to some degree and susceptible to attack.

Access Point Security

Every WiFi access point (AP) is effectively limited to a few choices for creating a secure connection between the AP and the client, e.g. a laptop. Most customer-driven commercial entities like McDonald’s are installing APs that are expressly open with no security. Home users will either leave their access point open, or use WEP, WPA, or the WPA2-Personal variant. Enterprise installations are typically going to implement the WPA2-Enterprise variant. An additional form of protection is filtering client connections based on the “unique” serial number assigned by the network card manufacturer, known as the media access control (MAC) address.

On the surface there appears to be a plethora of security choices, yet with a minimal amount of research it becomes clear why the military doesn’t to date trust any 802.11 variant for transmission of classified material. To better understand why, let’s look at each of the security variants and why they are at best an inconvenience to a determined hacker looking for personally identifiable information. Before we do that though, a few facts and terms must be considered and introduced.

Consider this fact: the frequency bands used by WiFi APs all travel through walls to some degree. Also, an overwhelming majority of WiFi solutions rely on omnidirectional antennas. These are antennas that transmit their signal equally in a 360-degree fashion. These are important facts to consider because even if the Starbucks is completely void of customers when you show up and log in, a hacker could easily sit in the parking lot at the back of the building and eavesdrop on the radio waves being transmitted between your laptop and the AP. Yes, you should be scared if you see someone in a car pointing a Pringles can at Starbucks with a laptop in the passenger seat. In security parlance, this hacker is known as a man in the middle (MITM).

Open APs like those at Starbucks and airports should be self-explanatory- there is no security! Yet, every time I visit the airport I’m shocked at the number of people checking their bank accounts, looking at their insurance company explanation of benefits, etc. There is a terrible misconception here that the sites are using SSL, so no one else can see the transactions taking place. This is simply wrong- SSL over an open WiFi is completely unsecured!

How SSL Works and Doesn’t

The reason is a direct result of the way all SSL works :

  1. Browser checks the certificate, attempting to match the site with the details embedded within the certificate.
  2. Browser and the web site server negotiate a level and type of encryption that they both understand.
  3. Browser and web site server then send each other a set of unique numbers they each use in a mathematically formula to algorithmically extract an encryption key that they will both use.
  4. Browser and web site server start exchanging symmetrically encrypted data using the key that both algorithmically extracted.

Remember that MITM sitting out in the parking lot? Tools like dsniff give hackers enough power to drill through even SSL. Short of implementing a full VPN solution, not even Gmail over SSL is considered safe, though it is more susceptible to SlideJacking than MITM. For those looking for a more thorough description of SSL MITM attacks, head over to and check out their article on MITM attacks.

The most important lesson here is the following realization: all data transmitted between a client and an open AP is unencrypted, rendering that lock in the browser ineffective.

AP Security Options

Wired Equivalent Privacy (WEP) is another WiFi AP security option. In the spirit of time, WEP is a dead security protocol. I’ve heard security personnel bluntly say that an open AP is more secure than a WEP protected AP. Their rationale is simple–if you believe you are on an unsecured connection, you’ll be more security conscious. WEP merely creates a false sense of security. WiFi Protected Access (WPA) was intended to replace WEP. Suffice to say, WPA is considered a dead security protocol by the security industry as well, highly susceptible to attack.

WiFi Protected Access 2 (WPA2) has replaced WPA. For our purposes, WPA2 defines Personal and Enterprise variants. The Personal variant relies on a pre-shared key. WPA2-Personal is also known by the moniker WPA-PSK, for pre-shared key. When Bob comes over to visit Alice at her home, Bob asks if he can get on the Internet. Alice informs Bob that the password is secr3tf1sh!, thus sharing the key with Bob. Hacker tools like Aircrack-ng can usually break most passwords in seconds, or worst-case, minutes. The more complex the password is, the more packets that must be collected by the tool, the more time it will take–but the password will eventually be cracked. This is a brute force attack, but placed into perspective, the Aircrack-ng suite fully works on the network card of a Nokia N900 phone. The lessons here include the fact that pre-shared key encryption is only as strong as the key, and even today’s smart phones have enough CPU power to crack the passwords in an acceptable amount of time.

The astute reader may be asking, “but what if the hacker shows up after I already logged into the AP with the PSK?” Well, the IEEE solved that problem for the hacker. Per the various applicable 802.11 specifications, a client must oblige and disconnect whenever it receives a de-authorization packet from the AP. The following command from a BackTrack Linux distro demonstrates how easy it is for a hacker to send this command using aireplay-ng, a tool used to inject frames:

aireplay-ng —deauth 5 —a $AP —c $CL ath0

The $AP is the MAC address of the AP, and the $CL is the MAC address of the client. Since the client only knows it received a packet over the air and cannot verify that the packet didn’t come from the closet near the bathroom, instead coming from the hacker in the parking lot–the client nods and de-authenticates with the AP. Since the operating system has cached the PSK, the next packet that needs to be sent triggers an automatic re-authentication with the AP, without bothering the user, and, voila!, the hacker captured the authentication exchange even though he showed up late to the party.

WPA2-Enterprise for all intents and purposes relies on certified security protocol plugins, allowing WPA2-Enterprise to evolve over time without changing the overall mechanics. Over a half-dozen certified security protocol plugins exist, and each have their own weakness. Similar to WPA2-PSK, tools exist to attack the various protocol plugins. Unfortunately for WPA2-Enterprise, the MITM can capture the unencrypted packets between the AP and the client that discloses which plugin is going to be used. Once that information is known, it becomes an exercise in launching the right software to attack the plugin that is in use. The asleap tool is but one example of such software.

Open Is Unsafe

WEP and WPA are dead. WPA-PSK is about as safe as unprotected sex with random people. WPA-Enterprise, the most advanced, complex, and expensive of all the WiFi security solutions, is susceptible to attack too. What about MAC filtering? Serial numbers are unique and controlled by the manufacturers, so using either MAC filtering alone or in combination with any of these other security protocols must be safe, right?

Wrong. Using Linux as an example, since it is the most dominate platform for penetration testing and hackers alike, hackers have the ability to expressly override the MAC address on a network card in three easy steps:

  1. ifconfig ath0 down
  2. ifconfig ath0 hw ether 00:11:22:33:44:55
  3. ifconfig ath0 up

Step 1 turns off the WiFi network card. Step 2 assigns a new, arbitrary hardware Ethernet address to the WiFi network card. Step 3 turns the network card back on, and it now uses the arbitrary MAC address specified by the hacker. In fact, this is a requisite step taken by a hacker; this is how the hacker can generate arbitrary TCP/IP packets that appear to originate from the AP when in reality he is typing them up on the fly in the parking lot.

So What Should I Do?

Let’s bring it home. The most likely way you are leaking data when using WiFi comes from the fact that you’re using WiFi. Sounds hopeless, right? Well, for now the situation is indeed grim, and you are highly likely to be pwned very quickly, hacker parlance for being dominated by a god-like computer force. If WiFi isn’t secure enough for classified military data, it sure as hell isn’t secure enough for anyone to be conducting financial transactions. The real question is: is anyone out there listening in as a MITM? Until either a new WiFi security protocol emerges, or there is a way to detect MITM attacks, we have to assume that someone is listening.

For things like email, IM, and general web surfing like hitting the ITS site on a daily basis, every form of WiFi is more than adequate. For stopping your average neighbor from stealing your Internet connection for their porn addiction, WPA-PSK is more than adequate. For conducting financial transactions, all you can do is hope for the best if you can’t find a wired connection.

Additional Recommendations

At home if you have setup an AP, stop broadcasting your SSID. This creates a first level of security that will defeat nosy neighbors. Second, stop using WEP or WPA and implement at least WPA-PSK. If your AP is too old to support WPA-PSK, then throw it out and spend $75 to buy a new one that does–the $25 ones are $25 for a reason, typically offering WEP and WPA only. Good brands include Netgear and D-Link. Unless you have a zillion friends and dozens of net-enabled home devices, turn on MAC filtering. Manufacturers make it relatively easy to find such information- even my recently upgraded net-enabled TV let me find the MAC address inside of 30 seconds of digging through the menu system. Finally, if at all possible, maintain a wired network at home for your sensitive web surfing.

What is described here is security in depth, the best you’re going to get with today’s WiFi standards, making it at least slightly more challenging for the hacker. First, they’d have to discover your SSID. Then, they’d have to successfully capture a fair number of packets from a registered MAC address to brute force the PSK. Finally, even if they got through these layers (again, relatively easily for the experienced hacker), they wouldn’t see bank transactions floating through the air if these were restricted to wired connections.

This week’s article only focused on the MITM WiFi attack vectors in the context of intercepting packets being transmitted over the air. I would be remiss if I didn’t point out that once the hacker breaches the security of the AP, they are in a position to begin an attack on the network and all of the attached clients. Tools like nmap can be run to map out the entire network segment and report on open ports, known vulnerabilities, etc. Anyone running un-patched client software is highly susceptible to exploitation, thus creating even more problems as the hacker decides to play evil tricks on you, like erase your entire set of un-backed up family photos just for grins.

If this week’s article scared the bejesus out of you, then you’ll want to stay tuned for next week’s topic. We’ll be talking about how your Droid cell phone is getting off right now calling 900 numbers, without your knowledge or permission, as a result of a rootkit you didn’t know you downloaded yesterday–making someone with a bank account in the Bahamas really rich.

Main image photo credit: BBC News

Are you getting more than 14¢ of value per day from ITS?

Thanks to the generosity of our supporting members, we’ve eliminated annoying ads and obtrusive content. We want your experience here at ITS to be beneficial and enjoyable.

At ITS, our goal is to provide different methods, ideas and knowledge that could one day save your life. If you’re interested in supporting our mission and joining our growing community of supporters, click below to learn more.


  • Seb.

    … and that is the reason why I study IT Security at school.

  • Pyro


    Why in the world would anyone ever want to share that kind of information?

    sadly there are those who will see it as the new “cool” thing to do. Not me.. I am reluctant to use facebook with all there “sharing” even then I try to set everything to the most restrictive settings possible.

    • Its not for people like you and me who grew up in a different generation. Kids today are being conditioned to social networking. The indoctrination is virtually complete.

  • Eric

    Excellent article. And the reason I pay for my 3G iPad service.

  • Jim Kane

    I’m scratching my head a little on this one, because it was my understanding that in SSL negotiation the browser checks that the server’s certificate is properly signed by a CA (Certificate Authority). If the signature doesn’t look legit, the browser loudly complains (see any site with a self-signed cert). Wouldn’t that be a pretty good signal that you’re being shimmed by somebody?

    • mike

      There must be an exchange before any encryption of the data can be done. If I watch the exchange, start to finish, I can decrypt your SSL encrypted traffic.

    • Jason Robert

      There’s a LOT going on in this space, more so than what can be covered in a comment, let alone a single article. Back in 2008, hackers learned — and demonstrated practically — that SSL certificates could be forged. See

      Instantly, MD5 certificates were worthless. Almost all MD5 certificates have since been revoked, and most Certificate Authorities (CAs) have moved to SHA-1 hashing. Problem is, SHA-1 isn’t much younger than MD5.

      For the icing on the cake, here is news from this year’s Black Hat conference:

      Read the article for the full scoop, but here’s the bottom line:

      “According to a report appearing Thursday on the Forbes blogs, security researchers Robert Hansen and Josh Sokol presented a list of 24 reasons, Wednesday, why users shouldn’t trust their browser’s padlock security indicator, the image typically associated with sites secured by SSL certificates.”

  • Most people keep a map of all the places they’ve traveled. I keep one of all the airport networks I’ve been able to compromise. Its a worldwide map!

    Basically I can scan the network and see how many devices are attached to an AP. Capture their MAC addresses and poison the ARP which makes all the devices think that I’m the AP. In about 45 seconds I can capture hundreds of data information. Your email login/password, MSN wallet information, any secure sight information your attached to like your account and tons of other useful information. Basically any login and password that you store on your device is vulnerable.

    This is all done without actually hacking into the AP. So this is all information that is free floating over the air under a license free spectrum (i.e. Free WiFi). This can also be done using bluetooth and other UWB frequencies.

    So morale of the story, if your not using it, don’t turn it on or leave it on. This includes your bluetooth and wifi connection on your iphone. These are easily compromised because the telnet login and password is the same for all iphones when they leave the factory.

    Fortunately I use my skills for good and not evil, but there are people out there that want your information and will pursue the path of least resistance to get it.

    Good article Jason, keep’em coming!

    • Jason Robert

      Thanks for the support. I think if the news actually ran an investigative report segment and spent just 10 minutes during the 6 O’Clock news cycle showing the public just how much data someone like you or I could gather in mere minutes at an airport, people would be more than astounded! Like you, I was trained to use my skills for good, and if I have time to sniff the air, I don’t keep the files around– they serve no purpose to me beyond a different style of people watching as the planes come and go.

  • Tom Swift

    I’m still surprised at the amount of people posting photos of illegal activities on their facebook and blogs. If I’m going out to a less than casual bar and getting drunk I don’t wanna get in any of your photos because they’ll be tagged tomorrow and I don’t want a potential employer to see what my Friday night out looks like.

    People are far to lazy with their PERSEC I’ll admit I don’t have the best online security setup but you can’t walk into my hour and find my open bills all over the place.

    I recently had a discussion with a IT type guy in the Industry and he told me about how he got into all his neighbours files just to prove how unsecure WIFI could be all from his front lawn.

  • Just to back this up. I learned to hack wifi after watching a few episodes of hak5. Its SOOOO easy. Its also a fun party trick to show up with your netbook and p0wn your friends wifi.

    You going to mention that most wordpress installs as well as Facebook are unencrypted, so anyone packet sniffing on your network can read your passwords in plain English (assuming they know where to look).


    Though I agree with the general idea of this article, don’t use public access points for anything important, and secure your WAP at home.

    MAC address filtering and disabling the SSID broadcast are pointless if you have WPA2-PSK on. Because those things only make it harder for your own devices to find, and join your own network. None broadcasting SSIDs can be found by any descent WAP scanning programing, and MAC spoofing is easy on a non-Windows OS. Compared to WPA2 which pretty much requires a week of brute force time on some pretty high end machines to break (if you pissed someone off at that level you’re either are a corporation, or you need to stop saying things that gets the NSA’s attention).

    Anyways IMO these “solutions” get repeated all over the internet. Never considering what practical level of security each setting gives you. I haven’t turned on MAC address filtering, or disabled the SSID broadcast since became widespread since even then those “security” settings were next to worthless.

    • Jason Robert

      You’re absolutely correct that WPA2-PSK requires a brute force attack.

      Are you familiar with CUDA? Commercial companies like Elcomsoft and open source projects like Pyrit are making significant headway in reducing the barrier of entry for brute force attacks. Here are two links, for those interested in reading more:

      The benchmark graph on the Pyrit page is a bite dated- but they documented 89,000 keys per second, while Elcomsoft (commercial) is more up-to-date, claiming “reducing the time required to recover Wi-Fi passwords up to a hundred times” while hitting 103,000 PMKs per second. That’s a little over 370 million password *per hour* on their benchmark platform.

      That’s some serious computing power!

      If your WiFi access point’s WPA2-PSK password is not complex and less than 12 characters in length, my money is on someone running Pyrit with a pair of nVidea GPUs to pwn you inside of a couple of hours, at most.

      The point here is simple- choose a REALLY complex password that is at least 12 characters in length. Here is the NSA fine grained password policy:

      FWIW, I’ve heard rumors from multiple people now that the minimum password length for privileged accounts (which IMHO would describe a WPA2-PSK) is going to be bumped up to 15 characters really soon.

    • PPGMD

      I am well aware of the optimization projects for brute forcing WPS2-PSK. I am simply saying that if some can break even WEP they can get around MAC filtering and see your WAP even if you aren’t broadcasting the SSID.

      IMO those measures are like removing the numbers off the side of your house. Compared to encryption which is like installing a lock on your exterior doors and windows.

  • Terry

    Excellent article! The only secure form of wireless communication is none at all.

  • gumbeau

    Check out the security now podcast on Steve Gibson talks about all this stuff he also has them transcribed so you can text search them. He also has a random password generator that generates a 63 character random password.

  • Shift

    Here is an interesting article I came across that mentions the security risk of not broadcasting your SSID.

  • JennieMortarotti

    Most people post pretty mundane stuff on fb and the boring pictures. My concern is when you do want to approve something it makes you agree they can access your personal information and other stuff. And that of all your FRIENDS. So even if you have security selections for friends and friends of friends,  they are accessing my information for 800+ and those 800 people are letting unknown sites, access my information. This to me is the biggest security problem on FB.

Do you have what you need to prevail?

Shop the ITS Store for exclusive merchandise, equipment and hard to find tactical gear.

Do you have what you need to prevail? Tap the button below to see what you’re missing.