Hackers Create WiFi Content Spoofing Device

  Wireless traffic spoofing device costs under 50 euros
A pair of creative hackers have built a device capable of connecting to wireless networks and altering the Web content users access, as part of a project to demonstrate how news can be manipulated.
2 photosVIEW ALL 

A pair of creative hackers have built a device capable of connecting to wireless networks and altering the Web content users access, as part of a project to demonstrate how news can be manipulated.

The device mimics a pass-through power socket, making it hard to observe, and has already been tested in cafe shops in Berlin, where its creators Julian Oliver and Danja Vasiliev are based.

Inside the 12 cm long casing there's a small circuit board with an Atheros chipset and an antenna. It's running a customized Linux distribution designed for embedded systems.

When powered on, the device automatically searches for wireless networks and connects using passwords supplied in advance.

A reverse SSH tunnel is established with a remote server, allowing attackers to control the device from a distance.

The tunnel uses 2048-bit encryption and is routed over Tor nodes, making it virtually impossible to determine where the attackers are located.

The device launches ARP (Address Resolution Protocol) spoofing attacks in order to position itself as a gateway between the other wireless clients and the real router.

This allows attackers to manipulate content passing through it. The research project, dubbed "Newstweek," demonstrates this by altering news headlines from popular websites.

The two hackers told IDG that they plan to release a complete manual which will teach people to create their own devices for under 50 euros.

But even without the detailed instructions and following the general concept, hackers in the Netherlands and Brazil have already started building their own variants.

Combined with other techniques, especially on open wireless networks, the device can also be used to hijack users' sessions, read emails and perform other attacks.

The experiment is a reminder of why the Web needs better SSL adoption. Another way to make sure that requests are not intercepted and spoofed when connecting over a wireless network is to use a secure VPN.

Photo Gallery (2 Images)

Gallery Image
01
Gallery Image
02

Comments