Jump to content

How to counter karma


oliverm
 Share

Recommended Posts

Is there a way to tighten to up wireless networks to prevent the kind of karma intrusion that our WP4 demonstrates so well?

Now we know it can be done, is there anything that can realistically be done to help prevent it happening in the future?

Olly

Link to comment
Share on other sites

I remeber Darren saying something about Cisco access points being able to detect their probes being faked and deauth the clients from the pineapple, never got arround to looking into it. Probably has to do with the Aironet series only and not the soho routers, also it would only help in some sitiatuions.

Link to comment
Share on other sites

I remeber Darren saying something about Cisco access points being able to detect their probes being faked and deauth the clients from the pineapple, never got arround to looking into it. Probably has to do with the Aironet series only and not the soho routers, also it would only help in some sitiatuions.

Most new enterprise grade wireless equipment does have a "rogue access point deauth" feature, but this requires using one of the MIMO antennas, which means less bandwidth. This means that most of these access points will not be configured to utilize these features unless the company is specifically having problems with it happening. I've only used it once in an arena setup to combat MyFi devices stomping on our channels when the media would bring them in.

Another thing to consider is that the target rich environments will not be using this level of equipment. Small coffee shops, bars and other SMBs will be using consumer grade routers purchased at Office Depot. Also, you have to be at the location running deauth. Usually the encryption on enterprise gear is done on a proxy server or the back end, not the actual access point, leading to another open SSID for Karma to use...

Like already said, the only way to fully protect in public is to clean up all the saved open networks. Maybe someone should write an app for that. Another thing to consider is to use a VPN or other encryption service alongside a known good DNS server. That way if you do connect to a rogue AP, there's no way to redirect to phishing pages and packet capture is useless.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...