SlideShare a Scribd company logo
Nearly everyone has an RF signature,
and it is becoming as common as your
fingerprint. This signature is the culmination of
device and device usage such as:
•	 Your cell phone’s frequency
•	 Names of the networks you connect to with your
	devices
•	 Bluetooth devices and the connections to and
	 from them
•	 Your device or devices (e.g., laptop, phone, key
	 fob, garage door opener, home security system)
Have you ever attached to the free WiFi at your local
coffee shop or bagel store? If so, an attacker can use
your RF signature to track you and attack you when
you sit down in these seemingly benign locations.
Here is how it is done. By default, most devices
will automatically connect to a network that it has
previously attached to if the device is within range
of the signal. This is done for your convenience, and
an attacker knows this. In this scenario, your device
will establish a connection with the free WiFi access
point (AP). An attacker can visit that same coffee
shop and set up a rouge AP with an identical name
as the free WiFi AP, but with a stronger signal. You
come in for your cup of Joe and your device will
connect to the rouge AP instead of connecting to
the coffee shop. The attacker then has full control
of your Internet connection and can in many cases
monitor and alter all of your Internet traffic. This is
an example of a Man-in-the-Middle (MITM) attack.
The way a laptop or wireless device determines
that a previously connected to network is within
range is through a probe request. A probe
request is similar to the pool game called
Marco Polo. A device’s radio is constantly
calling out Marco, which is being
used in this analogy to represent
a previous connection. When
something with that name
is within range of the
probing device, it
Stalking Prey:
An RF Hacker’s
Perspective
by: Rick Mellendick,
Chief Security Officer
Signals Defense
51United States Cybersecurity Magazine
responds back with Polo, which is being used to
represent a wireless AP.
The cost of the equipment to create an MITM
attack used to be expensive. However, now with
advances in technology, an MITM attack is extremely
inexpensive to create. The computing power needed
for these attacks can be done utilizing an embedded
system (e.g., raspberry pi or beaglebone) for around
$45. The cost for a wireless radio begins at $10 and
goes up from there. In fact the most effective WiFi
radio in use for an MITM attack sells for just under
$15 and is sold in most common electronics stores.
For other RF signals of interest (e.g., cell phones,
key fobs, pagers) software defined radio (SDR) is
needed. The capability found in today’s SDR used
to cost upwards of $50K. An SDR that can be used
to intercept the signal from your cell phone can
be purchased for under $20. Most software used
in MITM attacks is free and open source. For less
than $100 an attacker can steal your data and take
control of your communications.
By knowing and understanding the tactics employed
by an attacker, it is easier to digitally defend yourself.
The six steps listed below will help you protect your
own personal RF signature.
Step 1: Turn off auto join networks. This is a setting
that is on most all smartphone operating systems
and computer operating systems.
Step 2: Change the way you do your work when
you are in a public place. Use your smart phone’s
wired tethering capability to give your computer an
Internet connection.
Join Network?
Join
Network?
By knowing and
understanding the tactics
employed by an attacker,
it is easier to digitally
defend yourself.
52 United States Cybersecurity Magazine
Step 3: If you must connect to free public
WiFi find one that offers an encrypted
connection. An encrypted connection will
make the attack more difficult.
Step 4: Turn off Bluetooth when not in use.
Step 5: Turn off your device’s WiFi connection
when not in use. This eliminates unnecessary probe
requests.
Step 6: Look at people in the coffee shop before
connecting to public WiFi. Is anyone sitting near a
wall outlet with things plugged into their computer
that doesn’t quite look right, such as small devices
with blinking lights, lots of cables, or antennas
connected to their computer? If so, you might want
to think twice about connecting to the public WiFi.
Don’t be the easy target or the low hanging fruit.
This will go a long way to securing you as your digital
fingerprint stays with you through life. ■
Rick Mellendick is the Chief Security Officer for Signals
Defense in Owings Mills, MD and has been a security
architect for multiple U.S. Government agencies and
private corporations. Mr. Mellendick specializes in
designing and testing wireless networks with non-
traditional strategies using offensive techniques. His
specialty is legally breaking and entering networks
through RF. He has over 17 years of IT and network
security experience, and he is a builder and breaker of
RF devices and connections. Mr. Mellendick is the creator
of The Wireless Capture the Flag (http://wctf.us).
Wi Fi
FREE
53United States Cybersecurity Magazine

More Related Content

Similar to Cyber Security: Stalking Prey: An RF Hackers Perspective

Wireless security
Wireless securityWireless security
Wireless security
Nguyen Minh Thu
 
Smartphone
SmartphoneSmartphone
Smartphone
Naval OPSEC
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
ShivamSharma909
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
infosec train
 
Public wifi
Public wifiPublic wifi
Public wifi
Samuel K. Itotia
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
hyacinthshackley2629
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Signals Defense, LLC
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
Andrew
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
Ce hv8 module 15 hacking wireless networks
Ce hv8 module 15 hacking wireless networksCe hv8 module 15 hacking wireless networks
Ce hv8 module 15 hacking wireless networksMehrdad Jingoism
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
Shravani Patil
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
RapidSSLOnline.com
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 

Similar to Cyber Security: Stalking Prey: An RF Hackers Perspective (20)

Wireless security
Wireless securityWireless security
Wireless security
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Public wifi
Public wifiPublic wifi
Public wifi
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Ce hv8 module 15 hacking wireless networks
Ce hv8 module 15 hacking wireless networksCe hv8 module 15 hacking wireless networks
Ce hv8 module 15 hacking wireless networks
 
Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
Wns rogues wp_1011_v3
Wns rogues wp_1011_v3Wns rogues wp_1011_v3
Wns rogues wp_1011_v3
 
Wireless security
Wireless securityWireless security
Wireless security
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 

More from Signals Defense, LLC

Technology White Paper: Creating RF Predictable Environments for In-Buildin...
Technology White Paper:   Creating RF Predictable Environments for In-Buildin...Technology White Paper:   Creating RF Predictable Environments for In-Buildin...
Technology White Paper: Creating RF Predictable Environments for In-Buildin...
Signals Defense, LLC
 
Signals Defense Capability Statement rev2016
Signals Defense Capability Statement  rev2016Signals Defense Capability Statement  rev2016
Signals Defense Capability Statement rev2016Signals Defense, LLC
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
Signals Defense, LLC
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Signals Defense, LLC
 
Holistic approach to cybersecurity being engineered by maryland companies 8-13
Holistic approach to cybersecurity  being engineered by maryland companies 8-13Holistic approach to cybersecurity  being engineered by maryland companies 8-13
Holistic approach to cybersecurity being engineered by maryland companies 8-13Signals Defense, LLC
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
Signals Defense, LLC
 

More from Signals Defense, LLC (6)

Technology White Paper: Creating RF Predictable Environments for In-Buildin...
Technology White Paper:   Creating RF Predictable Environments for In-Buildin...Technology White Paper:   Creating RF Predictable Environments for In-Buildin...
Technology White Paper: Creating RF Predictable Environments for In-Buildin...
 
Signals Defense Capability Statement rev2016
Signals Defense Capability Statement  rev2016Signals Defense Capability Statement  rev2016
Signals Defense Capability Statement rev2016
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
 
Holistic approach to cybersecurity being engineered by maryland companies 8-13
Holistic approach to cybersecurity  being engineered by maryland companies 8-13Holistic approach to cybersecurity  being engineered by maryland companies 8-13
Holistic approach to cybersecurity being engineered by maryland companies 8-13
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Cyber Security: Stalking Prey: An RF Hackers Perspective

  • 1. Nearly everyone has an RF signature, and it is becoming as common as your fingerprint. This signature is the culmination of device and device usage such as: • Your cell phone’s frequency • Names of the networks you connect to with your devices • Bluetooth devices and the connections to and from them • Your device or devices (e.g., laptop, phone, key fob, garage door opener, home security system) Have you ever attached to the free WiFi at your local coffee shop or bagel store? If so, an attacker can use your RF signature to track you and attack you when you sit down in these seemingly benign locations. Here is how it is done. By default, most devices will automatically connect to a network that it has previously attached to if the device is within range of the signal. This is done for your convenience, and an attacker knows this. In this scenario, your device will establish a connection with the free WiFi access point (AP). An attacker can visit that same coffee shop and set up a rouge AP with an identical name as the free WiFi AP, but with a stronger signal. You come in for your cup of Joe and your device will connect to the rouge AP instead of connecting to the coffee shop. The attacker then has full control of your Internet connection and can in many cases monitor and alter all of your Internet traffic. This is an example of a Man-in-the-Middle (MITM) attack. The way a laptop or wireless device determines that a previously connected to network is within range is through a probe request. A probe request is similar to the pool game called Marco Polo. A device’s radio is constantly calling out Marco, which is being used in this analogy to represent a previous connection. When something with that name is within range of the probing device, it Stalking Prey: An RF Hacker’s Perspective by: Rick Mellendick, Chief Security Officer Signals Defense 51United States Cybersecurity Magazine
  • 2. responds back with Polo, which is being used to represent a wireless AP. The cost of the equipment to create an MITM attack used to be expensive. However, now with advances in technology, an MITM attack is extremely inexpensive to create. The computing power needed for these attacks can be done utilizing an embedded system (e.g., raspberry pi or beaglebone) for around $45. The cost for a wireless radio begins at $10 and goes up from there. In fact the most effective WiFi radio in use for an MITM attack sells for just under $15 and is sold in most common electronics stores. For other RF signals of interest (e.g., cell phones, key fobs, pagers) software defined radio (SDR) is needed. The capability found in today’s SDR used to cost upwards of $50K. An SDR that can be used to intercept the signal from your cell phone can be purchased for under $20. Most software used in MITM attacks is free and open source. For less than $100 an attacker can steal your data and take control of your communications. By knowing and understanding the tactics employed by an attacker, it is easier to digitally defend yourself. The six steps listed below will help you protect your own personal RF signature. Step 1: Turn off auto join networks. This is a setting that is on most all smartphone operating systems and computer operating systems. Step 2: Change the way you do your work when you are in a public place. Use your smart phone’s wired tethering capability to give your computer an Internet connection. Join Network? Join Network? By knowing and understanding the tactics employed by an attacker, it is easier to digitally defend yourself. 52 United States Cybersecurity Magazine
  • 3. Step 3: If you must connect to free public WiFi find one that offers an encrypted connection. An encrypted connection will make the attack more difficult. Step 4: Turn off Bluetooth when not in use. Step 5: Turn off your device’s WiFi connection when not in use. This eliminates unnecessary probe requests. Step 6: Look at people in the coffee shop before connecting to public WiFi. Is anyone sitting near a wall outlet with things plugged into their computer that doesn’t quite look right, such as small devices with blinking lights, lots of cables, or antennas connected to their computer? If so, you might want to think twice about connecting to the public WiFi. Don’t be the easy target or the low hanging fruit. This will go a long way to securing you as your digital fingerprint stays with you through life. ■ Rick Mellendick is the Chief Security Officer for Signals Defense in Owings Mills, MD and has been a security architect for multiple U.S. Government agencies and private corporations. Mr. Mellendick specializes in designing and testing wireless networks with non- traditional strategies using offensive techniques. His specialty is legally breaking and entering networks through RF. He has over 17 years of IT and network security experience, and he is a builder and breaker of RF devices and connections. Mr. Mellendick is the creator of The Wireless Capture the Flag (http://wctf.us). Wi Fi FREE 53United States Cybersecurity Magazine