Black Hat/DefCon: Welcome to the funhouse

Security conferences gearing up to poke holes in today's network technologies, here's a sneak peek...

The Black Hat conference and its post-event, DefCon, promise to be a security funhouse in the coming week, as experts in Las Vegas seek to shock and amaze by poking holes in today's network technologies. The Web, wireless LANs, routers and desktop software may all look different reflected in the Black Hat/DefCon hall of mirrors, where security vendors will be revealing their hacker sides.

"We're showing malware we created called Jinx," says Itzik Kotler, manager of the security operations center at Radware and a presenter at Black Hat, which runs through Aug. 7. Kotler describes Jinx as attack code that can be used to take over the machines of victims using versions of Mozilla's Firefox browser that pre-date Firefox 3, Mozilla's latest release. (You might want to upgrade now if you haven't already.)

Javascript-based Jinx can index a victim's hard drive and send back files from Macintosh, Windows or Linux-based machines to the attacker, or turn the computer into a spam machine, he says.

"It's the first proof-of-concept of such malware, with no code injection, no interfering with the kernel," says Kotler, adding the Jinx exploit code will be published for all to see. He hinted Radware is working on similar Jinx-like malware aimed at Microsoft Internet Explorer.

Why all the effort? "We believe people need to be prepared for this. There's a popular demand for Web 2.0, but it's a bad situation in that we've given huge power to browsers, but these browsers often have logic flaws that allow these attacks," Kotler says.

For vendor AirTight Networks, which makes wireless LAN (WLAN) intrusion-prevention systems, its focus is how some wireless LAN vendors may not be implementing the IEEE's new 802.11w security standard correctly.

The 802.11w standard (Cisco calls it "management frame protection") is supposed to make WLANs resistant to denial-of-service (DoS) attacks. But AirTight will show how it's possible with some implementations of 802.11w in vendor equipment to conjure up an attack that hits WLAN access points with malformed packets, not bringing them down but triggering a disconnection response in their WLAN clients.

"This attack involves a special packet which has the effect of disconnecting the endpoint," says Pravin Bhagwat, chief technology officer at AirTight, which dubs this the "autoimmunity disorder in WLANs."

The WLAN DoS attack, which involves tampering with the MAC address at Layer 7 by sending a continuous stream of injected packets at intervals of about 30 seconds, basically results in the WLAN access point being exploited as the vector for disabling WLAN endpoints.

Some of the WLAN equipment that will be shown to be vulnerable to this attack includes that of D-Link, Cisco, Buffalo and open source Madwifi. Either these vendors aren't implementing 802.11w correctly or the standard will need to be improved to prevent the "autoimmune disorder" in WLANs, according to AirTight.

All about the rootkit

Cisco gear will also get pounded in another session with Core Security Technologies, which is expected to show how it's possible to install a rootkit on the Cisco IOS. A rootkit is code designed to hide from detection so someone can control processes without being noticed.

"This does assume you have access to the Cisco device because you are the administrator or somehow broke in," says Ivan Arce, chief technology officer at Core Security.

The Cisco IOS rootkit would give an attacker the ability to do things such as change how traffic passes through a Cisco device. "People don't understand it's possible to have a rootkit on IOS," says Arce, adding that Cisco is aware of the research and earlier this year issued an advisory on it.

Rootkits will be a hot topic at Black Hat as some of the world's foremost researchers on the subject reveal new discoveries they've made about subverting software.

Researcher Joanna Rutkowska, whose devastating insights into Microsoft software and rootkits impressed Black Hat audiences in the past, is expected to take on the Xen hypervisor, this time with help from colleagues.

But it doesn't stop there.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Ellen Messmer

Network World
Show Comments

Father’s Day Gift Guide

Brand Post

Bitdefender 2019

Bitdefender’s best-in-class security solutions have been awarded Product of the Year. Get cybersecurity that 500 MILLION users already have and trust!

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?