Smart City Managed WIFI – Smart City Kiosks
Edited: June 15, 2018
This is a nice write up from Network World. Smart City Kiosks can be trusted places to conduct business if the proper systems are in place.
The type of attack in this article absolutely would work against non-enterprise type systems delivered to provide free public wifi.
Technologies exist which would reduce this type of attack surface greatly meaning you can trust your city wifi more. Using a VPN while on the WIFI system is always smart and you can find many on the web.
Instead of just trying to instill fear like I see so many security professionals try to do I will give you 2 means to connect easily in a safe manner when accessing public WIFI.
Solution 1 – VPN Technologies to use while surfing on WIFI systems:
Stay safe on free WiFi hotspots
When you use free WiFi at cafes and airports, you become a target for eavesdroppers, wiretappers, and other cyber criminals. Why? Because these wireless networks are especially easy to break into. With up to AES-256 encryption, hide.me encrypts all of your internet activity and buries it below several layers of security—making your personal information untouchable.
Download and upload… privately
Music, videos, pictures… it’s important to keep what you download and upload private. It’s especially important for businesses who regularly exchange sensitive documents. hide.me makes sure these things don’t fall into the wrong hands – at home, or on the go.
Solution 2 – Tor Browser with VPN Client:
Using VPN and Tor Together: https://www.bestvpn.com/blog/42672/using-vpn-tor-together
Although in many ways very different, both VPN and the Tor anonymity network use encrypted proxy connections in order to hide users’ identities (VPN is useful for much more than this, but privacy is a core feature of the technology).
This article like many others is using FUD Fear, Uncertainty, and Doubt without providing clear and easy solutions to the problem they are discussing. Finding and developing the solution in the security world is the real solution to most of our problems. The pointing and stating problem is absolutely the easy part.
In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.
On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn’t seen before. What made it unusual was that it was in an area with no buildings.
It turned out that the hotspot he saw, advertised as “FREE_TLV,” was part of the citywide free Wi-Fi network set up by the local administration of Tel Aviv, Israel. This made Neiderman wonder: How secure is it?
For the next few weeks, finding a way to compromise this network became a side project to do in his free time. First, he connected to the network through one of the access points spread around the city and checked what his new IP (Internet Protocol) address was. This is usually the public address assigned to the router through which all Wi-Fi clients access the internet.
He then disconnected and scanned that IP address from the internet for open ports. He found that the device was serving a web-based login interface over port 443 (HTTPS).
This interface displayed the manufacturer’s name — Peplink — but not other information about the device type or model. An analysis of the web interface didn’t reveal any basic vulnerabilities either, such as SQL injection, default or weak log-in credentials or authentication bypass flaws.
He realized that a more thorough analysis of the device’s actual firmware was required. Identifying the device and finding the exact firmware to download from the manufacturer’s website was not easy, because Peplink creates and sells many types of networking devices for various industries. However, he eventually pinned it down to firmware version 5 for Peplink’s Balance 380 high-end load balancing router.
The firmware used basic XOR-based encryption to make it harder for third-parties to reverse-engineer the firmware’s file system, but this was relatively easy to bypass. Once everything was unpacked and loaded into an emulator, Neiderman was able to access the CGI (Common Gateway Interface) scripts that made up the router’s web interface.
It didn’t take long until the researcher found a buffer overflow vulnerability in the CGI script that handled the log-out process. The flaw could be exploited by sending a very long session cookie to the script and successful exploitation resulted in arbitrary code execution and full control over the device.
Neiderman presented his findings and reverse-engineering efforts Thursday at the DefCamp security conference in Bucharest, Romania. He declined to say whether he actually tested his exploit on the live Peplink Balance routers used to operate Tel Aviv’s free Wi-Fi network because that could land him in legal trouble.
However, when he reported the flaw to Peplink the company confirmed and patched it in a subsequent firmware update, so the firmware on FREE_TLV’s routers was certainly vulnerable when Neiderman found the flaw.
While finding vulnerabilities in routers is not uncommon, this case stands out because it shows that skilled hackers could potentially attack thousands or tens of thousands of users by compromising large public Wi-Fi networks like those run by municipalities.
By controlling a router, attackers can snoop on all unencrypted user traffic that passes through it and captures sensitive information. They can also launch active attacks, like redirecting users to rogue web servers when they’re trying to access legitimate websites or injecting malicious code into non-HTTPS web pages.
Large networks are typically standardized and use the same type of equipment throughout to allow for easier management. A vulnerability that allows a compromise of one of the network’s access points is likely to allow the compromise of all of them.
Attacks like these are why users are strongly encouraged to use a VPN (Virtual Private Network) service when they’re accessing the internet over public or untrusted Wi-Fi networks.
Neiderman said that he was impressed with how Peplink responded to his report and how the company handled the vulnerability. He stressed that this attack was also possible because of the insecure way in which the network’s routers had been deployed. Their administration interfaces shouldn’t have been exposed to the Internet.
For more information about this topic please email visit primary blog: http://smartlink.city/blog/2016/11/11/smart-city-wifi-smart-city-kiosks/
Smart link a sister company of Nexigen is the leader in smart city technology.