[TOOL] KARMA Wireless Clients Utilities

From: SecuriTeam (support_at_securiteam.com)
Date: 06/12/05

  • Next message: SecuriTeam: "[NEWS] Internet Explorer and Opera JavaScript Ghost Vulnerability"
    To: list@securiteam.com
    Date: 12 Jun 2005 12:54:56 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      KARMA Wireless Clients Utilities
    ------------------------------------------------------------------------

    SUMMARY

    DETAILS

    KARMA is a set of tools for assessing the security of wireless clients at
    multiple layers. Wireless sniffing tools discover clients and their
    preferred/trusted networks by passively listening for 802.11 Probe Request
    frames.

    Using the information gathered passively, individual clients can be
    targeted by creating a Rogue AP for one of their probed networks (which
    they may join automatically) or using a custom driver that responds to
    probes and association requests for any SSID. Higher-level fake services
    can then capture credentials or exploit client-side vulnerabilities on the
    host.

    KARMA includes patches for the Linux MADWifi driver to allow the creation
    of an 802.11 Access Point that responds to any probed SSID. Making a
    client that looks for the SSID 'linksys', see the Linux machine as a
    'linksys' device, while making it appear as 'tmobile' to someone else.

    Currently, these releases are BYOX (Bring Your Own Exploits), although a
    number of client-side exploits have been written, tested and demonstrated
    within this framework. Some may be included in a future release. Automated
    agent deployment is also planned.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:sigtrap@sigtrap.org>
    Sigtrap.
    To keep updated with the tool visit the project's homepage at:
    <http://theta44.org/> http://theta44.org/

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NEWS] Internet Explorer and Opera JavaScript Ghost Vulnerability"