Re: How to track down a wireless hacker

When you last went to the store and purchased a wireless card with cash did they take a photo ID?
When you picked up the box with the serial no. on the inside, did they record it against your name?

If it was changed - the real one is lost. It will not see the light of day

Some times you will find cards all with the same MACs. They should not do this, but I have receieved batches of cards with the same mac in the past. The manufacturer does not keep Mac addresses and there is no secret repository of them as a mapping to people.

Next the attacker could have been 5 miles away with a good high gain antenna. So it means that you can not even rely on proximity.

Anything you get is going to be from the compromised machines themself. You need to engage in a forensic analysis of the compromised hosts (if it is not too late). This is where the clues are.

If you really want to be able to match your myster attacker, association techniques (data mining) such as rpart may help match ations derived from a training set of data created from the forensic data you will collect on the compromised host to an individual if this person has done this elsewhere or has been caught before.

Craig Wright (GSE-Compliance)

From: listbounce@xxxxxxxxxxxxxxxxx on behalf of jond
Sent: Wed 7/11/2007 11:27 AM
To: pen-test@xxxxxxxxxxxxxxxxx
Subject: How to track down a wireless hacker

I have a new client who was setup with a wireless network a while back
using WPA encryption by another firm.
An 'unauthorized user' broke the encryption and got onto their network.
They've come to me to design a solution so that this doesn't happen
again, which isn't a problem.

However they also asked me if it's possible to track down the attacker
if this happened again.
From what I know, it's not possible is it?

If the attacker didn't change their MAC address, and say the companies
lawyers could get some sort of court order to intel, dell, etc to
release which MAC address went to which computer and who bought said
computer. Does the manufacture even keep that info?

If the attacker did change their MAC address, the real MAC address
will never transverse the wire(AIR) right, or is it still in the
packet somewhere?

Any other thoughts or ideas to track someone down?
Is any other info leaked that I'm not thinking about?

This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!