Intermarkets' Privacy Policy
Support


Donate to Ace of Spades HQ!



Recent Entries
Absent Friends
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022
Dave In Texas 2022
Jesse in D.C. 2022
OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published. Contact OrangeEnt for info:
maildrop62 at proton dot me
Cutting The Cord And Email Security
Moron Meet-Ups

NoVaMoMe 2024: 06/08/2024
Arlington, VA
Details to follow


Texas MoMe 2024: 10/18/2024-10/19/2024 Corsicana,TX
Contact Ben Had for info





















« Top Headline Comments 12-6-13 | Main | Friday Morning News Dump »
December 06, 2013

Journalist challenges white hat hacker team to get him, they succeed

The challenge

It’s my first class of the semester at New York University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message. To receive the four-digit code I need to unlock it I’ll have to dial a number with a 312 area code. Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.

I’m being hacked — and only have myself to blame.

Two months earlier I challenged Nicholas Percoco, senior vice president of SpiderLabs...

The saga of the hacks and the technology and methods they used is detailed in a 3-part series.


PART 1 and PART 2 describes some of the custom malware and tricks used. Pishing, software vulnerability exploits, etc. This is the stuff they managed to accomplish without setting up outside Adam's apartment with WiFi hacking hardware.

...Parts one and two will detail the malware and phishing aspects of our hack with contributions from myself, Matt Jakubowski and Daniel Chechik. Next week, our colleague Garret Picchioni will publish more technical details about the onsite and wireless portions of the attack.
My daily job as a security researcher on the Malware Analysis Team in SpiderLabs typically consists of reverse-engineering malware (usually something encountered during a forensics investigation). When I was asked to take part in this project, it seemed a natural fit that I would help out by writing custom malware in order to gain access to Adam’s machine. Rarely do I get the chance to don my metaphorical "black hat" and actually create a malicious file. Doing so often allows me to see the situation from both sides, which in turn allows me to do a better job when it comes to reversing malware. In short, I was pretty excited...
Eventually they had to get around to hacking Adam's home WiFi network if they wanted full access to all the crown jewels.

PART 3 describes the on-site Wi-Fi cracking adventure that got them in.

...Once arriving onsite in Adam’s neighborhood and doing a quick Wi-Fi scan we discovered it was going to be a lot more difficult than originally anticipated. As it turns out, there are a lot of people that live in Brooklyn Heights, and as a result a lot of unique wireless networks. Our initial scans of the area revealed that there were over 1,200 wireless networks discoverable from Adam’s block with our wireless equipment. Without obvious wireless network names such as “Adam Penenberg’s House” we had to resort to some conventional and unconventional methods to identify his network...
...After letting the device sit overnight, we had our final list of approximately 20 wireless networks...
....To do so, we sent specially crafted packets to only these devices informing them to disconnect from the wireless network. Once they attempted to reconnect to the network, we were able to capture the WPA handshake. We sent that handshake to SpiderLabs’ password cracking server and proceeded to crack the password to his network in approximately 15 minutes. With the password, we had full access to his wireless network.

digg this
posted by Purp at 08:25 AM

| Access Comments




Recent Comments
Methos: "An NGO in Mexico, which conspires with illegal ali ..."

Anna Puma: "CENTCOM has determined there was no way they could ..."

El Mariachi Attorney at Law: "It's filled with Okies. ..."

Tater-American Hate Society: "Looks like fatty is so triggered he's gone on Ozem ..."

El Mariachi Attorney at Law: "I can't stop laughing at that dumb Bakersfield bro ..."

Cosda: "Good morning you white racists! ..."

nckate: "Dwarf Wolverine aka John Mellencamp says STFU at h ..."

rickb223 [/s][/b][/i][/u]: "Dear Mike Pence, I want the Constitution. Why do ..."

NaCly Dog: "Cosda Ya done good. ..."

Joe, living dangerously: "Conservative principles is whatever the left's pri ..."

Aetius451AD: "4 Did the nood thing. Posted by: Cosda at April 1 ..."

Catch Thirty-Thr33: "Anything and everything that stands in the slighte ..."

Recent Entries
Search


Polls! Polls! Polls!
Frequently Asked Questions
The (Almost) Complete Paul Anka Integrity Kick
Top Top Tens
Greatest Hitjobs

The Ace of Spades HQ Sex-for-Money Skankathon
A D&D Guide to the Democratic Candidates
Margaret Cho: Just Not Funny
More Margaret Cho Abuse
Margaret Cho: Still Not Funny
Iraqi Prisoner Claims He Was Raped... By Woman
Wonkette Announces "Morning Zoo" Format
John Kerry's "Plan" Causes Surrender of Moqtada al-Sadr's Militia
World Muslim Leaders Apologize for Nick Berg's Beheading
Michael Moore Goes on Lunchtime Manhattan Death-Spree
Milestone: Oliver Willis Posts 400th "Fake News Article" Referencing Britney Spears
Liberal Economists Rue a "New Decade of Greed"
Artificial Insouciance: Maureen Dowd's Word Processor Revolts Against Her Numbing Imbecility
Intelligence Officials Eye Blogs for Tips
They Done Found Us Out, Cletus: Intrepid Internet Detective Figures Out Our Master Plan
Shock: Josh Marshall Almost Mentions Sarin Discovery in Iraq
Leather-Clad Biker Freaks Terrorize Australian Town
When Clinton Was President, Torture Was Cool
What Wonkette Means When She Explains What Tina Brown Means
Wonkette's Stand-Up Act
Wankette HQ Gay-Rumors Du Jour
Here's What's Bugging Me: Goose and Slider
My Own Micah Wright Style Confession of Dishonesty
Outraged "Conservatives" React to the FMA
An On-Line Impression of Dennis Miller Having Sex with a Kodiak Bear
The Story the Rightwing Media Refuses to Report!
Our Lunch with David "Glengarry Glen Ross" Mamet
The House of Love: Paul Krugman
A Michael Moore Mystery (TM)
The Dowd-O-Matic!
Liberal Consistency and Other Myths
Kepler's Laws of Liberal Media Bias
John Kerry-- The Splunge! Candidate
"Divisive" Politics & "Attacks on Patriotism" (very long)
The Donkey ("The Raven" parody)
Powered by
Movable Type 2.64