Security Scientists Create Botnet Drone, Which Brings Down Wireless Networks
Security scientists from SIT recently built "SkyNET," one furtive network, which facilitates connection between host PCs and a bot-controller. The device contains a mock helicopter combined with a PC, programmed particularly to strike WiFi networks. CrazyEngineers published this on September 10, 2011.
Describing the network device, security researchers state that it has the ability to shutdown PCs that are part of a wireless network followed with pulling them inside armies-of-bots that normally spam mails, cause denial-of-service conditions, or perform hacks. This ability reportedly, stems from the unsecured nature of personal networks that are online. They're frequently short of security controls, security patches for computers, auditing or logging facilities, and suitable password management, while characteristically utilize poorly-secured wireless radio.
Moreover according to the researchers, when the drone acquires access to networks, it uses several programs for hijacking target computers, like the Metasploit tool. As for the procedure of attack, the drone spreads it over four stages for enlisting target PCs inside the network. The process is named PAAE implying pilot, attack, attack, enlist, the researchers explain. CBR published this on September 9, 2011.
Evidently, with SkyNET it becomes possible for the owner towards regulating the network-of-bots using the drone instead of a mundane online connection that makes it difficult for tracking down the bot-herder. Besides, what numerous householders owning wireless networks miss doing is altering their router passwords.
Also according to the specialists, the bot-herder can be traced only if the drone is followed right from its starting point alternatively it's caught under the radar with a forensic probe initiated into it. Nevertheless, the safeguards the scientists advise aren't merely password alteration but sidelining of WiFi networks too via identifying fresh connections.
Cyber security specialist Sven Dietrich, who developed one POC (proof-of-concept) drone, demonstrated how concealing the SSID of the network proved helpful, while allowing only familiar MAC addresses to use the WiFi-connected PC-network would be helpful too. Examiner.com reported this on September 11, 2011.
Furthermore, in a related demonstration, the scientists advised organizations for adopting mechanisms for identifying their networks' other tools as also taking measures for blocking the nodes for WiFi access.
Related article: Securities Push Up A Must For Web Companies
» SPAMfighter News - 20-09-2011